On the Memory-Tightness of Hashed ElGamal Ashrujit Ghoshal Stefano - - PowerPoint PPT Presentation

โ–ถ
on the memory tightness of hashed elgamal
SMART_READER_LITE
LIVE PREVIEW

On the Memory-Tightness of Hashed ElGamal Ashrujit Ghoshal Stefano - - PowerPoint PPT Presentation

On the Memory-Tightness of Hashed ElGamal Ashrujit Ghoshal Stefano Tessaro University of Washington University of Washington Eurocrypt 2020 Security reductions assumption scheme P S ElGamal, Cramer-Shoup, ECDSA, RSA-OAEP CDH,


slide-1
SLIDE 1

On the Memory-Tightness of Hashed ElGamal

Ashrujit Ghoshal

University of Washington

Stefano Tessaro

University of Washington

Eurocrypt 2020

slide-2
SLIDE 2

Security reductions

๐ต ๐ถ = ๐‘†!

P

assumption

S

scheme CDH, DDH, DL, factoring โ€ฆ ElGamal, Cramer-Shoup, ECDSA, RSA-OAEP โ‹ฏ

โžฏ โžฏ

Reduction ๐‘†

slide-3
SLIDE 3

Security reductions

๐ถ = ๐‘†! ๐ต

advantage ๐œ!

โžฏ

Reduction ๐‘†

time ๐‘ข! advantage ๐œ" time ๐‘ข"

slide-4
SLIDE 4

Tight reductions Goal: tightness โŸน ๐‘ข! โ‰ˆ ๐‘ข", ๐œ! โ‰ˆ ๐œ"

๐ถ = ๐‘†! ๐ต

โžฏ

Time is not the only important resource!

Reduction ๐‘†

advantage ๐œ! time ๐‘ข! advantage ๐œ" time ๐‘ข"

slide-5
SLIDE 5

Security reductions: memory perspective [ACFK17]

๐ถ = ๐‘†! ๐ต

โžฏ

Reduction ๐‘†

advantage ๐œ! time ๐‘ข! advantage ๐œ" time ๐‘ข" memory ๐‘›! memory ๐‘›"

slide-6
SLIDE 6

Memory-tight reductions [ACFK17] Goal: memory-tightness โŸน ๐‘›! โ‰ˆ ๐‘›"

๐ถ = ๐‘†! ๐ต

Common proof technique: ๐‘›! small โ‡’ memory-tight reduction

โžฏ

Reduction ๐‘† ๐‘›" = ๐‘›# + ๐‘›! uses memory ๐‘›!

memory ๐‘›! memory ๐‘›"

slide-7
SLIDE 7

Motivation: more memory โŸน faster solution

Discrete logarithm (DL) in prime fields Goal: security wrt adversary with time 2#$%, memory 2&%

70 160

log(memory) log(time)

156 78 2048

secure not secure memory-tight ๐‘†": time 2#$%, memory 2&% non-memory-tight ๐‘†": time 2#$%, memory 2#$%

slide-8
SLIDE 8

Can we always make a reduction memory-tight?

slide-9
SLIDE 9

This talk: certain reductions cannot be memory-tight, provably

  • mUFCMA to UFCMA

[ACFK17]

  • mCRt to CRt

[ACFK17,WMHT18]

  • mU-mOW to mU-OW

[WMHT18]

Hashed ElGamal

Hashed ElGamal used in practice eg. SECG SEC-1, ISO/IEC 18033-2, IEEE 1363a and ANSI X9.63

Prior work Here

generic concrete scheme

slide-10
SLIDE 10

Hashed ElGamal KEM

Gen Encap Decap ๐‘ž๐‘™ โ† ๐‘•$%, ๐‘ก๐‘™

๐‘ž๐‘™

๐ท โ† ๐‘•&, ๐ฟ โ† ๐ผ(๐‘ž๐‘™&)

(๐‘ก๐‘™, ๐ท) ๐ฟ โ† ๐ผ ๐ท'(

KEM-CCA security โ‰ก Oracle Diffie-Hellman assumption [ABR `01]

Group ๐”ฟ, generator ๐‘•, order ๐‘ž

๐‘ฃ โ†

$ โ„ค*

slide-11
SLIDE 11

Oracle Diffie-Hellman assumption (ODH)

๐‘•+, ๐‘•,, ๐ฟ- ๐ธ, ๐‘

๐‘ฌ๐’˜

๐‘โ€ฒ Pr ๐‘ = ๐‘. = 1 2 + negl ๐ธ, ๐‘ = A๐ผ ๐‘, if ๐‘ โ‰  ๐‘•+ โŠฅ

  • therwise

๐‘ฃ, ๐‘ค โ†

$ โ„ค*

๐ฟ% โ† ๐ผ ๐‘•+, , ๐ฟ# โ†

$

0,1 /012 ๐‘ โ†

$ {0,1}

slide-12
SLIDE 12

ODH in the random oracle model

๐‘•+, ๐‘•,, ๐ฟ- ๐ธ, ๐‘

๐‘ฌ๐’˜

๐‘โ€ฒ ๐ผ ๐‘Œ

๐‘ฐ

random oracle

SDH โŸน ODH [ABR โ€˜01]

๐‘ฃ, ๐‘ค โ†

$ โ„ค*

๐ฟ% โ† ๐ผ ๐‘•+, , ๐ฟ# โ†

$

0,1 /012 ๐‘ โ†

$ {0,1}

๐ธ, ๐‘ = A๐ผ ๐‘, if ๐‘ โ‰  ๐‘•+ โŠฅ

  • therwise

Pr ๐‘ = ๐‘. = 1 2 + negl

slide-13
SLIDE 13

๐‘•+, ๐‘•, ๐‘ƒ, ๐‘Œ, ๐‘

๐‘ท๐’˜

๐‘Ž ๐‘ƒ, ๐‘Œ, ๐‘ = A1 if ๐‘ = ๐‘Œ, 0 otherwise ๐‘ฃ, ๐‘ค โ†

$ โ„ค*

Pr ๐‘Ž = ๐‘•+, = negl

Strong Diffie-Hellman assumption (SDH) (aka gap-DH)

slide-14
SLIDE 14

Strong Diffie-Hellman (SDH) โŸน ODH [ABR โ€˜01]

  • Theorem. ODH-adversary using memory ๐‘›!โŸน

SDH-adversary using memory ๐‘›" ๐‘›" = ๐‘›! + ๐‘ƒ(๐‘Ÿ# + ๐‘Ÿ$)

# ๐ผ queries # ๐ธ( queries n

  • t

m e m

  • r

y

  • t

i g h t !

slide-15
SLIDE 15

SDHโ‡’ODH: the reduction

๐‘•+, ๐‘•, ๐‘•+, ๐‘•,, ๐ฟ ๐ธ,(๐‘

3)

๐ผ(๐‘Œ3) Fix: use ๐‘ท๐’˜ oracle

๐ต ๐‘†

๐ฟ โ†

$ 0,1 /012

๐’€ ๐‘ฐ(๐’€) ๐‘Œ# ๐’ ๐‘ฌ๐’˜(๐’) ๐‘

#

Main Problem: Consistency! ๐ผ ๐‘# = ๐ธ#(๐‘)

๐‘Œ3 ๐‘

3

slide-16
SLIDE 16

SDHโ‡’ODH: the reduction- ๐ธ# queries

๐‘•+, ๐‘•, ๐‘•+, ๐‘•,, ๐ฟ ๐ธ,(๐‘

3)

๐ต ๐‘†

๐ฟ โ†

$ 0,1 /012

๐’€ ๐‘ฐ(๐’€) ๐‘Œ# ๐ผ(๐‘Œ#) ๐‘Œ3 ๐ผ ๐‘Œ3 โ‹ฎ โ‹ฎ ๐’ ๐‘ฌ๐’˜(๐’) ๐‘

#

๐ธ, ๐‘

#

๐‘ท๐’˜

๐‘ƒ,(๐‘Œ#, ๐‘

3)

๐‘ƒ,(๐‘Œ3, ๐‘

3)

1 ๐‘

3

๐ผ ๐‘Œ3

๐‘ท๐’˜

๐‘ƒ! ๐‘Œ, ๐‘ ๐‘Œ! =

? ๐‘

slide-17
SLIDE 17

SDHโ‡’ODH: the reduction- ๐ผ queries

๐‘•+, ๐‘•, ๐‘•+, ๐‘•,, ๐ฟ ๐ผ(๐‘Œ3)

๐ต ๐‘†

๐ฟ โ†

$ 0,1 /012

๐’€ ๐‘ฐ(๐’€) ๐‘Œ# ๐ผ(๐‘Œ#) ๐’ ๐‘ฌ๐’˜(๐’) ๐‘

#

๐ธ, ๐‘

#

๐‘

3

๐ธ, ๐‘

3

โ‹ฎ โ‹ฎ

๐‘ท๐’˜

๐‘ƒ,(๐‘Œ3, ๐‘

#)

๐‘ƒ,(๐‘Œ3, ๐‘

3)

1 ๐‘ƒ,(๐‘•+, ๐‘Œ3) ๐‘ƒ, ๐‘•+, ๐‘Œ3 = 1 โ‡’ return ๐‘Œ3 ๐‘Œ3 ๐ธ, ๐‘

3

๐‘ท๐’˜

๐‘ƒ! ๐‘Œ, ๐‘ ๐‘Œ! =

? ๐‘

slide-18
SLIDE 18

Main theorem

  • Theorem. โˆ€๐‘™ โˆƒ๐‘ƒ(๐‘™)-query ODH-adv ๐ตโˆ— s.t.
  • Adv๐”ฟ

ODH ๐ตโˆ— โ‰ˆ 1 ,

  • โˆ€ PPT black-box reductions ๐‘† using memory ๐‘›,

Adv๐”ฟ SDH ๐‘†"โˆ— = nonโˆ’negl โ‡’ ๐‘› = ฮฉ(๐‘™ log ๐‘ž) .

Issue: For which groups ๐”ฟ? DL easy in ๐”ฟ โ‡’ memory tight ๐‘† Resolution: ๐‘† only makes black-box access to the group โ‡’ generic group model

inefficient

slide-19
SLIDE 19

Main theorem

  • Theorem. In the generic group model, โˆ€๐‘™ โˆƒO(๐‘™)-query ODH-

adv ๐ตโˆ— s.t.

  • AdvODH ๐ตโˆ— โ‰ˆ 1 ,
  • โˆ€ PPT black-box reductions ๐‘† using memory ๐‘›,

AdvSDH ๐‘†!โˆ— = nonโˆ’negl โ‡’ ๐‘› = ฮฉ(๐‘™ log ๐‘ž) .

no rewinding!

๐‘•!

forwarding

๐ตโˆ— ๐‘†

slide-20
SLIDE 20

Main theorem

  • Theorem. In the generic group model, โˆ€๐‘™ โˆƒO(๐‘™)-

query ODH-adv ๐ตโˆ— s.t.

  • AdvODH ๐ตโˆ— โ‰ˆ 1 ,
  • โˆ€ PPT restricted black-box reductions ๐‘† using

memory ๐‘›, AdvSDH ๐‘†"โˆ— = nonโˆ’negl โ‡’ ๐‘› = ฮฉ(๐‘™ log ๐‘ž) .

slide-21
SLIDE 21

Constructing ๐ตโˆ—

๐‘ท๐’˜

โ‹ฎ

Force ๐‘† to complete memory- intensive task brute force to break ODH

  • utput

random bit R fails R succeeds

โ‹ฎ

Intuition: ๐ตโˆ— is useful to ๐‘† only if ๐‘† accomplishes memory-intensive task

๐ตโˆ— ๐‘†

slide-22
SLIDE 22

Adversary ๐ตโˆ— ๐ตโˆ— ๐‘†

๐ธ, query ๐‘•<! ๐‘’# ๐ธ, query

โ‹ฎ

๐ผ query โ„Ž# ๐‘•,โ‹…<" ! ๐ผ query โ„Ž( ๐‘•,โ‹…<" #

โ‹ฎ

Answers consistent?

  • utput random bit

break ODH by brute force yes no ๐‘•+, ๐‘•,, ๐ฟ ๐‘’( ๐‘’? < = โ„Ž< โˆ€ ๐‘— โˆˆ [๐‘™] ๐‘—#, ๐‘—3, โ‹ฏ , ๐‘—( โ†

$ โ„ค*

๐œŒ โ†

$ ๐‘‡(

Recall: ๐ธ, ๐‘ = ๐ผ(๐‘,) ๐‘•<#

slide-23
SLIDE 23

Proof setting ๐ตโˆ— ๐‘†& ๐‘†'

๐œŒ โ†

$ ๐‘‡(

๐ผ queries โ‹ฎ โ‹ฎ ๐ธ, queries ๐‘› bits

๐‘ท๐’˜

Generic group

  • racle
slide-24
SLIDE 24

Generic group model [Shoup 97, Maurer 05]

Generic group

  • racle

๐œ ๐‘ฆ , ๐œ ๐‘ง ๐œ(๐‘ฆ + ๐‘ง) ๐œ ๐‘ฆ , ๐œ ๐‘ง ๐‘ง =

? ๐‘ค โ‹… ๐‘ฆ

๐‘ท๐’˜

๐œ: โ„ค# โ†’ 0,1 $ ๐‘ฆ โˆˆ โ„ค#: ๐œ ๐‘ฆ โ‰œ ๐‘•%

slide-25
SLIDE 25

Repeat queries- 1 ๐‘†& ๐‘†'

โ‹ฎ

๐‘ท๐’˜

Generic group

  • racle

๐’ƒ๐Ÿ ๐’ƒ๐’ โ‹ฎ ๐’„๐Ÿ ๐’„๐’ (โˆ—, ๐’ƒ๐’Œ) (๐’ƒ๐’‹,โˆ—)

Generic group

  • racle

๐œ ๐‘ฆ , ๐œ ๐‘ง ๐œ(๐‘ฆ + ๐‘ง) ๐œ ๐‘ฆ , ๐œ ๐‘ง ๐‘ง =

? ๐‘ค โ‹… ๐‘ฆ

๐‘ท๐’˜

repeat queries

slide-26
SLIDE 26

Repeat queries- 2 ๐‘†& ๐‘†'

โ‹ฎ

๐‘ท๐’˜

Generic group

  • racle

๐’ƒ๐Ÿ ๐’ƒ๐’ โ‹ฎ ๐’„๐Ÿ ๐’„๐’ (โˆ—, ๐’…) ๐’… ( ๐’… , โˆ— )

Generic group

  • racle

๐œ ๐‘ฆ , ๐œ ๐‘ง ๐œ(๐‘ฆ + ๐‘ง) ๐œ ๐‘ฆ , ๐œ ๐‘ง ๐‘ง =

? ๐‘ค โ‹… ๐‘ฆ

๐‘ท๐’˜

repeat queries

slide-27
SLIDE 27

Proof overview

(๐‘†#, ๐‘†3) answer consistently Many > (

E% repeat queries

Few โ‰ค (

E% repeat queries

Need ๐’ = ๐›(๐’ ๐ฆ๐ฉ๐ก ๐ช): intuitive, proof by compression argument, many subtleties Winning adversary against the permutation game Advantage negligible

๐‘†" ๐‘†# โ‹ฎ ๐’ƒ๐Ÿ ๐’ƒ๐’ โ‹ฎ ๐’„๐Ÿ ๐’„๐’

๐‘› bits

slide-28
SLIDE 28

The reductionโ€™s perspective

๐ตโˆ—

๐‘†" ๐‘†# ๐œŒ โ†

$ ๐‘‡%

โ‹ฎ โ‹ฎ

๐‘ท๐’˜ Generic group

  • racle

๐‘†& needs to figure out ๐œŒ for consistent answers

โ†’Use ๐‘ƒ# oracle!

slide-29
SLIDE 29

Using the ๐‘ƒ# oracle

๐‘ท๐’˜ ๐‘†3 ๐‘ƒ,(๐’ƒ๐’‹, ๐’„๐’Œ) ๐œŒ ๐‘˜ =

? ๐‘—

๐‘ท๐’˜ ๐‘†#

๐‘ƒ, ๐’ƒ๐Ÿ

H!๐’ƒ๐Ÿ‘

  • H. โ‹ฏ ๐’ƒ๐’

H#, ๐’„๐Ÿ J!๐’„๐Ÿ‘

  • J. โ‹ฏ ๐’„๐’

J#

๐‘ฆ?(#)๐‘ฆ?(3) โ‹ฏ ๐‘ฆ?(() =

? ๐‘ง#๐‘ง3 โ‹ฏ ๐‘ง(

Permutation game captures exactly this setting, combinatorially

๐‘†" ๐‘†# โ‹ฎ ๐’ƒ๐Ÿ ๐’ƒ๐’ โ‹ฎ ๐’„๐Ÿ ๐’„๐’

๐’ƒ๐† ๐’‹

๐’˜

= ๐’„๐’‹

slide-30
SLIDE 30

Permutation game (PG)

๐‘ƒ(๐‘ฆ โˆˆ โ„ค*

(, ๐‘ง โˆˆ โ„ค* ()

๐œŒโ€ฒ ๐‘ƒ ๐‘ฆ, ๐‘ง = A1 if ๐‘ฆ?(#)๐‘ฆ?(3) โ‹ฏ ๐‘ฆ? ( = ๐‘ง#๐‘ง3 โ‹ฏ ๐‘ง( 0 otherwise. ๐œŒ โ†

$ ๐‘‡(

AdvPG ๐ต = Pr[๐œŒ. = ๐œŒ] ๐‘ท

Lemma: If (๐‘ฆ', ๐‘ง'),โ‹ฏ,(๐‘ฆ(, ๐‘ง() are the queries by ๐ต that return 1 and rank ๐‘ฆ', โ‹ฏ , ๐‘ฆ( โ‰ค

) *+ , then,

AdvPG ๐ต = negl .

๐ต

๐‘†#, ๐‘†3 make few repeat queries โ‡’ ๐ต of this form that wins PG if (๐‘†#, ๐‘†3) answer consistently ๐‘ฆ = ๐‘ฆ#๐‘ฆ3 โ‹ฏ ๐‘ฆ( ๐‘ง = ๐‘ง#๐‘ง3 โ‹ฏ ๐‘ง(

slide-31
SLIDE 31

Conclusions

  • Impossibility result for a scheme with algebraic structure
  • Impossibility result can be โ€œbypassedโ€
  • Memory-tight reduction in the Algebraic Group Model [FKL18]

Adv sends a representation of the group elements for every query

  • Concurrent work [Bhattacharya 20] complements our result

Different Hashed ElGamal variant, pairings

slide-32
SLIDE 32

Open problems

  • Memory lower bound for rewinding ๐‘†?

Our conjecture: ๐‘› = ฮฉ(๐‘™ log ๐‘™)

  • Separation for โ€œmemory-adaptiveโ€ reduction?
  • Memory lower bound for concrete schemes without the generic

group model?

  • Memory lower bounds for other concrete schemes?
slide-33
SLIDE 33