Quantum-secure message authentication via blind-unforgeability - - PowerPoint PPT Presentation

quantum secure message authentication via blind
SMART_READER_LITE
LIVE PREVIEW

Quantum-secure message authentication via blind-unforgeability - - PowerPoint PPT Presentation

Quantum-secure message authentication via blind-unforgeability Gorjan Alagic, Christian Majenz, Alexander Russell and Fang Song Eurocrypt 2020, in Cyberspace Introduction Integrity and authenticity Integrity and authenticity It says X


slide-1
SLIDE 1

Quantum-secure message authentication via blind-unforgeability

Gorjan Alagic, Christian Majenz, Alexander Russell and Fang Song

Eurocrypt 2020, in Cyberspace

slide-2
SLIDE 2

Introduction

slide-3
SLIDE 3

Integrity and authenticity

slide-4
SLIDE 4

Integrity and authenticity

  • “It says X on the bottom, but is

this letter really from them?”

slide-5
SLIDE 5

Integrity and authenticity

  • “It says X on the bottom, but is

this letter really from them?”

  • “The letter probably took 5 days

to get here, offering plenty of

  • pportunities for somebody to

change it.”

slide-6
SLIDE 6

Integrity and authenticity

  • “It says X on the bottom, but is

this letter really from them?”

  • “The letter probably took 5 days

to get here, offering plenty of

  • pportunities for somebody to

change it.” Nowadays: digital signature schemes, message authentication codes (MACs).

slide-7
SLIDE 7

Message authentication

slide-8
SLIDE 8

Alice Bob m k k

Message authentication

slide-9
SLIDE 9

Alice Bob m k k

Message authentication

Mac

𝑢

slide-10
SLIDE 10

Alice Bob m k k

Message authentication

Mac

𝑢 𝑢′

m′

… the Internet is a scary place…

m

𝑢

m′

𝑢′

slide-11
SLIDE 11

Alice Bob m k k

Message authentication

Mac

𝑢

Mac

=

? acc/rej

𝑢′

m′

… the Internet is a scary place…

m

𝑢

m′

𝑢′

slide-12
SLIDE 12

Security: UF-CMA

𝐍𝐛𝐝𝑙

m1 t1 m2 t2 … mq tq (m*, t*) Success: i) m* ≠ mi for all i = 1,...,q ii) Mack(m*) = t*

A message authentication code is secure, if no successful forger exists: Definition: Unforgeability under chosen message attacks (UF-CMA)

slide-13
SLIDE 13

Quantum Access Security

Stronger security model: quantum oracle access to :

𝐍𝐛𝐝𝑙

|m⟩|t⟩ ↦ |m⟩|t ⊕ Mack(m)⟩

slide-14
SLIDE 14

Quantum Access Security

Stronger security model: quantum oracle access to :

𝐍𝐛𝐝𝑙

|m⟩|t⟩ ↦ |m⟩|t ⊕ Mack(m)⟩

Why?

slide-15
SLIDE 15

Quantum Access Security

Stronger security model: quantum oracle access to :

𝐍𝐛𝐝𝑙

|m⟩|t⟩ ↦ |m⟩|t ⊕ Mack(m)⟩

Why?

  • As-strong-as-possible security
slide-16
SLIDE 16

Quantum Access Security

Stronger security model: quantum oracle access to :

𝐍𝐛𝐝𝑙

|m⟩|t⟩ ↦ |m⟩|t ⊕ Mack(m)⟩

Why?

  • As-strong-as-possible security
  • Post-quantum Composability
slide-17
SLIDE 17

Quantum Access Security

Stronger security model: quantum oracle access to :

𝐍𝐛𝐝𝑙

|m⟩|t⟩ ↦ |m⟩|t ⊕ Mack(m)⟩

Why?

  • As-strong-as-possible security
  • Post-quantum Composability
  • Physics?
slide-18
SLIDE 18

Quantum Access Security

Stronger security model: quantum oracle access to :

𝐍𝐛𝐝𝑙

|m⟩|t⟩ ↦ |m⟩|t ⊕ Mack(m)⟩

Why?

  • As-strong-as-possible security
  • Post-quantum Composability
  • Physics?

Let’s try UF-”QCMA”

slide-19
SLIDE 19

Quantum Access Security

Stronger security model: quantum oracle access to :

𝐍𝐛𝐝𝑙

Example: i) Query to obtain ii) Measure in the computational basis to obtain for random iii) Output

|m1⟩ = ∑

m∈{0,1}n

|m⟩|0⟩ (m, Mack(m)) m ∑

m∈{0,1}n

|m⟩|Mack(m)⟩ (m, Mack(m))

|m⟩|t⟩ ↦ |m⟩|t ⊕ Mack(m)⟩

Why?

  • As-strong-as-possible security
  • Post-quantum Composability
  • Physics?

Let’s try UF-”QCMA”

slide-20
SLIDE 20

Quantum Access Security

Stronger security model: quantum oracle access to :

𝐍𝐛𝐝𝑙

UF-CMA doesn’t make sense anymore… Example: i) Query to obtain ii) Measure in the computational basis to obtain for random iii) Output

|m1⟩ = ∑

m∈{0,1}n

|m⟩|0⟩ (m, Mack(m)) m ∑

m∈{0,1}n

|m⟩|Mack(m)⟩ (m, Mack(m))

|m⟩|t⟩ ↦ |m⟩|t ⊕ Mack(m)⟩

Why?

  • As-strong-as-possible security
  • Post-quantum Composability
  • Physics?

Let’s try UF-”QCMA”

slide-21
SLIDE 21

Quantum chosen message attacks

What does it mean for a function to be unpredictable against quantum? What is a successful forging adversary?

slide-22
SLIDE 22

Quantum chosen message attacks

What does it mean for a function to be unpredictable against quantum? What is a successful forging adversary? We shouldn’t be worried about: i) Query to obtain ii) Measure in the computational basis to obtain for random iii) Output

m1 = ∑

m∈{0,1}n

|m⟩|0⟩ ∑

m∈{0,1}n

|m⟩|Mack(m)⟩ (m, Mack(m)) m (m, Mack(m))

slide-23
SLIDE 23

Quantum chosen message attacks

What does it mean for a function to be unpredictable against quantum? What is a successful forging adversary? We shouldn’t be worried about: i) Query to obtain ii) Measure in the computational basis to obtain for random iii) Output

m1 = ∑

m∈{0,1}n

|m⟩|0⟩ ∑

m∈{0,1}n

|m⟩|Mack(m)⟩ (m, Mack(m)) m (m, Mack(m))

We should be worried about: key specifies a random periodic function with period , and i) run period finding (a subroutine of Shor’s algorithm) to find ii) output

k fk pk Mack(pk) = 0 Mack(x) = fk(x) ∀x ≠ pk pk (pk,0)

slide-24
SLIDE 24

Quantum problems

𝐍𝐛𝐝𝑙

m1 t1 m2 t2 … mq tq (m*, t*) Success: i) m* ≠ mi for all i = 1,...,q ii) Mack(m*) = t*

slide-25
SLIDE 25

Quantum problems

𝐍𝐛𝐝𝑙

m1 t1 m2 t2 … mq tq (m*, t*) Success: i) m* ≠ mi for all i = 1,...,q ii) Mack(m*) = t*

  • No-cloning principle: can’t keep a transcript
  • Measurement causes disturbance!
slide-26
SLIDE 26

Results

slide-27
SLIDE 27

Our results

  • We study unforgeability under quantum chosen message attacks
  • We propose a new security definition: blind unforgeability (BU)
  • We exhibit a MAC that is secure under a previous definition by Boneh and Zhandry

(Eurocrypt 2013) but clearly broken, and BU-insecure

  • We characterize BU
  • It implies the previous definition
  • Random functions, Lamport signatures are BU secure
  • Hash-and-Mac/Hash-and-Sign preserves BU security for appropriate hash functions
slide-28
SLIDE 28

Boneh Zhandry unforgeability

𝐍𝐛𝐝𝑙

m1 t1 m2 t2 … mq tq (m*

1 , t* 1 ), (m* 2 , t* 2 ), . . . , (m* q+1, t* q+1)

Success: Mack(m*

i ) = t* i ∀i = 1,...,q + 1

Boneh and Zhandry (Eurocrypt 2013) propose: Ask forgeries for queries!

q + 1 q

slide-29
SLIDE 29

Boneh Zhandry unforgeability

𝐍𝐛𝐝𝑙

m1 t1 m2 t2 … mq tq (m*

1 , t* 1 ), (m* 2 , t* 2 ), . . . , (m* q+1, t* q+1)

Success: Mack(m*

i ) = t* i ∀i = 1,...,q + 1

Boneh and Zhandry (Eurocrypt 2013) propose: Ask forgeries for queries!

q + 1 q

Has some nice properties:

  • Equivalent to UF-CMA for classical oracle
  • A random oracle is BZ-unforgeable (BZ ’13)
slide-30
SLIDE 30

The right definition?

Mack(m*

i ) = t* i ∀i = 1,...,q+1

𝐍𝐛𝐝𝑙

m1 t1 m2 t2

mq tq (m*

1 , t* 1 ), (m* 2 , t* 2 ), . . . , (m* q+1, t* q+1)

Success:

slide-31
SLIDE 31

The right definition?

Mack(m*

i ) = t* i ∀i = 1,...,q+1

𝐍𝐛𝐝𝑙

m1 t1 m2 t2

mq tq (m*

1 , t* 1 ), (m* 2 , t* 2 ), . . . , (m* q+1, t* q+1)

Success:

What if…

  • an adversary has to fully measure many queries to generate one forgery? (no-cloning)
slide-32
SLIDE 32

The right definition?

Mack(m*

i ) = t* i ∀i = 1,...,q+1

𝐍𝐛𝐝𝑙

m1 t1 m2 t2

mq tq (m*

1 , t* 1 ), (m* 2 , t* 2 ), . . . , (m* q+1, t* q+1)

Success:

What if…

  • an adversary has to fully measure many queries to generate one forgery? (no-cloning)

space of all messages

forgery comes from here (msg prefix “from the White Rabbit”) all queries supported here (msg prefix “from Alice”)

  • an adversary “queries here, forges there”?
slide-33
SLIDE 33

The right definition?

Mack(m*

i ) = t* i ∀i = 1,...,q+1

𝐍𝐛𝐝𝑙

m1 t1 m2 t2

mq tq (m*

1 , t* 1 ), (m* 2 , t* 2 ), . . . , (m* q+1, t* q+1)

Success:

What if…

  • an adversary has to fully measure many queries to generate one forgery? (no-cloning)

In fact, it seems like it should be easy to find examples like this!

space of all messages

forgery comes from here (msg prefix “from the White Rabbit”) all queries supported here (msg prefix “from Alice”)

  • an adversary “queries here, forges there”?
slide-34
SLIDE 34

The right definition?

Mack(m*

i ) = t* i ∀i = 1,...,q+1

𝐍𝐛𝐝𝑙

m1 t1 m2 t2

mq tq (m*

1 , t* 1 ), (m* 2 , t* 2 ), . . . , (m* q+1, t* q+1)

Success:

What if…

  • an adversary has to fully measure many queries to generate one forgery? (no-cloning)

In fact, it seems like it should be easy to find examples like this!

space of all messages

forgery comes from here (msg prefix “from the White Rabbit”) all queries supported here (msg prefix “from Alice”)

  • an adversary “queries here, forges there”?

is not

slide-35
SLIDE 35

The right definition?

Mack(m*

i ) = t* i ∀i = 1,...,q+1

𝐍𝐛𝐝𝑙

m1 t1 m2 t2

mq tq (m*

1 , t* 1 ), (m* 2 , t* 2 ), . . . , (m* q+1, t* q+1)

Success:

What if…

  • an adversary has to fully measure many queries to generate one forgery? (no-cloning)

In fact, it seems like it should be easy to find examples like this!

space of all messages

forgery comes from here (msg prefix “from the White Rabbit”) all queries supported here (msg prefix “from Alice”)

  • an adversary “queries here, forges there”?

One obstacle: “property finding” cannot be used.

is not

slide-36
SLIDE 36

The right definition?

Mack(m*

i ) = t* i ∀i = 1,...,q+1

𝐍𝐛𝐝𝑙

m1 t1 m2 t2

mq tq (m*

1 , t* 1 ), (m* 2 , t* 2 ), . . . , (m* q+1, t* q+1)

Success:

What if…

  • an adversary has to fully measure many queries to generate one forgery? (no-cloning)

In fact, it seems like it should be easy to find examples like this!

space of all messages

forgery comes from here (msg prefix “from the White Rabbit”) all queries supported here (msg prefix “from Alice”)

  • an adversary “queries here, forges there”?

One obstacle: “property finding” cannot be used.

is not

One-time Mac that’s BZ secure, GYZ (Garg, Yuen&Zhandry, Crypto ’17) insecure, assuming iO (Zhandry, Eurocrypt ’19)

slide-37
SLIDE 37

A MAC that unconditionally “breaks” Boneh-Zhandry:

A concrete example

slide-38
SLIDE 38

A MAC that unconditionally “breaks” Boneh-Zhandry:

A concrete example

Mack

x b

{

m = f1

b(x)

f 0

b(x)

  • random functions
  • for random ,
  • ̂

f i

b : {0,1}n → {0,1}n

f 0

0(x) =

̂ f 0

0(x mod p)

p f1

0 =

̂ f1 f 0

1 = {

0n x = p ̂ f 0

1(x)

else , f1

1 ≡ 0n

slide-39
SLIDE 39

A MAC that unconditionally “breaks” Boneh-Zhandry:

A concrete example

Random periodic function shielded by a random function

𝑐 = 0 𝑐 = 1

Random function punctured at the period

{

Message space

slide-40
SLIDE 40

A MAC that unconditionally “breaks” Boneh-Zhandry:

A concrete example

Simple one-query attack: i) Use period finding to find , “ignoring” ii)

  • utput

p f1 (1p,02n)

Random periodic function shielded by a random function

𝑐 = 0 𝑐 = 1

Random function punctured at the period

{

Message space

slide-41
SLIDE 41

A MAC that unconditionally “breaks” Boneh-Zhandry:

A concrete example

Simple one-query attack: i) Use period finding to find , “ignoring” ii)

  • utput

p f1 (1p,02n)

b = 0 b = 1

Random periodic function shielded by a random function

𝑐 = 0 𝑐 = 1

Random function punctured at the period

{

Message space

slide-42
SLIDE 42

Theorem (AMRS17). There is no efficient quantum algorithm which query

  • nce but output two distinct input-output pairs of

.

Mack Mack

A MAC that unconditionally “breaks” Boneh-Zhandry:

A concrete example

Simple one-query attack: i) Use period finding to find , “ignoring” ii)

  • utput

p f1 (1p,02n)

Random periodic function shielded by a random function

𝑐 = 0 𝑐 = 1

Random function punctured at the period

{

Message space

slide-43
SLIDE 43

Theorem (AMRS17). There is no efficient quantum algorithm which query

  • nce but output two distinct input-output pairs of

.

Mack Mack

A MAC that unconditionally “breaks” Boneh-Zhandry:

A concrete example

Simple one-query attack: i) Use period finding to find , “ignoring” ii)

  • utput

p f1 (1p,02n) Key step: ignorance is necessary

Random periodic function shielded by a random function

𝑐 = 0 𝑐 = 1

Random function punctured at the period

{

Message space

slide-44
SLIDE 44

New approach: Blind Unforgeability (BU)

Problem: how do we define unforgeability vs quantum?

slide-45
SLIDE 45

New approach: Blind Unforgeability (BU)

Problem: how do we define unforgeability vs quantum? A new approach: “blind unforgeability.” Idea: to test a forger…

  • give it the oracle for the MAC, but “blind” it on some inputs;
  • ask the adversary to forge on a blinded spot.
slide-46
SLIDE 46

More formally: for

  • 1. Select

by putting every independently with probability ;

  • 2. Define “blinded” oracle:

Mack Bε ⊂ {0,1}n m ∈ Bε ε 𝐶𝜗Mack : m ↦ { Mack(m) m ∉ 𝐶𝜗 ⊥ m ∈ 𝐶𝜗

New approach: Blind Unforgeability (BU)

Problem: how do we define unforgeability vs quantum? A new approach: “blind unforgeability.” Idea: to test a forger…

  • give it the oracle for the MAC, but “blind” it on some inputs;
  • ask the adversary to forge on a blinded spot.
slide-47
SLIDE 47

More formally: for

  • 1. Select

by putting every independently with probability ;

  • 2. Define “blinded” oracle:

Mack Bε ⊂ {0,1}n m ∈ Bε ε 𝐶𝜗Mack : m ↦ { Mack(m) m ∉ 𝐶𝜗 ⊥ m ∈ 𝐶𝜗

New approach: Blind Unforgeability (BU)

Problem: how do we define unforgeability vs quantum? A new approach: “blind unforgeability.” Idea: to test a forger…

  • give it the oracle for the MAC, but “blind” it on some inputs;
  • ask the adversary to forge on a blinded spot.

Definition (Blind-Unforgeability): A MAC is blind-unforgeable if for every adversary with a quantum oracle for ,

Mack 𝒝 𝐶𝜗Mack ℙ [(m, Mack(m) ← 𝒝BεMack and m ∈ Bε] = negl(n)

slide-48
SLIDE 48

Blind Unforgeability

Does this work?

  • equivalent to UF-CMA in classical setting;

Definition (Blind-Unforgeability): A MAC is blind-unforgeable if for every adversary with a quantum oracle for ,

Mack 𝒝 𝐶𝜗Mack ℙ [(y, Mack(y) ← 𝒝BεMack and y ∈ Bε] = negl(n)

slide-49
SLIDE 49

Blind Unforgeability

Does this work?

  • equivalent to UF-CMA in classical setting;

Definition (Blind-Unforgeability): A MAC is blind-unforgeable if for every adversary with a quantum oracle for ,

Mack 𝒝 𝐶𝜗Mack ℙ [(y, Mack(y) ← 𝒝BεMack and y ∈ Bε] = negl(n)

  • random functions satisfy it;
slide-50
SLIDE 50

Blind Unforgeability

Does this work?

  • equivalent to UF-CMA in classical setting;

Definition (Blind-Unforgeability): A MAC is blind-unforgeable if for every adversary with a quantum oracle for ,

Mack 𝒝 𝐶𝜗Mack ℙ [(y, Mack(y) ← 𝒝BεMack and y ∈ Bε] = negl(n)

  • random functions satisfy it;
  • Implies previous defintion by Boneh and Zhandry;
slide-51
SLIDE 51

Blind Unforgeability

Does this work?

  • equivalent to UF-CMA in classical setting;

Definition (Blind-Unforgeability): A MAC is blind-unforgeable if for every adversary with a quantum oracle for ,

Mack 𝒝 𝐶𝜗Mack ℙ [(y, Mack(y) ← 𝒝BεMack and y ∈ Bε] = negl(n)

1.

  • 1. prepare:

;

  • 2. query
  • 3. measure

Output: for random .

m1 = ∑

m∈{0,1}n

|m⟩|0⟩ (m, BεMack(m)) m

  • classifies the examples we have seen thus far correctly.
  • random functions satisfy it;
  • Implies previous defintion by Boneh and Zhandry;
slide-52
SLIDE 52

Blind Unforgeability

Does this work?

  • equivalent to UF-CMA in classical setting;

Definition (Blind-Unforgeability): A MAC is blind-unforgeable if for every adversary with a quantum oracle for ,

Mack 𝒝 𝐶𝜗Mack ℙ [(y, Mack(y) ← 𝒝BεMack and y ∈ Bε] = negl(n)

1.

  • 1. prepare:

;

  • 2. query
  • 3. measure

Output: for random .

m1 = ∑

m∈{0,1}n

|m⟩|0⟩ (m, BεMack(m)) m

  • classifies the examples we have seen thus far correctly.
  • random functions satisfy it;

Check, e.g., for random functions:

  • if oracle is blinded…

for blinded is independent of post-query state,

  • this adversary fails.

Mack(m) m

  • Implies previous defintion by Boneh and Zhandry;
slide-53
SLIDE 53

Blind Unforgeability

One-query attack: Find period in orange part, forge in olive part.

2.

Random periodic function shielded by a random function

𝑐 = 0 𝑐 = 1

Random function punctured at the period

Definition (Blind-Unforgeability): A MAC is unpredictable if for every adversary with a quantum oracle for ,

Mack 𝒝 𝐶𝜗Mack ℙ [(y, Mack(y) ← 𝒝BεMack and y ∈ Bε] = negl(n)

Does this work?

  • equivalent to UF-CMA in classical setting;
  • classifies the examples we have seen thus far correctly.
  • random functions satisfy it;
  • Implies previous defintion by Boneh and Zhandry;

Definition (Blind-Unforgeability): A MAC is blind-unforgeable if for every adversary with a quantum oracle for ,

Mack 𝒝 𝐶𝜗Mack ℙ [(y, Mack(y) ← 𝒝BεMack and y ∈ Bε] = negl(n)

slide-54
SLIDE 54

Blind Unforgeability

One-query attack: Find period in orange part, forge in olive part.

2.

  • racle is blinded only on few random inputs…
  • so this adversary succeeds!

Check, say for ,

ε = 0.0001

  • is blinded with independent probability

;

(1p,0) ε

  • …post-query state won’t change too much;

Random periodic function shielded by a random function

𝑐 = 0 𝑐 = 1

Random function punctured at the period

Definition (Blind-Unforgeability): A MAC is unpredictable if for every adversary with a quantum oracle for ,

Mack 𝒝 𝐶𝜗Mack ℙ [(y, Mack(y) ← 𝒝BεMack and y ∈ Bε] = negl(n)

Does this work?

  • equivalent to UF-CMA in classical setting;
  • classifies the examples we have seen thus far correctly.
  • random functions satisfy it;
  • Implies previous defintion by Boneh and Zhandry;

Definition (Blind-Unforgeability): A MAC is blind-unforgeable if for every adversary with a quantum oracle for ,

Mack 𝒝 𝐶𝜗Mack ℙ [(y, Mack(y) ← 𝒝BεMack and y ∈ Bε] = negl(n)

slide-55
SLIDE 55

Definition (Blind-Unforgeability): A MAC is blind-unforgeable if for every adversary with a quantum oracle for ,

Mack 𝒝 𝐶𝜗Mack ℙ [(y, Mack(y) ← 𝒝BεMack and y ∈ Bε] = negl(n)

Blind Unforgeability

Additional results:

slide-56
SLIDE 56

Definition (Blind-Unforgeability): A MAC is blind-unforgeable if for every adversary with a quantum oracle for ,

Mack 𝒝 𝐶𝜗Mack ℙ [(y, Mack(y) ← 𝒝BεMack and y ∈ Bε] = negl(n)

Blind Unforgeability

  • Bernoulli-preserving hash function: generalizes collision resistance to quantum,

strengthens collapsingness Additional results:

slide-57
SLIDE 57

Definition (Blind-Unforgeability): A MAC is blind-unforgeable if for every adversary with a quantum oracle for ,

Mack 𝒝 𝐶𝜗Mack ℙ [(y, Mack(y) ← 𝒝BεMack and y ∈ Bε] = negl(n)

Blind Unforgeability

  • Bernoulli-preserving hash function: generalizes collision resistance to quantum,

strengthens collapsingness

  • Hash-and-MAC is BU-secure when using Bernoulli-preserving hash function

Additional results:

slide-58
SLIDE 58

Definition (Blind-Unforgeability): A MAC is blind-unforgeable if for every adversary with a quantum oracle for ,

Mack 𝒝 𝐶𝜗Mack ℙ [(y, Mack(y) ← 𝒝BεMack and y ∈ Bε] = negl(n)

Blind Unforgeability

  • Bernoulli-preserving hash function: generalizes collision resistance to quantum,

strengthens collapsingness

  • Hash-and-MAC is BU-secure when using Bernoulli-preserving hash function
  • A construction of a collapsing hash function based on LWE by Unruh (ASIACRYPT 16) is

actually even Bernoulli-preserving Additional results:

slide-59
SLIDE 59

Definition (Blind-Unforgeability): A MAC is blind-unforgeable if for every adversary with a quantum oracle for ,

Mack 𝒝 𝐶𝜗Mack ℙ [(y, Mack(y) ← 𝒝BεMack and y ∈ Bε] = negl(n)

Blind Unforgeability

  • Bernoulli-preserving hash function: generalizes collision resistance to quantum,

strengthens collapsingness

  • Hash-and-MAC is BU-secure when using Bernoulli-preserving hash function
  • A construction of a collapsing hash function based on LWE by Unruh (ASIACRYPT 16) is

actually even Bernoulli-preserving

  • Lamport signatures are 1-BU in the quantum random oracle model

Additional results:

slide-60
SLIDE 60

Definition (Blind-Unforgeability): A MAC is blind-unforgeable if for every adversary with a quantum oracle for ,

Mack 𝒝 𝐶𝜗Mack ℙ [(y, Mack(y) ← 𝒝BεMack and y ∈ Bε] = negl(n)

Blind Unforgeability

  • Bernoulli-preserving hash function: generalizes collision resistance to quantum,

strengthens collapsingness

  • Hash-and-MAC is BU-secure when using Bernoulli-preserving hash function
  • A construction of a collapsing hash function based on LWE by Unruh (ASIACRYPT 16) is

actually even Bernoulli-preserving

  • Lamport signatures are 1-BU in the quantum random oracle model

Tools: Additional results:

slide-61
SLIDE 61

Definition (Blind-Unforgeability): A MAC is blind-unforgeable if for every adversary with a quantum oracle for ,

Mack 𝒝 𝐶𝜗Mack ℙ [(y, Mack(y) ← 𝒝BεMack and y ∈ Bε] = negl(n)

Blind Unforgeability

  • Bernoulli-preserving hash function: generalizes collision resistance to quantum,

strengthens collapsingness

  • Hash-and-MAC is BU-secure when using Bernoulli-preserving hash function
  • A construction of a collapsing hash function based on LWE by Unruh (ASIACRYPT 16) is

actually even Bernoulli-preserving

  • Lamport signatures are 1-BU in the quantum random oracle model

Tools:

  • A simulation lemma that relates an adversary’s performance in the blinded and

unblinded cases Additional results:

slide-62
SLIDE 62

Definition (Blind-Unforgeability): A MAC is blind-unforgeable if for every adversary with a quantum oracle for ,

Mack 𝒝 𝐶𝜗Mack ℙ [(y, Mack(y) ← 𝒝BεMack and y ∈ Bε] = negl(n)

Blind Unforgeability

  • Bernoulli-preserving hash function: generalizes collision resistance to quantum,

strengthens collapsingness

  • Hash-and-MAC is BU-secure when using Bernoulli-preserving hash function
  • A construction of a collapsing hash function based on LWE by Unruh (ASIACRYPT 16) is

actually even Bernoulli-preserving

  • Lamport signatures are 1-BU in the quantum random oracle model

Tools:

  • A simulation lemma that relates an adversary’s performance in the blinded and

unblinded cases

  • Zhandry’s superposition representation of quantum random oracles

Additional results:

slide-63
SLIDE 63

Summary, open questions

Summary:

  • We exhibit a MAC that is secure according to a definition by Boneh and Zhandry but

allows for an intuitive forgery attack.

  • We propose a replacement definition: Blind Unforgeability
  • Blind unforgeability has a lot of nice properties and classifies all known examples

correctly. Open questions:

  • The security game for blind unforgeability is not natural. Can this be fixed?
  • Are popular schemes (MACs and DSS) blind-unforgeable? We only have NMAC, HMAC

and Lamport in the QROM for now…