limitations on transformations from composite order to
play

Limitations on Transformations from Composite-Order to Prime-Order - PowerPoint PPT Presentation

Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures Sarah Meiklejohn (UC San Diego) Hovav Shacham (UC San Diego) David Mandell Freeman (Stanford University) 1 Elliptic curves:


  1. Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures Sarah Meiklejohn (UC San Diego) Hovav Shacham (UC San Diego) David Mandell Freeman (Stanford University) 1

  2. Elliptic curves: what are they and why do we care? Bilinear groups are cyclic groups G of some finite order that admit a nondegenerate bilinear map e: G × G → G T • Bilinear: e(x a ,y) = e(x,y) a = e(x,y a ), nondegenerate: e(x,y) = 1 for all y ⇔ x = 1 • Composite order: |G| = N (often use N = pq), prime order: |G| = p 2

  3. Elliptic curves: what are they and why do we care? Bilinear groups are cyclic groups G of some finite order that admit a nondegenerate bilinear map e: G × G → G T • Bilinear: e(x a ,y) = e(x,y) a = e(x,y a ), nondegenerate: e(x,y) = 1 for all y ⇔ x = 1 • Composite order: |G| = N (often use N = pq), prime order: |G| = p 3

  4. Elliptic curves: what are they and why do we care? Bilinear groups are cyclic groups G of some finite order that admit a nondegenerate bilinear map e: G × G → G T • Bilinear: e(x a ,y) = e(x,y) a = e(x,y a ), nondegenerate: e(x,y) = 1 for all y ⇔ x = 1 • Composite order: |G| = N (often use N = pq), prime order: |G| = p Historically, we use elliptic curves for two main reasons: • Functionality: IBE [BF01], functional encryption, etc. • Efficiency: discrete log problem is harder, can use smaller parameters 4

  5. Outline 5

  6. Outline Divide the talk into three main parts: 5

  7. Outline Divide the talk into three main parts: • The setting: work in composite-order bilinear groups 5

  8. Outline Divide the talk into three main parts: • The setting: work in composite-order bilinear groups • The application: a round-optimal blind signature scheme 5

  9. Outline Divide the talk into three main parts: • The setting: work in composite-order bilinear groups • The application: a round-optimal blind signature scheme • The problem: what if we want to instantiate our scheme in a prime-order setting instead? 5

  10. The setting: composite-order groups • Cyclic groups G and G T of order N = pq, G = G p × G q but p,q are secret • Bilinear map e: G × G → G T • Often use the subgroup hiding assumption: element of G q indistinguishable from an element of G • This setting has proved to be quite useful: 6

  11. The setting: composite-order groups • Cyclic groups G and G T of order N = pq, G = G p × G q but p,q are secret • Bilinear map e: G × G → G T • Often use the subgroup hiding assumption: element of G q indistinguishable from an element of G • This setting has proved to be quite useful: “somewhat” homomorphic encryption [BGN05] 6

  12. The setting: composite-order groups • Cyclic groups G and G T of order N = pq, G = G p × G q but p,q are secret • Bilinear map e: G × G → G T • Often use the subgroup hiding assumption: element of G q indistinguishable from an element of G • This setting has proved to be quite useful: traitor “somewhat” tracing homomorphic [BSW06] zero knowledge encryption [GOS06,GS08] group [BGN05] signatures predicate [BW07] ring encryption signatures HIBE [KSW08] [SW07] [LW10] 6

  13. The setting: composite-order groups • Cyclic groups G and G T of order N = pq, G = G p × G q but p,q are secret • Bilinear map e: G × G → G T • Often use the subgroup hiding assumption: element of G q indistinguishable from an element of G • This setting has proved to be quite useful: traitor “somewhat” tracing homomorphic [BSW06] zero knowledge encryption [GOS06,GS08] group [BGN05] signatures blind predicate [BW07] signatures ring encryption [MSF10] signatures HIBE [KSW08] [SW07] [LW10] 6

  14. Composite- vs. prime-order groups 7

  15. Composite- vs. prime-order groups Why would we switch to prime-order groups? 7

  16. Composite- vs. prime-order groups Why would we switch to prime-order groups? • Composite-order means bigger : in prime-order groups, can use group of size ~160 bits; in composite-order groups need ~1024 bits (discrete log vs. factoring) • In addition, there aren’t many composite-order curve families (need to use supersingular vs. ordinary curves) 7

  17. Composite- vs. prime-order groups Why would we switch to prime-order groups? • Composite-order means bigger : in prime-order groups, can use group of size ~160 bits; in composite-order groups need ~1024 bits (discrete log vs. factoring) • In addition, there aren’t many composite-order curve families (need to use supersingular vs. ordinary curves) Previously, people converted schemes in an ad-hoc way [W09,GSW09,LW10] Freeman [F10] is first to provide a general conversion method 7

  18. The application: round-optimal blind signatures 8

  19. The application: round-optimal blind signatures Signatures: user U obtains a signature σ on a message m from a signer S 8

  20. The application: round-optimal blind signatures Signatures: user U obtains a signature σ on a message m from a signer S 8

  21. The application: round-optimal blind signatures Signatures: user U obtains a signature σ on a message m from a signer S m 8

  22. The application: round-optimal blind signatures Signatures: user U obtains a signature σ on a message m from a signer S m σ 8

  23. The application: round-optimal blind signatures Signatures: user U obtains a signature σ on a message m from a signer S m σ In a blind signature scheme [Ch82], user gets this signature without the signer learning which message it signed! 8

  24. The application: round-optimal blind signatures Signatures: user U obtains a signature σ on a message m from a signer S m σ In a blind signature scheme [Ch82], user gets this signature without the signer learning which message it signed! req 8

  25. The application: round-optimal blind signatures Signatures: user U obtains a signature σ on a message m from a signer S m σ In a blind signature scheme [Ch82], user gets this signature without the signer learning which message it signed! req σ ´ 8

  26. The application: round-optimal blind signatures Signatures: user U obtains a signature σ on a message m from a signer S m σ In a blind signature scheme [Ch82], user gets this signature without the signer learning which message it signed! req σ σ ´ 8

  27. The application: round-optimal blind signatures Signatures: user U obtains a signature σ on a message m from a signer S m σ In a blind signature scheme [Ch82], user gets this signature without the signer learning which message it signed! req σ σ ´ Same σ as in the unblinded case above 8

  28. The application: round-optimal blind signatures Signatures: user U obtains a signature σ on a message m from a signer S m σ In a blind signature scheme [Ch82], user gets this signature without the signer learning which message it signed! req σ σ ´ Same σ as in the unblinded case above Applications: electronic cash, anonymous credentials, etc. 8

  29. The application: round-optimal blind signatures Signatures: user U obtains a signature σ on a message m from a signer S m σ In a blind signature scheme [Ch82], user gets this signature without the signer learning which message it signed! req σ σ ´ Same σ as in the unblinded case above Applications: electronic cash, anonymous credentials, etc. Still a very active research area [O06,F09,AO10,AHO10,R10,GRSSU11] 8

  30. Our scheme: ideas 9

  31. Our scheme: ideas Simple construction (inspired by [BW06]): combine Waters signature [W07] with Groth-Sahai zero-knowledge proofs [GS08] 9

  32. Our scheme: ideas Simple construction (inspired by [BW06]): combine Waters signature [W07] with Groth-Sahai zero-knowledge proofs [GS08] Recap of Groth-Sahai setting: 9

  33. Our scheme: ideas Simple construction (inspired by [BW06]): combine Waters signature [W07] with Groth-Sahai zero-knowledge proofs [GS08] Recap of Groth-Sahai setting: e: G × G → G T 9

  34. Our scheme: ideas Simple construction (inspired by [BW06]): combine Waters signature [W07] with Groth-Sahai zero-knowledge proofs [GS08] Recap of Groth-Sahai setting: e: G × G → G T τ ↓ ................. E: B × B → B T 9

  35. Our scheme: ideas Simple construction (inspired by [BW06]): combine Waters signature [W07] with Groth-Sahai zero-knowledge proofs [GS08] Recap of Groth-Sahai setting: e: G × G → G T τ ↓ ................. E: B × B → B T • Abstract assumption: B = B 1 × B 2 , where B 1 is indistinguishable from B • Subgroup hiding: set B = G = G p × G q 9

  36. Our scheme: ideas Simple construction (inspired by [BW06]): combine Waters signature [W07] with Groth-Sahai zero-knowledge proofs [GS08] Recap of Groth-Sahai setting: e: G × G → G T τ ↓ ................. E: B × B → B T • Abstract assumption: B = B 1 × B 2 , where B 1 is indistinguishable from B • Subgroup hiding: set B = G = G p × G q • DLIN: rank 2 matrix ~ rank 3 matrix for a 3 × 3 matrix over F p 9

  37. Our scheme: ideas Simple construction (inspired by [BW06]): combine Waters signature [W07] with Groth-Sahai zero-knowledge proofs [GS08] Recap of Groth-Sahai setting: e: G × G → G T τ ↓ ................. E: B × B → B T • Abstract assumption: B = B 1 × B 2 , where B 1 is indistinguishable from B • Subgroup hiding: set B = G = G p × G q • DLIN: rank 2 matrix ~ rank 3 matrix for a 3 × 3 matrix over F p • Benefits: can use composite- and prime-order settings 9

  38. Our scheme: sketch 10

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend