Lattice-based Signcryption without Random Oracles - - PowerPoint PPT Presentation

โ–ถ
lattice based signcryption without random oracles
SMART_READER_LITE
LIVE PREVIEW

Lattice-based Signcryption without Random Oracles - - PowerPoint PPT Presentation

Lattice-based Signcryption without Random Oracles Junji Shikata Graduate School of Environment and Information Sciences, Yokohama National University, Japan Overview Lattice-based Cryptography


slide-1
SLIDE 1

Lattice-based Signcryption without Random Oracles

๐“๐ข๐ฃ๐จ๐ก๐ฉ ๐“๐›๐ฎ๐ฉ Junji Shikata

Graduate School of Environment and Information Sciences, Yokohama National University, Japan

slide-2
SLIDE 2

Overview

  • Lattice-based Cryptography
  • The cryptosystem is based on lattice problems and has

quantum-resistance.

  • It is possible to realize a lot of functionalities of

cryptosystems.

  • Signcryption
  • Cryptosystem meeting both securities of public key

encryption (PKE) and digital signatures (DSs)

  • The public-key based โ€œauthenticated encryptionโ€

We propose

  • A construction of signcryption based on lattice problems, and
  • Hybrid encryption of signcryption based on this construction

with data encapsulation mechanism (DEM)

2

slide-3
SLIDE 3

Lattice

The lattice generated by ๐‘œ linearly independent vectors ๐’„๐Ÿ, ๐’„๐Ÿ‘, โ€ฆ , ๐’„๐’ โˆˆ โ„๐‘› is defined as ๐‘€ ๐’„๐Ÿ, โ€ฆ , ๐’„๐’ = โˆ‘๐‘ฆ๐’‹๐’„๐’‹ ๐‘ฆ๐’‹ โˆˆ โ„ค . It is often written by ๐‘€ ๐‘ช = ๐‘ช๐’š ๐’š โˆˆ โ„ค๐‘œ , where ๐‘ช โ‰” ๐’„๐Ÿ, โ€ฆ , ๐’„๐’ โˆˆ โ„๐‘›ร—๐‘œ is the lattice basis. As the norm of vectors, we consider the Euclid norm: ๐’˜ = ๐‘ค1

2 + โ‹ฏ + ๐‘ค๐‘œ 2

for ๐’˜ = ๐‘ค1, โ€ฆ , ๐‘ค๐‘œ โˆˆ โ„๐‘œ. 3

slide-4
SLIDE 4

Lattice Problems

  • ๐ป๐‘๐‘ž๐‘‡๐‘Š๐‘„

๐›ฟ:

  • Given a lattice basis ๐‘ช, ๐‘  โˆˆ โ„,
  • Decide whether the shortest vector ๐’˜(โˆˆ ๐‘€ ๐‘ช โˆ– ๐‘ท ) fulfills

๐‘ค โ‰ค ๐‘  or ๐‘ค > ๐›ฟ โ‹… ๐‘ 

  • Learning with Errors and Small Integer Solution

(LWE and SIS) โœ“ It is possible to reduce from lattice problems to these problems. โœ“ The average-case problems are at least as hard as the worst-case problems. โœ“ It is possible to realize a lot of cryptosystems such as fully homomorphic encryption, attribute-based encryption, searchable encryption and so on.

4

slide-5
SLIDE 5

Definitions of LWE and SIS

  • ๐‘ด๐‘ฟ๐‘ญ๐‘Ÿ,๐›ฝ (Decisional version)
  • The LWE distribution ๐ต(๐’•, ๐œš):
  • Input: ๐’• โˆˆ โ„ค๐’“

๐’ and a Gaussian distribution ๐œš with the center

0 and the standard deviation ๐›ฝ๐‘Ÿ

  • Output (*): ๐’ƒ1, ๐‘1 , โ€ฆ , ๐’ƒ๐‘›, ๐‘๐‘› โˆˆ โ„ค๐‘Ÿ

๐‘œ ร— โ„ค๐‘Ÿ,

where ๐‘๐‘— = ๐’•โŠค๐’ƒ๐‘— + ๐‘“๐‘—, ๐’ƒ๐‘— ีš

๐‘‰ โ„ค๐‘Ÿ ๐‘œ, ๐‘“๐‘— ีš ๐œš for ๐‘— โˆˆ {1, โ€ฆ , ๐‘›}

  • Input: ๐’ƒ1, ๐‘1 , โ€ฆ , ๐’ƒ๐‘›, ๐‘๐‘› โˆˆ โ„ค๐‘Ÿ

๐‘œ ร— โ„ค๐‘Ÿ,

  • Decide whether the input sequence is sampled from the

LWE distribution or uniformly at random in โ„ค๐‘Ÿ

๐‘œ ร— โ„ค๐‘Ÿ

(*) Let ๐‘ฉ โ‰” ๐’ƒ1, โ€ฆ , ๐’ƒ๐‘› and ๐’‡โŠค โ‰” ๐‘“1, โ€ฆ , ๐‘“๐‘› , then the LWE samples can be expressed by ๐’„ = ๐’•โŠค๐‘ฉ + ๐’‡โŠค mod ๐‘Ÿ

  • ๐‘ป๐‘ฑ๐‘ป๐‘Ÿ,๐›พ
  • Input: ๐‘ฉ โˆˆ โ„ค๐‘Ÿ

๐‘œร—๐‘›,

  • Find: ๐’‡ โˆˆ โ„ค๐‘› s.t. ๐‘ฉ๐’‡ = ๐Ÿ mod ๐‘Ÿ and ๐’‡

โ‰ค ๐›พ

5

slide-6
SLIDE 6

Signcryption [Z97]

6

  • Signcryption schemes meet both functionalities of PKE and DS

(both of confidentiality and integrity).

  • It is used to construct secure channels from insecure ones such

as the Internet

Message

Unsigncrypt

Receiverโ€™s Public-Key Senderโ€™s Secret-Key Senderโ€™s Public-Key Receiverโ€™s Secret-Key Ciphertext

Signcrypt

Sender Receiver

  • r

invalid

[Z97] Y. Zheng, โ€œDigital Signcryption or how to achieve cost(signature & encryption) << cost(signature) + cost(encryption),โ€ CRYPTO 1997.

slide-7
SLIDE 7

The Security Model [ADR02]

7

We consider IND-CCA and sUF-CMA security against insiders in the multi-user setting (MU-IND-iCCA and MU-sUF-iCMA).

  • Securities in the two-user setting doesnโ€™t always imply ones in the multi-

user setting.

  • Inside adversaries are stronger than outside ones.

Mutli-User setting Two-User setting

Outsider Insider

[ADR02] J. H. An, Y. Dodis, and T. Rabin, โ€œOn the security of joint signature and encryption,โ€ EUROCRYPT 2002.

slide-8
SLIDE 8

Our Proposal

Main purpose:

To construct a lattice-based signcryption scheme

  • Meeting both of MU-IND-iCCA and MU-sUF-iCMA security
  • More efficient than the existing constructions in terms of key-

sizes and ciphertext-size

To achieve these, we propose the following constructions

1. A direct construction based on lattice problems 2. Hybrid encryption variant of signcryption (hybrid signcryption)

  • btained by combining this construction and an IND-OT secure

DEM.

The existing constructions [CMSM11,NS13]:

  • These are generic constructions satisfying both securities of MU-IND-

iCCA and MU-sUF-iCMA.

  • We can obtain lattice-based ones by applying lattice-based primitives.

8

slide-9
SLIDE 9

The Model

9

Setup phase๏ผš ๐‘ž๐‘ ๐‘› ีš Setup(1๐‘œ) Key-Generation: (๐‘ž๐‘™๐‘‡, ๐‘ก๐‘™๐‘‡) ีš KeyGen๐‘‡(๐‘ž๐‘ ๐‘›) Key-Generation: (๐‘ž๐‘™๐‘†, ๐‘ก๐‘™๐‘†) ีš KeyGen๐‘†(๐‘ž๐‘ ๐‘›) Signcrypt: ๐ท ีš SC (๐‘ž๐‘™๐‘†, ๐‘ก๐‘™๐‘‡, ๐œˆ) Unsigncrypt: ๐œˆ/โŠฅีš USC (๐‘ž๐‘™๐‘‡, ๐‘ก๐‘™๐‘†, ๐ท)

๐ท

๐‘œ: Security parameter, ๐‘ž๐‘ ๐‘›: Public parameter, ๐‘ž๐‘™๐‘‡: Senderโ€™s public key, ๐‘ž๐‘™๐‘†: Receiverโ€™s public key, ๐‘ก๐‘™๐‘‡: Senderโ€™s secret key, ๐‘ก๐‘™๐‘†: Receiverโ€™s secret key, ๐œˆ: Message, ๐ท: Ciphertext โŠฅ: Invalid

Sender Receiver

slide-10
SLIDE 10

The Security Definition (1/2)

10 MU-IND-iCCA security

In the following game, if any adversary ๐ตโ€ฒs advatage ๐ต๐‘’๐‘ค๐ต

MUโˆ’INDโˆ’iCCA(๐‘œ) โ‰” | Pr ๐‘โ€ฒ = ๐‘ โˆ’ 1 2 | < negl ๐‘œ holds,

Signcryption meets MU-IND-iCCA security.

Challenger Adversary ๐ต ๐œˆ0, ๐œˆ1, ๐‘ž๐‘™๐‘‡

โˆ—, ๐‘ก๐‘™๐‘‡ โˆ—

๐‘ ีš

๐‘‰ {0,1}

๐ทโˆ— ีš SC(๐‘ž๐‘™๐‘†, ๐‘ก๐‘™๐‘‡

โˆ—, ๐œˆ๐‘)

๐ทโˆ— ๐‘โ€ฒ ๐‘ž๐‘™๐‘‡(โ‰  ๐‘ž๐‘™๐‘‡

โˆ—),

๐ท(โ‰  ๐ทโˆ—) ๐œˆ Unsigncrypt Oracle ๐‘โ€ฒ โˆˆ {0,1} ๐‘โ€ฒ ? = ๐‘ ๐‘ž๐‘ ๐‘› ีš Setup(1๐‘œ) ๐‘ž๐‘™๐‘†, ๐‘ก๐‘™๐‘† ีš KeyGen๐‘† (๐‘ž๐‘ ๐‘›)

MU-IND-iCCA=Multi-User Indistinguishability against insider Chosen Ciphertext Attack

slide-11
SLIDE 11

The Security Definition (2/2)

11 MU-sUF-iCMA security

In the following game, if any adversary ๐ตโ€™s advantage ๐ต๐‘’๐‘ค๐ต

MUโˆ’sUFโˆ’iCMA ๐‘œ โ‰” Pr ๐ต wins < negl(๐‘œ) holds,

Signcryption meets MU-sUF-iCMA security.

Challenger Adversary ๐ต ๐‘ž๐‘ ๐‘›, ๐‘ž๐‘™๐‘‡ ๐‘ž๐‘ ๐‘› ีš Setup(1๐‘œ) ๐‘ž๐‘™๐‘‡, ๐‘ก๐‘™๐‘‡ ีš KeyGen๐‘‡ (๐‘ž๐‘ ๐‘›) ๐‘ž๐‘™๐‘†

โˆ—, ๐‘ก๐‘™๐‘† โˆ—, ๐ทโˆ—

๐œˆ(๐‘—), ๐‘ž๐‘™๐‘†

(๐‘—)

๐ท(๐‘—) Signcrypt Oracle [๐ต wins]: USC ๐‘ž๐‘ ๐‘›, ๐‘ž๐‘™๐‘‡, ๐‘ก๐‘™๐‘†

โˆ—, ๐ทโˆ— = ๐œˆโˆ— โˆง

โˆ€๐‘— โˆˆ 1, โ€ฆ , ๐‘… , ๐‘ž๐‘™๐‘†

โˆ—, ๐œˆโˆ—, ๐ทโˆ— โ‰  ๐‘ž๐‘™๐‘† ๐‘— , ๐œˆ ๐‘— , ๐ท(๐‘—)

๐‘… queries

MU-sUF-iCMA=Multi-User strong Unforgeability against insider Chosen Message Attack

slide-12
SLIDE 12

Primitives used in Our Construction

12

Tag-based Trapdoor Function [MP12] Digital Signature (sUF-naCMA) [MP12]

+

Direct Construction

Unforgeability MU-sUF-iCMA

+

Signcryption Confidentiality MU-IND-iCCA

Collision-Resistant Hash Function [MR07]

+

Based on LWE Based on SIS [MP12] D. Micciancio, C. Peikert: โ€œTrapdoor for lattices: Simpler, tighter, faster, smaller,โ€ EUROCRYPT 2012. [MR07] D. Micciancio, O. Regev: โ€œWorst-case to average-case reductions based on gaussian measures,โ€ SIAM J. Comput. 2007.

slide-13
SLIDE 13

The Problem of Sign-then-Encrypt paradigm

13

Adversary

๐œˆ, ๐‘ž๐‘™๐‘† ๐ท

Signcrypt Oracle

Dec ๐‘ก๐‘™๐‘†, ๐œ โ†’ ๐œˆ||๐‘‡ Enc ๐‘ž๐‘™๐‘†, (๐œˆ||๐‘‡); ๐‘ โ€™ โ†’ ๐ทโˆ— A valid forgery (๐‘ž๐‘™๐‘†, ๐‘ก๐‘™๐‘†, ๐ทโˆ—) in the MU-sUF-iCMA game Sign ๐‘ก๐‘™๐‘‡, ๐œˆ โ†’ ๐‘‡ Enc ๐‘ž๐‘™๐‘†, (๐œˆ||๐‘‡); ๐‘  โ†’ ๐ท where ๐‘  is a random number

In the MU-sUF-iCMA game, inside adversaries can generate forgeries as follows: 1. Submit a query to the signcrypt oracle and receive the response, 2. Decrypt the message/signature-pair (๐œˆ, ๐‘‡) by using ๐‘ก๐‘™๐‘†, 3. Encrypt (๐œˆ, ๐‘‡) again and output a forgery ๐ทโˆ—.

slide-14
SLIDE 14

Basic Idea of Our Construction

Our Idea to solve the problem: Generate a signature on injective tag-based trapdoor functions (TDFs) of LWE ๐‘•๐ต ๐‘ข๐‘๐‘•, ๐‘ก; ๐‘ฆ = ๐‘กโŠค๐ต๐‘ข๐‘๐‘• + ๐‘ฆโŠค โˆˆ โ„ค๐‘Ÿ

๐‘› [MP12]

14

าง ๐‘‘ = ๐‘•๐ต(๐‘ข๐‘๐‘•, ๐‘ก; ๐‘ฆ)

๐‘‡ = Sign(๐‘ก๐‘™๐‘‡, ๐œˆ|| าง ๐‘‘) Encryption: ๐‘‘ = าง ๐‘‘ + (๐œˆ โˆฅ ๐‘‡) โ‡’ ciphertext ๐ท = (๐‘‘, ๐‘ )

๐‘”

๐ถ(๐‘ž๐‘™๐‘‡, ๐‘ )

๐‘ข๐‘๐‘•

๐œˆ: Message ๐‘ก, ๐‘ฆ: The input of LWE-based TDFs ๐‘ : Random value ๐‘”

๐ถ(โ‹…): Lattice-based collision-resistant

hash function (with a parameter ๐ถ) Overview of SC algorithm

slide-15
SLIDE 15

Why can the Idea solve the Problem ?

  • The reason that simple Sign-then-Encrypt constructions

are broken: By using a new random number, it is possible to compute a ciphertext on the message/signature pair generated by the SC oracle.

  • The process of our Construction

Our ๐‘‡๐ท algorithm generates a signature on both of a message and the input (random number) of the LWE-based trapdoor function [MP12] โ‡’ To use new random numbers, adversaries have to break the underlying digital signature. 15

slide-16
SLIDE 16

Our Lattice-based Signcryption (1/3)

๐‘ž๐‘ ๐‘› ีš ๐‘‡๐‘“๐‘ข๐‘ฃ๐‘ž 1๐‘œ :

  • ๐‘Ÿ = ๐‘ž๐‘๐‘š๐‘ง(๐‘œ)
  • เดฅ

๐‘› = ๐‘ƒ ๐‘œlog ๐‘Ÿ

  • ๐‘› = เดฅ

๐‘› + ๐‘œ log ๐‘Ÿ

  • ๐›ฝโˆ’1 = ๐‘ƒ ๐‘œlog ๐‘Ÿ โ‹… ๐œ•( log ๐‘œ)
  • ๐œ€ = ๐‘ƒ ๐‘œlog ๐‘Ÿ โ‹… ๐œ•( log ๐‘œ)
  • โ„“: the bit-length of messages
  • ๐‘ž = ฮฉ(๐‘Ÿ๐œ€โˆ’1)
  • ๐ป: a gadget matrix [MP12]
  • ๐ต1, โ€ฆ , ๐ต๐‘œ log ๐‘Ÿ ีš โ„ค๐‘Ÿ

๐‘œร—๐‘›

  • ๐ถ ีš โ„ค๐‘Ÿ

๐‘œร—๐‘›

  • Output

๐‘ž๐‘ ๐‘› = (๐‘œ, ๐‘Ÿ, เดฅ ๐‘›, ๐‘›, ๐›ฝ, ๐œ€, โ„“, ๐‘ž, ๐ป, ๐ต1, โ€ฆ , ๐ต๐‘œ log ๐‘Ÿ ,๐ถ)

๐‘ž๐‘™๐‘†, ๐‘ก๐‘™๐‘† ีš ๐ฟ๐‘“๐‘ง๐ป๐‘“๐‘œ๐‘† ๐‘ž๐‘ ๐‘›

1. าง ๐ต๐‘† ีš โ„ค๐‘Ÿ

๐‘œร—๐‘›,

2. ๐‘ˆ๐‘† ีš ๐ธ๐œ€

เดฅ ๐‘›ร—๐‘œโŒˆlog ๐‘ŸโŒ‰

3. ๐ต๐‘† = [๐ต๐‘† โˆฃ โˆ’๐ต๐‘† โ‹… ๐‘ˆ๐‘†] 4. Output ๐‘ž๐‘™๐‘† = ๐ต๐‘†, ๐‘ก๐‘™๐‘† = ๐‘ˆ๐‘†

๐‘ž๐‘™๐‘‡, ๐‘ก๐‘™๐‘‡ ีš ๐ฟ๐‘“๐‘ง๐ป๐‘“๐‘œ๐‘‡(๐‘ž๐‘ ๐‘›)

1. าง ๐ต๐‘‡ ีš โ„ค๐‘Ÿ

๐‘œร—๐‘›,

2. ๐‘ˆ

๐‘‡ ีš ๐ธ๐œ€ เดฅ ๐‘›ร—๐‘œโŒˆlog ๐‘ŸโŒ‰

3. ๐ต๐‘‡ = [๐ต๐‘‡ โˆฃ ๐ป โˆ’ ๐ต๐‘‡ โ‹… ๐‘ˆ

๐‘‡]

4. Output ๐‘ž๐‘™๐‘‡ = ๐ต๐‘‡, ๐‘ก๐‘™๐‘‡ = ๐‘ˆ

๐‘‡

16

slide-17
SLIDE 17

Our Lattice-based Signcryption (2/3)

๐ท ีš ๐‘‡๐ท(๐‘ž๐‘™๐‘†, ๐‘ก๐‘™๐‘‡, ๐œˆ):

1. ๐‘ 

๐‘“, ๐‘  ๐‘ก ีš ๐ธ๐œ• log ๐‘œ ๐‘›

, 2. ๐‘ข = ๐‘”๐ต๐‘† ๐‘ž๐‘™๐‘ก + ๐‘”

๐ถ ๐‘  ๐‘“ โˆˆ โ„ค๐‘Ÿ ๐‘œ,

3. ๐ต๐‘† = [๐ต๐‘† โˆฃ ๐ผ ๐‘ข ๐ป โˆ’ ๐ต๐‘† โ‹… ๐‘ˆ๐‘†] 4. ๐‘ก ีš โ„ค๐‘Ÿ

๐‘œ, ๐‘ฆ0 ีš ๐ธ๐›ฝ๐‘Ÿ ๐‘› , ๐‘ฆ1 ีš ๐ธ๐›ฝ๐‘Ÿ โ„“ ,

5. เดฅ ๐‘‘0 = ๐‘กโŠค๐ต๐‘†,๐‘ข + ๐‘ž๐‘ฆ0

โŠค โˆˆ โ„ค๐‘Ÿ ๐‘›,

6. เดฅ ๐‘‘1 = ๐‘กโŠค๐‘‰ + ๐‘ž๐‘ฆ1

โŠค โˆˆ โ„ค๐‘Ÿ โ„“

7. าง ๐ท = ( เดฅ ๐‘‘0, เดฅ ๐‘‘1, ๐‘ 

๐‘“),

8. Generate a signature on ๐œˆ โˆฅ ๐‘ž๐‘™๐‘† โˆฅ าง ๐ท,

  • โ„Ž = ๐‘”

๐ต๐‘‡ ๐œˆ โˆฅ ๐‘ž๐‘™๐‘† โˆฅ

าง ๐ท + ๐‘”

๐ถ ๐‘  ๐‘ก โˆˆ โ„ค๐‘Ÿ ๐‘œ,

  • ๐ต๐‘‡,โ„Ž =

๐ต๐‘‡ ๐ต0 + โˆ‘๐‘—=1

๐‘œโŒˆlog ๐‘ŸโŒ‰ โ„Ž๐‘— โ‹… ๐ต๐‘— ,

  • ๐‘“ ีš ๐‘‡๐‘๐‘›๐‘ž๐‘š๐‘“ ๐‘ˆ

๐‘‡, ๐ต๐‘‡,โ„Ž, ๐‘ฃ๐‘‡, ๐œ€ ,

  • (๐‘“, ๐‘ 

๐‘ก) is the signature,

9. ๐‘‘0 = เดฅ ๐‘‘0 + ๐‘ 

๐‘ก โˆˆ โ„ค๐‘Ÿ ๐‘›, ๐‘‘1 = เดฅ

๐‘‘1 + ๐‘ž โ‹… ๐œˆ

๐‘Ÿ 2 โˆˆ โ„ค๐‘Ÿ โ„“

  • 10. Output ๐ท = (๐‘‘0, ๐‘‘1, ๐‘ 

๐‘“, ๐‘“)

17

slide-18
SLIDE 18

Our Lattice-based Signcryption (3/3)

๐œˆ/โŠฅีš ๐‘‰๐‘‡๐ท ๐‘ž๐‘™๐‘‡, ๐‘ก๐‘™๐‘†, ๐ท :

1. ๐‘ข = ๐‘”๐ต๐‘† ๐‘ž๐‘™๐‘‡ + ๐‘”

๐ถ ๐‘  ๐‘“ โˆˆ โ„ค๐‘Ÿ ๐‘œ,

2. ๐‘จ, ๐‘ 

๐‘ก ีš ๐ฝ๐‘œ๐‘ค๐‘“๐‘ ๐‘ข ๐‘ˆ๐‘†, ๐ต๐‘†,๐‘ข, ๐‘‘0 ,

3. ๐น ีš ๐‘‡๐‘๐‘›๐‘ž๐‘š๐‘“ ๐‘ˆ๐‘†, ๐ต๐‘†,๐‘ข, ๐‘‰, ๐œ€ , 4. ๐‘คโŠค = ๐‘‘1

โŠค โˆ’ ๐‘‘0 โŠค๐น = ๐‘ž แ‰€

แ‰ ๐‘ฆ1

โŠค +

๐œˆ

๐‘Ÿ 2 โˆ’ ๐‘ฆ0 โŠค๐น ,

5. Recover ๐œˆ from ๐‘ค/๐‘ž 6. Output ๐œˆ if ๐ต๐‘‡,โ„Ž โ‹… ๐‘“ = ๐‘ฃ๐‘‡ mod ๐‘Ÿ and ๐’‡ โ‰ค ๐œ€ ๐‘› + ๐‘œโŒˆlog ๐‘ŸโŒ‰ , or

  • utput โŠฅ otherwise.

where

  • เดฅ

๐‘‘0: = ๐‘‘0 โˆ’ ๐‘ 

๐‘ก, เดฅ

๐‘‘1: = ๐‘‘1 โˆ’ ๐‘ž โ‹… ๐œˆ

๐‘Ÿ 2 , าง

๐ท: = เดฅ ๐‘‘0, เดฅ ๐‘‘1, ๐‘ 

๐‘“ ,

  • โ„Ž: = ๐‘”๐ต๐‘‡ ๐œˆ โˆฅ ๐‘ž๐‘™๐‘† โˆฅ

าง ๐ท + ๐‘”

๐ถ(๐‘  ๐‘ก),

  • ๐ต๐‘‡,โ„Ž: = [๐ต๐‘‡ โˆฃ ๐ต0 + โˆ‘๐‘—=1

โŒˆ๐‘œlog ๐‘ŸโŒ‰ ๐ต๐‘—],

18

slide-19
SLIDE 19

The Security of the Lattice-based Signcryption

Theorem 1.

  • Our lattice-based signcryption meets MU-IND-iCCA

security, if the ๐‘€๐‘‹๐น๐‘Ÿ,๐›ฝ assumption holds for ๐›ฝโˆ’1 = ๐‘ƒ ๐‘œ2log2 ๐‘Ÿ โ‹… ๐œ• log ๐‘œ .

  • Our lattice-based signcryption meets MU-sUF-iCMA

security, if the ๐‘‡๐ฝ๐‘‡๐‘Ÿ,๐›พ assumption holds for ๐›พ = ๐‘ƒ ๐‘œ2.5log2.5 ๐‘Ÿ โ‹… ๐œ•(log ๐‘œ). 19

slide-20
SLIDE 20

Hybrid enc. version of Our Signcryption (HSC)

๐ท ีš ๐‘‡๐ท(๐‘ž๐‘™๐‘†, ๐‘ก๐‘™๐‘‡, ๐œˆ):

1. ๐ฟ ีš 0,1 โ„“,๐‘ 

๐‘“, ๐‘  ๐‘ก ีš ๐ธ๐œ• log ๐‘œ ๐‘›

, 2. ๐‘ข = ๐‘”๐ต๐‘† ๐‘ž๐‘™๐‘ก + ๐‘”

๐ถ ๐‘  ๐‘“ โˆˆ โ„ค๐‘Ÿ ๐‘œ,

3. ๐ต๐‘† = [๐ต๐‘† โˆฃ ๐ผ ๐‘ข ๐ป โˆ’ ๐ต๐‘† โ‹… ๐‘ˆ๐‘†] 4. ๐‘ก ีš โ„ค๐‘Ÿ

๐‘œ, ๐‘ฆ0 ีš ๐ธ๐›ฝ๐‘Ÿ ๐‘› , ๐‘ฆ1 ีš ๐ธ๐›ฝ๐‘Ÿ โ„“ ,

5. เดฅ ๐‘‘0 = ๐‘กโŠค๐ต๐‘†,๐‘ข + ๐‘ž๐‘ฆ0

โŠค โˆˆ โ„ค๐‘Ÿ ๐‘›,

6. เดฅ ๐‘‘1 = ๐‘กโŠค๐‘‰ + ๐‘ž๐‘ฆ1

โŠค โˆˆ โ„ค๐‘Ÿ โ„“

7. าง ๐ท = ( เดฅ ๐‘‘0, เดฅ ๐‘‘1, ๐‘ 

๐‘“),

8. Generate a signature on ๐œˆ โˆฅ ๐‘ž๐‘™๐‘† โˆฅ าง ๐ท โˆฅ ๐ฟ,

  • โ„Ž = ๐‘”

๐ต๐‘‡ ๐œˆ โˆฅ ๐‘ž๐‘™๐‘† โˆฅ

าง ๐ท โˆฅ ๐ฟ + ๐‘”

๐ถ ๐‘  ๐‘ก โˆˆ

โ„ค๐‘Ÿ

๐‘œ,

  • ๐ต๐‘‡,โ„Ž =

๐ต๐‘‡ ๐ต0 + โˆ‘๐‘—=1

๐‘œโŒˆlog ๐‘ŸโŒ‰ โ„Ž๐‘— โ‹… ๐ต๐‘— ,

  • ๐‘“ ีš ๐‘‡๐‘๐‘›๐‘ž๐‘š๐‘“ ๐‘ˆ

๐‘‡, ๐ต๐‘‡,โ„Ž, ๐‘ฃ๐‘‡, ๐œ€ ,

  • (๐‘“, ๐‘ 

๐‘ก) is the signature,

9. ๐‘‘0 = เดฅ ๐‘‘0 + ๐‘ 

๐‘ก โˆˆ โ„ค๐‘Ÿ ๐‘›,

๐‘‘1 = เดฅ ๐‘‘1 + ๐‘ž โ‹… ๐ฟ ๐‘Ÿ 2 โˆˆ โ„ค๐‘Ÿ

โ„“,

10. ๐‘‘2 = ๐ธ๐น๐‘. ๐น๐‘œ๐‘‘(๐ฟ, ๐œˆ),

  • 11. Output ๐ท = (๐‘‘0, ๐‘‘1, ๐‘‘2, ๐‘ 

๐‘“, ๐‘“)

20

๐‘‡๐‘“๐‘ข๐‘ฃ๐‘ž, ๐ฟ๐‘“๐‘ง๐ป๐‘“๐‘œ๐‘†, ๐ฟ๐‘“๐‘ง๐ป๐‘“๐‘œ๐‘‡, ๐‘‰๐‘‡๐ท are almost the same as those of the lattice-based construction.

slide-21
SLIDE 21

The Security of HSC

Theorem 2.

  • HSC meets MU-IND-iCCA security, if the ๐‘€๐‘‹๐น๐‘Ÿ,๐›ฝ

assumption holds for ๐›ฝโˆ’1 = ๐‘ƒ ๐‘œ2log2 ๐‘Ÿ โ‹… ๐œ• log ๐‘œ and DEM satisfies IND-OT security.

  • HSC meets MU-sUF-iCMA security, if the ๐‘‡๐ฝ๐‘‡๐‘Ÿ,๐›พ

assumption holds for ๐›พ = ๐‘ƒ ๐‘œ2.5log2.5 ๐‘Ÿ โ‹… ๐œ•(log ๐‘œ) and DEM is one-to-one (*).

(*) one-to-one property: DEM is one-to-one if for any message ๐œˆ and any key ๐ฟ, there is only one ciphertext ๐‘‘ such that ๐œˆ = ๐ธ๐น๐‘. ๐ธ๐‘“๐‘‘(๐ฟ, ๐‘‘).

21

slide-22
SLIDE 22

Lattice-based Constructions

Construction Primitive ๐‘‡๐ท๐‘ˆ๐ฟ [CMSM11]

  • IND-Tag-CCA secure Tag-based KEM
  • IND-CCA secure DEM
  • sUF-CMA secure DS

๐‘‡๐ท๐ฟ๐น๐‘ [CMSM11]

  • IND-CCA secure KEM
  • IND-OT secure DEM
  • sUF-CMA secure DS
  • sUF-OT secure MAC

๐‘‡๐ท๐ท๐ผ๐ฟ [NS13]

  • IND-sID-CPA secure ID-based Encryption
  • UF-CMA secure DS
  • sUF-OT secure One-time Signature

Our Construction ๐ผ๐‘‡๐ท

  • The First Lattice-based Construction
  • IND-OT secure DEM

22

To compare lattice-based schemes fairly, we compare our hybrid Signcryption (HSC) scheme with others, because other constructions [CMSM11] are based on the KEM/DEM framework.

slide-23
SLIDE 23

Concrete Existing Constructions

Existing Construction Applied Constructions of Primitives ๐‘‡๐ท๐‘ˆ๐ฟ [CMSM11]

  • Tag-based KEM ([MP12] and [CHKP12])
  • DEM
  • DS ([MP12] and [CHKP12])

๐‘‡๐ท๐ฟ๐น๐‘ [CMSM11]

  • KEM ([MP12] and [BCHK07])
  • DEM
  • DS ([MP12] and [CHKP12])
  • MAC

๐‘‡๐ท๐ท๐ผ๐ฟ [NS13]

  • ID-based Encryption [ABB10]
  • DS [B10]
  • One-time Signature [LM08]

23

[ABB10] S. Agrawal, D. Boneh, X. Boyen, โ€œEfficient lattice (H)IBE in the standard model,โ€ EUROCRYPT 2010. [B10] X. Boyen, โ€œLattice mixing and vanishing trapdoors: A framework for fully secure short signatures and more,โ€ PKC 2010. [CHKP12] D. Cash, D. Hofheinz, E. Kiltz, C. Peikert: โ€œBonsai trees, or how to delegate a lattice basis,โ€ J. Cryptology 2012. [LM08] V. Lyubashevsky, D. Micciancio, โ€œAsymptotically efficient lattice-based digital signatures,โ€ TCC 2008.

slide-24
SLIDE 24

Comparison

24

Construction Receiverโ€™s key size Senderโ€™s key size Ciphertext size Public key Secret key Public key Secret key ๐‘‡๐ท๐‘ˆ๐ฟ 3๐‘œ๐‘› log ๐‘Ÿ + ๐‘œ๐ฟ log ๐‘Ÿ ๐‘œ๐‘›log ๐‘Ÿ log ๐‘’ 3๐‘œ๐‘› log ๐‘Ÿ ๐‘œ๐‘›log ๐‘Ÿ log ๐‘’ ๐‘› + ๐ฟ log ๐‘Ÿ + 3๐‘› log ๐‘’ + โ„“ ๐‘‡๐ท๐ฟ๐น๐‘ 2๐‘œ๐‘› log ๐‘Ÿ + ๐‘œ๐ฟ log ๐‘Ÿ 2๐‘› + ๐ฟ log ๐‘Ÿ + 2๐‘› log ๐‘’ + 2๐‘œlog ๐‘Ÿ + โ„“ ๐‘‡๐ท๐ท๐ผ๐ฟ ๐‘œ๐‘› log ๐‘Ÿ + ๐‘œ๐ฟ log ๐‘Ÿ (Best) ๐‘œ๐‘› log ๐‘Ÿ (Best) 2๐‘› + ๐ฟ log ๐‘Ÿ + ๐‘› log ๐‘’ + โ„“ + |๐‘ค๐‘™| Our Const. ๐ผ๐‘‡๐ท ๐‘› + ๐ฟ log ๐‘Ÿ + 2๐‘› log ๐‘’ + โ„“ ๐‘œ: security parameter, ๐‘Ÿ: a large enough prime, |๐œˆ|: the bit-length of a message ๐‘› = ฮฉ(๐‘œlog ๐‘Ÿ), ๐ฟ: DEMโ€™s symmetric key, ๐‘’ < ๐‘Ÿ: a positive integer |๐‘ค๐‘™|: the bit-lenthg of One-Time Signatureโ€™s verification key size

slide-25
SLIDE 25

Comparison Based on Parameters of [LP11]

25

Comparison of ciphertext Ciphertext-Size (Bit-length) ๐‘‡๐ท๐‘ˆ๐ฟ 5.5 ร— 105 ๐‘‡๐ท๐ฟ๐น๐‘ 5.2 ร— 105 ๐‘‡๐ท๐ท๐ผ๐ฟ 45.3 ร— 105 Our Const. ๐ผ๐‘‡๐ท 4.0 ร— 105 (Best) Parameters Size [bits] ๐‘œ 256 ๐‘Ÿ 4093 ๐‘› 9215 ๐ฟ 512 ๐‘’ 49148 ๐‘ค๐‘™ โ‰ˆ ๐‘œ2log2 ๐‘œ 42.0 ร— 105

[ACF+15] M.R. Albrecht, C. Cid, J. Faug ฦฐ ere, R. Fitzpatrick, L. Perret: โ€œOn the complexity of the BKW algorithm on LWE,โ€ Des. Codes Cryptography 2015. [LP11] R. Lindner, C. Peikert: โ€œBetter ey sizes (and attacks) for LWE-based encryption,โ€ CT-RSA 2011.

Note: We can observe that our construction is best, even if we apply other parameters in [ACF+15].

slide-26
SLIDE 26

Conclusion

We did the following:

  • Proposing a lattice-based construction meeting both MU-

IND-iCCA and MU-sUF-iCMA security;

  • Constructing a hybrid signcryption by combining the

lattice-based construction and an IND-OT secure DEM;

  • Showing that public-key sizes and ciphertext size of the

hybrid signcryption are smaller than those of the existing constructions. 26