Project in Computer Security at Technion
Pairing-based Short Signatures
Final Presentation
Amit Markel Leonid Nemirovskiy
- Supervisor. Barukh Ziv
26/10/2014
Pairing-based Short Signatures Final Presentation Amit Markel - - PowerPoint PPT Presentation
Project in Computer Security at Technion Pairing-based Short Signatures Final Presentation Amit Markel Leonid Nemirovskiy Supervisor . Barukh Ziv 26 / 10 / 2014 Introduction Introduction / abstract Recent progress in research and
26/10/2014
Introduction / abstract
Technion - Israel Institute of Technology. 26/10/2014
public key cryptography motivates us to investigate the field.
solved in sub exponential time, thus we benefit from the same level of security such as one would achieve using RSA.
signatures, hence noticeably reducing expensive network traffic load in terms of power and transmission time, as well as storage size requirements in favor of computation complexity.
Introduction / shorter signatures
Technion - Israel Institute of Technology. 26/10/2014
quest of improvement. One of the most important vectors in this pursuit is the signature length, on which we focus our attention.
(approximates to 1024-bit RSA),
to 2048-bit RSA).
signatures (320 bits), for security level of 80 bits. (1024 bits for RSA).
Introduction / elliptic curves & pairings
Technion - Israel Institute of Technology. 26/10/2014
necessary - otherwise data loss or cryptographic strength reduction occurs.
groups - this is due to the required algebraic properties.
Introduction / optimizations
Technion - Israel Institute of Technology. 26/10/2014
short signatures.
interfaces in terms of usage and comprehension.
than results presented on some articles.
Theoretical background / elliptic curves
Technion - Israel Institute of Technology. 26/10/2014
prime, achieving an equation of the form: E : Y 2 = X3 + aX + b where a, b ∈ Fq, and we also use an extension of the curve with the same a, b ∈ Fqα for an appropriate α.
the curve s.t. it is an additive group. Then one works with points as ordinary group under defined operations.
Theoretical background / projective coordinates
Technion - Israel Institute of Technology. 26/10/2014
and addition of two distinct points - adding.
differently with an additional dimension in order to replace such heavy computations with other operations, as follows. (x, y) → (X, Y, Z) s.t. x = X Z2, y = Y Z3. We convert standard coordinates to projective by setting Z = 1.
Theoretical background / scalar multiplication
Technion - Israel Institute of Technology. 26/10/2014
different binary representations (such as non-adjacent form, NAF), as well as precomputing fixed-point data to by far reduce many smaller instructions.
eliminate the doubling operations.
Theoretical background / pairing
Technion - Israel Institute of Technology. 26/10/2014
e : G1 × G2 → GT where (G1, G2) is a pair of elliptic curve cyclic groups and GT is an ordinary number cyclic group - this is a necessary condition for satisfying a pairing’s algebraic properties.
more efficient Tate pairing.
Theoretical background / Diffie-Hellman
Technion - Israel Institute of Technology. 26/10/2014
easy solution to DDH, yet keeping CDH hardness;
same level of security as long ones.
Our short signature algorithm / global parameters
Technion - Israel Institute of Technology. 26/10/2014
points of order p which we precompute.
Our short signature algorithm / key generation
Technion - Israel Institute of Technology. 26/10/2014
Algorithm 1. Key Generation NO IN P U T. OU T P U T.
P R I V A T E K E Y x ∈ Zp, P U B L I C K E Y V ∈ G2.
1. Set x ← random integer in Zp, 2. Set V ← xQ. 3. Output (x, V).
Our short signature algorithm / sign
Technion - Israel Institute of Technology. 26/10/2014
Algorithm 2. Sign IN P U T.
P R I V A T E K E Y x ∈ Zp, M E S S A G E M ∈ {0, 1}∗.
OU T P U T.
S I G N A T U R E s ∈ Fq.
1. Set S ←
1 H(m)+xP.
2. Output x-coordinate of S.
Our short signature algorithm / verify
Technion - Israel Institute of Technology. 26/10/2014
Algorithm 3. Verify IN P U T.
P U B L I C K E Y V ∈ G2, M E S S A G E M ∈ {0, 1}∗, S I G N A T U R E s ∈ Fq.
OU T P U T.
S I G N A T U R E V A L I D I T Y.
1. Try (Compute y in Fq such that (s, y) on E) If Invalid (Output INVALID). 2. Set S ← (s, y). 3. If (order of S) = p then (a) Output INVALID. 4. Set precomputed Ω ←
. 5. Output (Test if e (S, H (m) Q + V) in Ω).
Implementation / overview
Technion - Israel Institute of Technology. 26/10/2014
Mac UNIX 03 conforming system, having four 2.8 GHz Intel i7 cores. Library simplicity. Example. 1. MNT ec; 2. ShortSignature ss(ec,true); 3. ZZ_p signature = ss.sign("Pi");
Implementation / performance
Technion - Israel Institute of Technology. 26/10/2014
Base field MNT Extended Barreto & Naehring (160 bits) (1020 bits) (1920 bits) Addition 4.110ns 46.209ns 145.739ns Doubling 3.447ns 40.269ns 129.832ns Scalar mult 0.783ms 11.221ms 33.175ms .. (fixed point) − 3.732ms 11.417ms Random point 37.008ns 49.428ms 0.332s
Implementation / performance (2)
Technion - Israel Institute of Technology. 26/10/2014
We compared two approaches for the Tate pairing: Miller’s algorithm based and via faster Elliptic Nets. MNT Barreto & Naehring (170 bits) (160 bits) Initialization 0.246s 0.799s Tate-Miller 59.939ms 333.708ms Tate-Nets 6.963ms 29.578ms Key generation 3.956ms 11.714ms Sign 0.539ms 0.488ms Verify 11.126ms 41.932ms
computing Tate pairing via elliptic nets, using similar comparable parameters, takes about 130ms, in contrast to our 29.578 ms time.
Conclusions / our algorithm modifications
Technion - Israel Institute of Technology. 26/10/2014
as well denominator accumulating, for reducing division
underlying group with two different ones, along with pre-computation of various constant pairing values for enhanced speedups.
strategy by adding an additional step in lieu of using a default exponentiation in the final stage.