More Efficient (Almost) Tightly Secure Structure-Preserving - - PowerPoint PPT Presentation

more efficient almost tightly secure structure preserving
SMART_READER_LITE
LIVE PREVIEW

More Efficient (Almost) Tightly Secure Structure-Preserving - - PowerPoint PPT Presentation

More Efficient (Almost) Tightly Secure Structure-Preserving Signatures Romain Gay 1 Dennis Hofheinz 2 Lisa Kohl 2 Jiaxin Pan 2 1 ENS Paris, France 2 Karlsruhe Institute of Technology, Germany R. Gay, D. Hofheinz, L. Kohl, J. Pan More Efficient


slide-1
SLIDE 1

More Efficient (Almost) Tightly Secure Structure-Preserving Signatures

Romain Gay1 Dennis Hofheinz2 Lisa Kohl2 Jiaxin Pan 2

1 ENS Paris, France 2 Karlsruhe Institute of Technology, Germany

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 1 / 33

slide-2
SLIDE 2

This talk

A structure-preserving signature scheme with

Tighter security (Significantly) shorter signatures: 25 → 14 elements

The core technique can be presented in a simple, algebraic and modular way.

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 2 / 33

slide-3
SLIDE 3

Signature

(pk,sk)

$

← Gen(par) σ

$

← Sign(sk,m) 0/1 ← Ver(pk,m,σ)

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 3 / 33

slide-4
SLIDE 4

Structure-Preserving Signatures (SPS) [AFGHO10]

Pairing groups

G1,G2,GT cyclic groups of prime order q: e ∶ G1 × G2 → GT (Type III) (pk,sk)

$

← Gen(par): pk ∈ Gs (s ∈ {1,2,T}) σ

$

← Sign(sk,m): m ∈ Gs and σ ∈ Gs 0/1 ← Ver(pk,m,σ): Only pairing product equations are allowed.

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 3 / 33

slide-5
SLIDE 5

Applications of SPS

Composition with:

Groth-Sahai NIZK proofs, ElGamal Encryption, ...

Efficient modular design for:

Group signatures, blind signatures, anonymous credentials, ...

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 4 / 33

slide-6
SLIDE 6

Applications of SPS

Composition with:

Groth-Sahai NIZK proofs, ElGamal Encryption, ...

Efficient modular design for:

Group signatures, blind signatures, anonymous credentials, ...

Goal

Construct simple and efficient SPS under standard assumptions.

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 4 / 33

slide-7
SLIDE 7

Applications of SPS

Composition with:

Groth-Sahai NIZK proofs, ElGamal Encryption, ...

Efficient modular design for:

Group signatures, blind signatures, anonymous credentials, ...

Goal

Construct simple and efficient SPS under standard assumptions. Standard assumptions (e.g. DDH/SXDH, DLIN, k-LIN): non-interactive and static assumptions

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 4 / 33

slide-8
SLIDE 8

Important measures of efficiency for SPS

Size of public keys, ∣pk∣ Size of signatures, ∣σ∣ Number of pairing product equations, #PPEs Tightness of security reductions

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 5 / 33

slide-9
SLIDE 9

Important measures of efficiency for SPS

Size of public keys, ∣pk∣ Size of signatures, ∣σ∣ Number of pairing product equations, #PPEs Tightness of security reductions

Affects the key length recommendation

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 5 / 33

slide-10
SLIDE 10

Tight security [BBM00,Coron00]

Adversary Reduction Adversary Reduction Adversary Reduction with success ratio with success ratio ρ ∶= ε

t

ρ′ ∶= ε′

t′ = ρ/L

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 6 / 33

slide-11
SLIDE 11

Tight security [BBM00,Coron00]

Adversary Reduction Adversary Reduction Adversary Reduction with success ratio with success ratio ρ ∶= ε

t

ρ′ ∶= ε′

t′ = ρ/L

This work: t′ = O(t)

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 6 / 33

slide-12
SLIDE 12

Tight security [BBM00,Coron00]

Adversary Reduction Adversary Reduction Adversary Reduction with success ratio with success ratio ρ ∶= ε

t

ρ′ ∶= ε′

t′ = ρ/L

This work: t′ = O(t) Tight security: L = “small” (e.g. L = O(λ), or O(log Q), or O(1)) Non-tight security: L = Ω(Q) λ: security parameter Q ∶= poly(λ) < 2λ ⇒ log Q < λ

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 6 / 33

slide-13
SLIDE 13

Example: Why tightness?

Adversary Reduction Adversary Reduction Adversary Reduction with success ratio with success ratio ρ ∶= ε

t< 2−80

ρ′ ∶= ε′

t′ = ρ/L< 2−110

Tight security: L = 1 Non-tight security: for example, L = #signing queries = 230

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 7 / 33

slide-14
SLIDE 14

State-of-the-Art: Tightness and Efficiency

Schemes Security loss Signature size text [HJ12] O(1) O(λ) text [AHNOP17] O(λ) 25 [JR17] O(Qlog Q) 6 [KPW15] O(Q2) 7 [LPY15] O(Q) 11 [ACDKNO12] O(Q) 11 ⋮ ⋮ ⋮ Tight

Non-tight

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 8 / 33

slide-15
SLIDE 15

State-of-the-Art: Tightness, and Efficiency

Schemes Security loss Signature size text [HJ12] O(1) O(λ) text [AHNOP17] O(λ) 25 text [JOR18] O(λ) 17 This work O(log Q) 14 [JR17] O(Qlog Q) 6 [KPW15] O(Q2) 7 [LPY15] O(Q) 11 [ACDKNO12] O(Q) 11 ⋮ ⋮ ⋮ Tight

Non-tight

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 9 / 33

slide-16
SLIDE 16

This Work

Algebraic MAC → SPS The core component: an efficient tightly secure message authentication code (MAC)

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 10 / 33

slide-17
SLIDE 17

This Work

Algebraic MAC → SPS The core component: an efficient tightly secure message authentication code (MAC) The resulting SPS has better performance:

shorter signatures shorter public keys less pairing product equations tighter security

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 10 / 33

slide-18
SLIDE 18

Our Technique

One-time MAC

(private-key, information-theoretically secure, SP) Motivated by the adaptive partioning technique ([Hof17], [GHK17])

Many-time MAC

(SP)

private-key ↦ public-key via pairings SPS

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 11 / 33

slide-19
SLIDE 19

Our Technique

One-time MAC

(private-key, information-theoretically secure, SP)

This talk Many-time MAC

(SP)

private-key ↦ public-key via pairings

(Similar to [BKP14,KPW15])

SPS

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 12 / 33

slide-20
SLIDE 20

Signature vs. MAC

Signature ▷ (pk,sk)

$

← Gen(par) ▷ σ

$

← Sign(sk,m) ▷ 0/1 ← Ver(pk,m,σ) MAC ▷ (pk,sk)

$

← GenMAC(par) ▷ τ

$

← Tag(sk,m) ▷ 0/1 ← Ver(pk,sk,m,τ)

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 13 / 33

slide-21
SLIDE 21

Security of Signature

Challenger (pk,sk)

$

← Gen pk mi σi

$

← Sign(sk,mi) Q queries σi (m∗,σ∗) Adversary wins: Ver(pk,m∗,σ∗) = 1 ∧m∗ ∉ {m1,...,mQ} Adversary

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 14 / 33

slide-22
SLIDE 22

Security of MAC

Challenger (pk,sk)

$

← GenMAC pk mi τi

$

← Tag(sk,mi) Q queries τi (m∗,τ ∗) Adversary wins: Ver(sk,m∗,τ ∗) = 1 ∧m∗ ∉ {m1,...,mQ} Adversary

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 15 / 33

slide-23
SLIDE 23

For our MAC

Challenger (pk,sk)

$

← GenMAC pk mi τi

$

← Tag(sk,mi) Q queries $ (m∗,τ ∗) Adversary wins: Ver(sk,m∗,τ ∗) = 1 ∧m∗ ∉ {m1,...,mQ} Adversary

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 15 / 33

slide-24
SLIDE 24

Implicit Notation

Let a ∈ Zp, [a]s ∶= aPs ∈ Gs

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 16 / 33

slide-25
SLIDE 25

Implicit Notation

Let a ∈ Zp, [a]s ∶= aPs ∈ Gs Let A = ⎛ ⎜ ⎝ a11 ... a1m ⋱ an1 ... anm ⎞ ⎟ ⎠ ∈ Zn×m

p

, [A]s ∶= ⎛ ⎜ ⎝ a11Ps ... a1mPs ⋱ an1Ps ... anmPs ⎞ ⎟ ⎠ ∈ Gn×m

s

, where s ∈ {1,2,T}.

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 16 / 33

slide-26
SLIDE 26

One-time MAC

▸GenMAC ∶ sk ∶= x0

$

← Z1+n

p

x0 ▸Tag(sk,[m]1) ∶ τ ∶= [(1,m⊺)x0]1 ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

2-wise independent hash

▸Ver(sk,[m]1,σ) ∶ τ ? = [(1,m)]1x0 1 ∣ m x0

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 17 / 33

slide-27
SLIDE 27

One-time ↝ Many-time MAC

▸GenMAC ∶ sk ∶= (x0

$

← Z1+n

p

,x

$

← Z2k

p )

x0 ▸Tag(sk,[m]1) ∶ τ ∶= [(1,m⊺)x0]1 ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

2-wise independent hash

+ Random ▸Ver(sk,[m]1,σ) ∶ τ ? = [(1,m)]1x0 1 ∣ m x0

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 18 / 33

slide-28
SLIDE 28

The Core Idea (Simplified Version)

t = A0 r u = t⊺ x where A0 ∈ Z2k×k

p

.

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 19 / 33

slide-29
SLIDE 29

The Core Idea (Simplified Version)

t = A0 r u = t⊺ x where A0 ∈ Z2k×k

p

. ([t0],[u0]),...,([tQ−1],[uQ−1])

≈c

([t0],[$0]),...,([tQ−1],[$Q−1]).

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 19 / 33

slide-30
SLIDE 30

The Core Idea (Simplified Version)

t = A0 r u = t⊺ x where A0 ∈ Z2k×k

p

. Real: {([ti],[t⊺

i x])}1≤i≤Q

≈c

Rand: {([ti],[t⊺

i xi ])}1≤i≤Q

where xi

$

← Z2k

p .

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 20 / 33

slide-31
SLIDE 31

The Core Idea (Simplified Version)

t = A0 s u = t⊺ x where A0 ∈ Z2k×k

p

. texttexttexttext x texttexttexttext texttexttexttext x0 x1 x2 ... abc xℓ

(ℓ = Q − 1)

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 21 / 33

slide-32
SLIDE 32

In generation of [ui]

texttexttexttext x a

c

t x0

,

x1

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 22 / 33

slide-33
SLIDE 33

(Advanced) Simple Facts

Let A0,A1

$

← Z2k×k

p

, and v0,v1

$

← Zk

p

Full-rank Kernel matrices, A

0,A 1 ∈ Z2k×k p

: A⊺

0A 0 = 0 = A⊺ 1A 1

Fact 1: v = (A

0∣A 1)(v0

v1) is random. Fact 2: Let t ∈ Span(A0) t⊺(x + A

0v0) = t⊺x

Fact 3: {Span([A0])} ≈c {Span([A1])} by the Decisional Diffie-Hellman assumption.

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 23 / 33

slide-34
SLIDE 34

Our Goal

texttexttexttext x a

c

t x0

,

x1

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 24 / 33

slide-35
SLIDE 35

Intuition

Switch ti (Fact 3)

i = 0...: ti = A0r i = 1...: ti = A1r

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 25 / 33

slide-36
SLIDE 36

Intuition

Switch ti (Fact 3)

i = 0...: ti = A0r i = 1...: ti = A1r

Rewrite the vector x (Fact 1) x ∶= (A

0∣A 1)

v0 v1

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 25 / 33

slide-37
SLIDE 37

Intuition

Switch ti (Fact 3)

i = 0...: ti = A0r i = 1...: ti = A1r

Rewrite the vector x (Fact 1) x ∶= (A

0∣A 1)

v0 v1 Introduce new randomness (w/o change adversaries’ view, by Fact 2) x0 ∶= (A

0∣A 1)

r0 v1 x1 ∶= (A

0∣A 1)

v0 r1

i = 0...: ti⊺x0 = ti⊺x i = 1...: ti⊺x1 = ti⊺x

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 25 / 33

slide-38
SLIDE 38

Overview of log Q Loops

x x1 x11 ⋮ xQ−1 xQ−2 ⋮ .. .. x10 ⋮ .. .. ⋮ .. .. x0 x01 ⋮ .. .. ⋮ .. .. x00 ⋮ x3 x2 ⋮ x1 x0

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 26 / 33

slide-39
SLIDE 39

Overview of log Q Loops

x x1 x11 ⋮ xQ−1 xQ−2 ⋮ .. .. x10 ⋮ .. .. ⋮ .. .. x0 x01 ⋮ .. .. ⋮ .. .. x00 ⋮ x3 x2 ⋮ x1 x0

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 27 / 33

slide-40
SLIDE 40

Overview of log Q Loops

x x1 x11 ⋮ xQ−1 xQ−2 ⋮ .. .. x10 ⋮ .. .. ⋮ .. .. x0 x01 ⋮ .. .. ⋮ .. .. x00 ⋮ x3 x2 ⋮ x1 x0

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 28 / 33

slide-41
SLIDE 41

After log Q Loops

x x1 x11 ⋮ xQ−1 xQ−2 ⋮ .. .. x10 ⋮ .. .. ⋮ .. .. x0 x01 ⋮ .. .. ⋮ .. .. x00 ⋮ x3 x2 ⋮ x1 x0

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 29 / 33

slide-42
SLIDE 42

Our MAC

GenMAC(par)

A0,A1

$

← D2k,k // A0,A1 ∈ Z2k×k

p

x0

$

← Zn+1

p

, x

$

← Z2k

p

crs

$

← GenNIZK(par) Return sk ∶= ([A0],[A1],x0,x,crs)

Tag(sk,[m] ∈ Gn) ∶ // i-th query (1 ≤ i ≤ Q)

t = A0s for s

$

← Zp u = (1,m⊺)x0+ t⊺x

π proves that “t ∈ Span(A0)” or “t ∈ Span(A1)”

// [R´ afols15] Return τ ∶= ([t],[u],π)

Ver(sk,[m∗],τ ∗ ∶= ([t∗,u∗],π∗))

u∗ ? = (1,m∗⊺)x0 + t∗⊺x Check π∗

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 30 / 33

slide-43
SLIDE 43

Our SPS

Gen(par)

A0,A1

$

← D2k,k, B

$

← Dk+1,k // A0,A1 ∈ Z2k×k

p

,B ∈ Z(k+1)×k

p

X0

$

← Z(n+1)×(k+1)

p

, X

$

← Z2k×(k+1)

p

crs

$

← GenNIZK(par) sk ∶= (X0,X,crs) pk ∶= ([A0]1,[A1]1,[B]2[X0B]2,[XB]2,crs) Return (pk,sk)

Sign(sk,[m]1 ∈ Gn

1) ∶

// i-th query (1 ≤ i ≤ Q)

t = A0s ∈ Z2k

p

for s

$

← Zp u = (1,m⊺)X0 + t⊺X ∈ Z1×(k+1)

p

π proves that “t ∈ Span(A0)” or “t ∈ Span(A1)” Return σ ∶= ([t]1,[u]1,π)

Ver(pk,[m∗]1,σ∗ ∶= ([t∗,u∗]1,π∗))

u∗B ? = (1,m∗⊺)X0B + t∗⊺XB via pairings Check π∗

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 31 / 33

slide-44
SLIDE 44

Comparison

Scheme ∣σ∣ ∣pk∣ #PPEs

  • Sec. loss

Assumption ACDKNO12 11 n1 + 17 4 Q SXDH, XDLIN LPY15 11 2n1 + 21 5 O(Q) SXDH, XDLIN KPW15 7 n1 + 6 3 2Q2 SXDH JR17 6 n1 + 6 2 Q log Q SXDH HJ12 10λ + 6 13 O(λ) 8 DLIN AHNOP17 25 n1 + 29 15 80λ SXDH JOR18 17 n1 + 23 7 116λ SXDH Ours 14 n1 + 11 6 6 log Q SXDH

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 32 / 33

slide-45
SLIDE 45

Summary

More efficient tightly secure SPS with

− shorter ∣σ∣ and ∣pk∣ − Less pairing product equations and security loss

The core component: structure-preserving, pseudorandom MAC with tight security reductions. (A

0∣A 1)

r0 v1 , (A

0∣A 1)

v0 r1

Open problems

Tightly secure SPS with shorter signature size? Tightly secure and compact IBE from our partially affine MAC?

  • R. Gay, D. Hofheinz, L. Kohl, J. Pan

More Efficient Tightly Secure SPS 33 / 33