Signature Schemes with Efficient Protocols and Dynamic Group - - PowerPoint PPT Presentation

signature schemes with efficient protocols and dynamic
SMART_READER_LITE
LIVE PREVIEW

Signature Schemes with Efficient Protocols and Dynamic Group - - PowerPoint PPT Presentation

Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions Benot Libert 1 , 2 San Ling 3 Fabrice Mouhartem 1 Khoa Nguyen 3 Huaxiong Wang 3 1 .N.S. de Lyon, France 2 CNRS, France 3 Nanyang Technological


slide-1
SLIDE 1

Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions

Benoît Libert1,2 San Ling3 Fabrice Mouhartem1 Khoa Nguyen3 Huaxiong Wang3

1É.N.S. de Lyon, France 2CNRS, France 3Nanyang Technological University, Singapore

Asiacrypt, Hanoi, 06/12/2016

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 1/30

slide-2
SLIDE 2

Privacy-Preserving Cryptography

Important Goal: Anonymous authentication.

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 2/30

slide-3
SLIDE 3

Privacy-Preserving Cryptography

Important Goal: Anonymous authentication. e.g. e-voting, e-cash, group signatures, anonymous credentials. . .

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 2/30

slide-4
SLIDE 4

Privacy-Preserving Cryptography

Important Goal: Anonymous authentication. e.g. e-voting, e-cash, group signatures, anonymous credentials. . . Ingredients

◮ A signature scheme ◮ Zero-knowledge (ZK) proofs

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 2/30

slide-5
SLIDE 5

Privacy-Preserving Cryptography

Important Goal: Anonymous authentication. e.g. e-voting, e-cash, group signatures, anonymous credentials. . . Ingredients

◮ A signature scheme ◮ Zero-knowledge (ZK) proofs compatible with this signature

(no hash functions)

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 2/30

slide-6
SLIDE 6

Privacy-Preserving Cryptography

Important Goal: Anonymous authentication. e.g. e-voting, e-cash, group signatures, anonymous credentials. . . Ingredients

◮ A signature scheme ◮ Zero-knowledge (ZK) proofs compatible with this signature

(no hash functions)

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 2/30

slide-7
SLIDE 7

Group Signatures

A user wants to take public transportations.

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 3/30

slide-8
SLIDE 8

Group Signatures

A user wants to take public transportations. timestamp

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 3/30

slide-9
SLIDE 9

Group Signatures

A user wants to take public transportations. signature

◮ Authenticity & Integrity

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 3/30

slide-10
SLIDE 10

Group Signatures

A user wants to take public transportations. signature

???

◮ Authenticity & Integrity ◮ Anonymity

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 3/30

slide-11
SLIDE 11

Group Signatures

A user wants to take public transportations. signature

???

◮ Authenticity & Integrity ◮ Anonymity ◮ Dynamicity

Join

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 3/30

slide-12
SLIDE 12

Group Signatures

A user wants to take public transportations. signature

◮ Authenticity & Integrity ◮ Anonymity ◮ Dynamicity

Join

◮ Traceability

POLICE

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 3/30

slide-13
SLIDE 13

Motivation

Dynamic group signatures

In dynamic group signatures, new group members can be introduced at any time. The dynamic group setting:

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 4/30

slide-14
SLIDE 14

Motivation

Dynamic group signatures

In dynamic group signatures, new group members can be introduced at any time. The dynamic group setting:

◮ Add users without re-running the Setup phase;

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 4/30

slide-15
SLIDE 15

Motivation

Dynamic group signatures

In dynamic group signatures, new group members can be introduced at any time. The dynamic group setting:

◮ Add users without re-running the Setup phase; ◮ Even if everyone, including authorities, is dishonest, no one

can sign in your name;

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 4/30

slide-16
SLIDE 16

Motivation

Dynamic group signatures

In dynamic group signatures, new group members can be introduced at any time. The dynamic group setting:

◮ Add users without re-running the Setup phase; ◮ Even if everyone, including authorities, is dishonest, no one

can sign in your name;

◮ Most use cases require dynamic groups (e.g., anonymous

access control in buildings).

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 4/30

slide-17
SLIDE 17

Anonymous Credentials (Chaum’85, Camenisch-Lysyanskya’01)

Principle (e.g., U-Prove, Idemix)

Involves Authority, Users and Verifiers.

◮ User dynamically obtains credentials from an authority under a

pseudonym (= commitment to a digital identity)

◮ . . . and can dynamically prove possession of credentials using

different (unlinkable) pseudonyms

Different flavors: one-show/multi-show credentials, attribute-based access control,. . .

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 5/30

slide-18
SLIDE 18

Anonymous Credentials (Chaum’85, Camenisch-Lysyanskya’01)

Principle (e.g., U-Prove, Idemix)

Involves Authority, Users and Verifiers.

◮ User dynamically obtains credentials from an authority under a

pseudonym (= commitment to a digital identity)

◮ . . . and can dynamically prove possession of credentials using

different (unlinkable) pseudonyms

Different flavors: one-show/multi-show credentials, attribute-based access control,. . . General construction from signature with efficient protocols:

◮ Authority gives a user a signature on a committed message; ◮ User proves that same secret underlies different pseudonyms; ◮ User proves that he possesses a message-signature pair.

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 5/30

slide-19
SLIDE 19

Signature with Efficient Protocols

Signature Scheme with Efficient Protocols

(Camenisch-Lysyanskya, SCN’02)

Signer Message Signature Message Verifier Sign Verify

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 6/30

slide-20
SLIDE 20

Signature with Efficient Protocols

Signature Scheme with Efficient Protocols

(Camenisch-Lysyanskya, SCN’02)

Signer Message Signature Message Verifier Sign Verify Open

◮ Protocol for signing committed messages

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 6/30

slide-21
SLIDE 21

Signature with Efficient Protocols

Signature Scheme with Efficient Protocols

(Camenisch-Lysyanskya, SCN’02)

Signer Message Signature Message Verifier ZKPoK Sign Verify PoK Open

◮ Protocol for signing committed messages ◮ Proof of Knowledge (PoK) of (Message; Signature)

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 6/30

slide-22
SLIDE 22

Lattice-Based Cryptography

Lattice

A lattice is a discrete subgroup of Rn. Can be seen as integer linear combinations of a finite set of vectors.

Λ(b1, . . . , bn) =

  • i≤n aibi | ai ∈ Z
  • Fabrice Mouhartem

Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 7/30

slide-23
SLIDE 23

Lattice-Based Cryptography

Lattice

A lattice is a discrete subgroup of Rn. Can be seen as integer linear combinations of a finite set of vectors.

Λ(b1, . . . , bn) =

  • i≤n aibi | ai ∈ Z
  • Why?

◮ Simple and efficient; ◮ Still conjectured quantum-resistant; ◮ Connection between average-case

and worst-case problems;

◮ Powerful functionalities (e.g., FHE).

→ Finding a non-zero short vector in a lattice is hard.

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 7/30

slide-24
SLIDE 24

Hardness Assumptions: SIS and LWE

Parameters: n dimension, m ≥ n, q modulus. For A ← ֓ U(Zm×n

q

):

Small Integer Solution Learning With Errors x

A

= 0 [q]

A

m n

, A

s +e

s ← ֓ Zn

q

e small error

Goal: Given A ∈ Zm×n

q

, find x ∈ Zm\{0} small Goal: Given

  • A , A s + e
  • ,

find s ∈ Zn

q

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 8/30

slide-25
SLIDE 25

Group Signatures: History

1991 Chaum and van Heyst: introduction 2000 Ateniese, Camenisch, Joye and Tsudik: first scalable solution 2003 Bellare, Micciancio and Warinschi: model for static groups

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 9/30

slide-26
SLIDE 26

Group Signatures: History

1991 Chaum and van Heyst: introduction 2000 Ateniese, Camenisch, Joye and Tsudik: first scalable solution 2003 Bellare, Micciancio and Warinschi: model for static groups 2004 Kiayias and Yung: model for dynamic groups 2004 Bellare, Shi and Zhang: model for dynamic groups

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 9/30

slide-27
SLIDE 27

Group Signatures: History

1991 Chaum and van Heyst: introduction 2000 Ateniese, Camenisch, Joye and Tsudik: first scalable solution 2003 Bellare, Micciancio and Warinschi: model for static groups 2004 Kiayias and Yung: model for dynamic groups 2004 Bellare, Shi and Zhang: model for dynamic groups 2010 Gordon, Katz and Vaikuntanathan: first lattice-based scheme 2013 Laguillaumie, Langlois, Libert and Stehlé: log-size signatures from lattices

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 9/30

slide-28
SLIDE 28

Group Signatures: History

1991 Chaum and van Heyst: introduction 2000 Ateniese, Camenisch, Joye and Tsudik: first scalable solution 2003 Bellare, Micciancio and Warinschi: model for static groups 2004 Kiayias and Yung: model for dynamic groups 2004 Bellare, Shi and Zhang: model for dynamic groups 2010 Gordon, Katz and Vaikuntanathan: first lattice-based scheme 2013 Laguillaumie, Langlois, Libert and Stehlé: log-size signatures from lattices

No dynamic group signature scheme based on lattices

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 9/30

slide-29
SLIDE 29

Outline

Introduction Anonymous Credentials and Group Signatures Motivations Intuition Our Constructions Conclusion

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 10/30

slide-30
SLIDE 30

Signature with Efficient Protocols (CL’02)

A signature scheme (Keygen, Signsk, Verifvk) with protocols:

◮ Sign a committed value; ◮ Prove possession of a signature.

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 11/30

slide-31
SLIDE 31

Signature with Efficient Protocols (CL’02)

A signature scheme (Keygen, Signsk, Verifvk) with protocols:

◮ Sign a committed value; ◮ Prove possession of a signature.

Security

◮ Unforgeability; ◮ Security of the two protocols; ◮ Anonymity.

→ many applications for privacy-based protocols.

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 11/30

slide-32
SLIDE 32

Signature with Efficient Protocols (CL’02)

A signature scheme (Keygen, Signsk, Verifvk) with protocols:

◮ Sign a committed value; ◮ Prove possession of a signature.

Security

◮ Unforgeability; ◮ Security of the two protocols; ◮ Anonymity.

→ many applications for privacy-based protocols.

Existing constructions rely on Strong RSA assumption or bilinear maps.

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 11/30

slide-33
SLIDE 33

Dynamic Group Signature

Dynamic Group Signature

It is a tuple of algorithms (Setup, Join, Sign, Verify, Open) acting according to their names.

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 12/30

slide-34
SLIDE 34

Dynamic Group Signature

Dynamic Group Signature

It is a tuple of algorithms (Setup, Join, Sign, Verify, Open) acting according to their names.

◮ Setup:

Input: security parameter λ, bound on group size N Output: public parameters Y, group manager’s secret key SGM, the opening authority’s secret key SOA;

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 12/30

slide-35
SLIDE 35

Dynamic Group Signature

Dynamic Group Signature

It is a tuple of algorithms (Setup, Join, Sign, Verify, Open) acting according to their names.

◮ Join: interactive protocols between Ui ⇄ GM. Provide

(certi, seci) to Ui. Where certi attests the secret seci. Update the user list along with the certificates;

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 12/30

slide-36
SLIDE 36

Dynamic Group Signature

Dynamic Group Signature

It is a tuple of algorithms (Setup, Join, Sign, Verify, Open) acting according to their names.

◮ Sign and Verify proceed in the obvious way; ◮ Open:

Input: OA’s secret SOA, M and Σ Output: i.

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 12/30

slide-37
SLIDE 37

Security

Three security notions

◮ Anonymity: only OA can open a signature;

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 13/30

slide-38
SLIDE 38

Security

Three security notions

◮ Anonymity: only OA can open a signature; ◮ Traceability (= security of honest GM against users):

no coalition of malicious users can create a signature that cannot be traced to one of them;

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 13/30

slide-39
SLIDE 39

Security

Three security notions

◮ Anonymity: only OA can open a signature; ◮ Traceability (= security of honest GM against users):

no coalition of malicious users can create a signature that cannot be traced to one of them;

◮ Non-frameability (= security of honest members):

colluding GM and OA cannot frame honest users.

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 13/30

slide-40
SLIDE 40

Outline

Introduction Anonymous Credentials and Group Signatures Motivations Intuition Our Constructions Conclusion

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 14/30

slide-41
SLIDE 41

Signature with Efficient Protocols

Based on a variant of Boyen’s signature (PKC’10)

Given A ∈ Zn×m

q

and { Ai }ℓ

i=0 ∈ Zn×m q

, the signature is a small d ∈ Z2m s.t. A A0 + ℓ

j=1 mjAj

· d = 0 [q]. The private key is a short TA ∈ Zm×m s.t. A · TA = 0 [q].

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 15/30

slide-42
SLIDE 42

Signature with Efficient Protocols

Based on a variant of Boyen’s signature (PKC’10)

Given A ∈ Zn×m

q

and { Ai }ℓ

i=0 ∈ Zn×m q

, the signature is a small d ∈ Z2m s.t. A A0 + ℓ

j=1 mjAj

· d = 0 [q]. The private key is a short TA ∈ Zm×m s.t. A · TA = 0 [q].

(A modification of) Böhl et al.’s variant (Eurocrypt’13)

τ ← U({0, 1}ℓ), D and u are public, m ∈ {0, 1}2m encodes Msg. A A0 + ℓ

j=1 τjAj

· d = u + D · m [q]. → σ = (τ, d)

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 15/30

slide-43
SLIDE 43

Our Signature with Efficient Protocols

To sign M ∈ {0, 1}2m:

◮ Sample random τ ∈ {0, 1}ℓ

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 16/30

slide-44
SLIDE 44

Our Signature with Efficient Protocols

To sign M ∈ {0, 1}2m:

◮ Sample random τ ∈ {0, 1}ℓ, random s ∈ DZ2m,˜ σ ◮ Compute CM = D0 · s + D1 · M ∈ Z2n q

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 16/30

slide-45
SLIDE 45

Our Signature with Efficient Protocols

To sign M ∈ {0, 1}2m:

◮ Sample random τ ∈ {0, 1}ℓ, random s ∈ DZ2m,˜ σ ◮ Compute CM = D0 · s + D1 · M ∈ Z2n q ◮ Using TA, sample a short d s.t. n 2m

A A0 + ℓ

j=1 τj · Aj

d = u + D bin(CM) (∗) Σ = (τ, d , s) ∈ {0, 1}ℓ × Z2m × Z2m To verify: check that d is short and that Σ satisfies (∗).

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 16/30

slide-46
SLIDE 46

Our Signature with Efficient Protocols

Kawachi et al.’s commitment (Asiacrypt’08): CM = D0 · s + D1 · M Is already embedded in Böhl et al. signature.

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 17/30

slide-47
SLIDE 47

Our Signature with Efficient Protocols

Kawachi et al.’s commitment (Asiacrypt’08): CM = D0 · s + D1 · M Is already embedded in Böhl et al. signature. Difficulty: In the proof, for one of the queries, the signature has a different distribution.

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 17/30

slide-48
SLIDE 48

Our Signature with Efficient Protocols

Kawachi et al.’s commitment (Asiacrypt’08): CM = D0 · s + D1 · M Is already embedded in Böhl et al. signature. Difficulty: In the proof, for one of the queries, the signature has a different distribution. Solution: Use Rényi divergence instead of statistical distance to bound adversary’s advantage [BLLSS15]. Ra(P||Q) =

  • x∈Supp(P)

P(x)a Q(x)a−1

1/(a−1)

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 17/30

slide-49
SLIDE 49

Our Signature with Efficient Protocols

Kawachi et al.’s commitment (Asiacrypt’08): CM = D0 · s + D1 · M Is already embedded in Böhl et al. signature. Difficulty: In the proof, for one of the queries, the signature has a different distribution. Solution: Use Rényi divergence instead of statistical distance to bound adversary’s advantage [BLLSS15]. Ra(P||Q) =

  • x∈Supp(P)

P(x)a Q(x)a−1

1/(a−1) Probability Preservation: Q(A) P(A)

a a−1 /Ra(P||Q) Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 17/30

slide-50
SLIDE 50

Our Signature with efficient protocols

Kawachi et al. commitment (Asiacrypt’08):

For D0, D1 ∈ Z2n×2m

q

, s ← ֓ DZ2m,σ, M ∈ {0, 1}2m CM = D0 · s + D1 · M [q] Compatible with Stern’s protocol (Crypto’93, [LNSW; PKC’13]) = ⇒ ZK proof compatible with the signature

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 18/30

slide-51
SLIDE 51

Stern’s Protocol (Crypto’93)

Stern’s protocol: a ZK proof for Syndrome Decoding Problem.

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 19/30

slide-52
SLIDE 52

Stern’s Protocol (Crypto’93)

Stern’s protocol: a ZK proof for Syndrome Decoding Problem.

Syndrome Decoding Problem

Given P ∈ Zn×m

2

and v ∈ Zn

2, find x s.t. w( x ) = w and

P

m n

x = v mod 2

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 19/30

slide-53
SLIDE 53

Stern’s Protocol (Crypto’93)

Stern’s protocol: a ZK proof for Syndrome Decoding Problem.

Syndrome Decoding Problem

Given P ∈ Zn×m

2

and v ∈ Zn

2, find x s.t. w( x ) = w and

P

m n

x = v mod 2 [KTX08]: mod 2 → mod q [LNSW13]: Extend Stern’s protocol for SIS and LWE statements Recent uses of Stern-like protocols in lattice-based crypto: [LNW15, LLNW16, LLNMW16]

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 19/30

slide-54
SLIDE 54

Unified Framework using Stern’s Protocol

Problem: protocols using Stern’s proofs build them “from scratch”. [LNW15, LLNW16]

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 20/30

slide-55
SLIDE 55

Unified Framework using Stern’s Protocol

Problem: protocols using Stern’s proofs build them “from scratch”. [LNW15, LLNW16] Provide a framework to construct ZKAoK:

◮ to prove knowledge of an x ∈ {−1, 0, 1}n of a special form

verifying P · x = v mod q

◮ many lattice statements reduce to this ◮ this captures various and complex statements Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 20/30

slide-56
SLIDE 56

Unified Framework using Stern’s Protocol

Problem: protocols using Stern’s proofs build them “from scratch”. [LNW15, LLNW16] Provide a framework to construct ZKAoK:

◮ to prove knowledge of an x ∈ {−1, 0, 1}n of a special form

verifying P · x = v mod q

◮ many lattice statements reduce to this ◮ this captures various and complex statements

◮ that uses [LNSW13]’s decomposition-extension framework and

is combinatoric in Stern’s protocol manner

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 20/30

slide-57
SLIDE 57

From Static to Dynamic

◮ Designed from a recent static group signature proposed by

Ling, Nguyen and Wang [LNW15];

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 21/30

slide-58
SLIDE 58

From Static to Dynamic

◮ Designed from a recent static group signature proposed by

Ling, Nguyen and Wang [LNW15];

◮ Non-frameability requires to introduce non-homogeneous

terms in the SIS relations satisfied by membership certificates;

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 21/30

slide-59
SLIDE 59

From Static to Dynamic

◮ Designed from a recent static group signature proposed by

Ling, Nguyen and Wang [LNW15];

◮ Non-frameability requires to introduce non-homogeneous

terms in the SIS relations satisfied by membership certificates;

◮ Other solutions [LLLS13, NZZ15] use membership certificates

made of a complete basis. . . . . . which is problematic with non-homogeneous terms (would give too much freedom to group members).

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 21/30

slide-60
SLIDE 60

From Static to Dynamic

Difficulties (1/2)

◮ Separate the secrets between OA and GM;

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 22/30

slide-61
SLIDE 61

From Static to Dynamic

Difficulties (1/2)

◮ Separate the secrets between OA and GM; ◮ Bind the user’s secret zi to a unique public syndrome

vi = F · zi ∈ Z4n

q for some matrix F ∈ Z4n×4m q

;

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 22/30

slide-62
SLIDE 62

From Static to Dynamic

Difficulties (1/2)

◮ Separate the secrets between OA and GM; ◮ Bind the user’s secret zi to a unique public syndrome

vi = F · zi ∈ Z4n

q for some matrix F ∈ Z4n×4m q

; Use our signature scheme with efficient protocols: A A0 + ℓ

j=1 idj · Aj

d = u + D bin(Cvi)

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 22/30

slide-63
SLIDE 63

From Static to Dynamic

Difficulties (2/2)

◮ Difficulty: achieving security against framing attacks:

◮ i.e., even a dishonest GM cannot create signatures

that open to honest users

◮ Users need a membership certificate with a membership secret ◮ GM must certify that public key Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 23/30

slide-64
SLIDE 64

From Static to Dynamic

Difficulties (2/2)

◮ Difficulty: achieving security against framing attacks:

◮ i.e., even a dishonest GM cannot create signatures

that open to honest users

◮ Users need a membership certificate with a membership secret ◮ GM must certify that public key

◮ Be secure against framing attacks without compromising

previous security properties;

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 23/30

slide-65
SLIDE 65

From Static to Dynamic Our solution

Setup: Group public key: Y = (A, {Ai}ℓ

i=0 , B, D, D0, D1, F , u)

ℓ = log(N) (e.g. ℓ = 30)

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 24/30

slide-66
SLIDE 66

From Static to Dynamic Our solution

Setup: Group public key: Y = (A, {Ai}ℓ

i=0 , B, D, D0, D1, F , u)

ℓ = log(N) (e.g. ℓ = 30)

Join algorithm:

Ui GM

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 24/30

slide-67
SLIDE 67

From Static to Dynamic Our solution

Setup: Group public key: Y = (A, {Ai}ℓ

i=0 , B, D, D0, D1, F , u)

ℓ = log(N) (e.g. ℓ = 30)

Join algorithm:

Ui GM zi ← ֓ short vector in Z4m vi = F · zi

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 24/30

slide-68
SLIDE 68

From Static to Dynamic Our solution

Setup: Group public key: Y = (A, {Ai}ℓ

i=0 , B, D, D0, D1, F , u)

ℓ = log(N) (e.g. ℓ = 30)

Join algorithm:

Ui GM zi ← ֓ short vector in Z4m vi = F · zi idi ← ֓ identity ∈ {0, 1}ℓ vi certi (idi, di, si) = Sign( vi )

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 24/30

slide-69
SLIDE 69

From Static to Dynamic Our solution

Setup: Group public key: Y = (A, {Ai}ℓ

i=0 , B, D, D0, D1, F , u)

ℓ = log(N) (e.g. ℓ = 30)

Join algorithm:

Ui GM zi ← ֓ short vector in Z4m vi = F · zi idi ← ֓ identity ∈ {0, 1}ℓ vi certi (idi, di, si) = Sign( vi ) If (idi, di, si) does not verify, abort certi (seci; certi) = ( zi ; (idi, di, si))

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 24/30

slide-70
SLIDE 70

From Static to Dynamic Our solution — further steps

Goal

CCA-Anonymity: anonymity in presence of an opening oracle.

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 25/30

slide-71
SLIDE 71

From Static to Dynamic Our solution — further steps

Goal

CCA-Anonymity: anonymity in presence of an opening oracle. ↑

Canetti-Halevi-Katz transformation (Eurocrypt’04)

Any IBE implies IND-CCA-secure encryption.

Identity Based Encryption (Shamir’84, Boneh-Franklin’01)

◮ Encryption computes C ← Enc(MPK, ID, M) ◮ Decryption computes M ← Dec(MPK, C, dID) where

dID ← Keygen(MSK, ID)

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 25/30

slide-72
SLIDE 72

From Static to Dynamic Our solution

Sign algorithm: c := Enc(vi)

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 26/30

slide-73
SLIDE 73

From Static to Dynamic Our solution

Sign algorithm: c := Enc(vi) πK := proof that c is correct and that A A0 + ℓ

j=1 idj · Aj

d = u + D bin(Cvi) Message is bound to πK via the hash function of the Fiat-Shamir paradigm (signature of knowledge).

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 26/30

slide-74
SLIDE 74

From Static to Dynamic Our solution

Verify algorithm:

◮ A user verifies if πK is correct.

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 27/30

slide-75
SLIDE 75

From Static to Dynamic Our solution

Verify algorithm:

◮ A user verifies if πK is correct.

Open algorithm:

◮ OA decrypts c to get vi; ◮ OA searchs for the associated i in the Join transcripts, and if

so, returns i, otherwise abort.

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 27/30

slide-76
SLIDE 76

Outline

Introduction Anonymous Credentials and Group Signatures Motivations Intuition Our Constructions Conclusion

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 28/30

slide-77
SLIDE 77

Summary

◮ Lattice-based signature with efficient protocols;

◮ for obtaining signatures on committed message; ◮ for proving possession of a message-signature pair.

◮ First dynamic group signature based on lattice assumptions;

◮ use simpler version of our signature with efficient protocols; ◮ enables round-optimal, concurrent joins (Kiayias-Yung, EC’05).

◮ Unified framework for proving modular linear equations using

Stern’s technique. Technical contributions:

◮ Combine Böhl et al. signatures + Ling et al. ZK proofs

= ⇒ signature with efficient protocols;

◮ A method of signing public keys so that knowledge of the secret key

can be efficiently proved (cf. structure-preserving cryptography).

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 29/30

slide-78
SLIDE 78

Thank you all for your attention!

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 30/30

slide-79
SLIDE 79

Group Signatures: Comparative Table

Scheme LLLS NZZ LNW Group PK

  • O(λ2) ·logNgs
  • O(λ2)
  • O(λ2) ·logNgs

User’s SK

  • O(λ2)
  • O(λ2)
  • O(λ)

Signature

  • O(λ) ·logNgs
  • O(λ+log2Ngs)
  • O(λ) ·logNgs

Scheme LLNW Ours Group PK

  • O(λ2)
  • O(λ2) ·logNgs

User’s SK

  • O(λ) ·logNgs
  • O(λ)

Signature

  • O(λ) ·logNgs
  • O(λ) ·logNgs

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 31/30

slide-80
SLIDE 80

One-Time Signature

Definition

A one-time signature scheme consists of a triple of algorithms Πots = (G, S, V). Behaves like a digital signature scheme. Strong unforgeability: impossible to forge a valid signature even for a previously signed message.

Usage

We use one-time signature to provide CCA anonymity using Canetti-Halevi-Katz methodology.

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 32/30

slide-81
SLIDE 81

CCA anonymity

Definition

No PPT adversary A can win the following game with non negligible probability:

◮ A makes open queries. ◮ A chooses M⋆ and two different (cert⋆ i , sec⋆ i )i∈{0,1} ◮ A receives σ⋆ = Signcert⋆

b,sec⋆ b(M⋆) for some b ∈ {0, 1}

◮ A makes other open queries ◮ A returns b′, and wins if b = b′

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 33/30

slide-82
SLIDE 82

ZK Proofs

Σ-protocol [Dam10]

3-move scheme: (Commit, Challenge, Answer) between 2 users.

Fiat-Shamir Heuristic

Make the Σ-protocol non-interactive by setting the challenge to be H(Commit, Public)

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 34/30

slide-83
SLIDE 83

From Static to Dynamic Our solution – Ingredients

Security proof of the Boyen signature

Lattice algorithms use short basis as trapdoor information. SampleUp A′ =

  • A

B · A + C

  • ∈ Z2m×n

q

, A ∈ Zm×n

q

, TA ∈ Zm×m

q

, σ → gaussian v ∈ Zn

q, s.t. vTA′ = 0[q]

SampleDown A′ =

  • A

B · A + C

  • ∈ Z2m×n

q

, C ∈ Zm×n

q

, TC ∈ Zm×m

q

, σ → gaussian v ∈ Zn

q, s.t. vTA′ = 0[q]

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 35/30

slide-84
SLIDE 84

From Static to Dynamic Our solution – Ingredients

Security proof of the Boyen signature

Boyen’s signature

dT

  • A

A0 + ℓ

i=1 miAi

  • = 0[q]
  • Idea. Set Ai = QiA + hiC

  • A

A0 + ℓ

i=1 miAi

  • =
  • A

(Q0 + ℓ

i=1 miQi)A + hMC

  • ⇒ We can use SampleUp in the real setup and SampleDown in the

reduction whenever hM = 0.

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 36/30

slide-85
SLIDE 85

From Static to Dynamic Our solution – Ingredients

Security proof of the Boyen signature

Recall

A′ :=

  • A

A0 + ℓ

i=1 miAi

  • =
  • A

(Q0 + ℓ

i=1 miQi)A + hMC

  • Forgery. A outputs d⋆ = [d⋆T

1 |d⋆T 2 ]T and M⋆ = m⋆ 1 . . . m⋆ ℓ such

that d⋆TA′ = 0. If hM⋆ = 0, then

  • d⋆T

1

+ d⋆T

2

  • Q0 +

  • i=1

m⋆

i Qi

  • valid SIS solution

A = 0[q]

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 37/30

slide-86
SLIDE 86

From Static to Dynamic Our solution

Remark

Boyen’s signature: the reduction aborts if C vanishes. Böhl et al.: answer the request by “programming” the vector uT = d†T

  • A

(Q0 + ℓ

i=1 m† i Qi)A

  • − zT

i†D.

Problem

In this request, a sum of two discrete gaussian is generated differently from the real Join protocol. ⇒ Not the same standard deviation.

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 38/30

slide-87
SLIDE 87

From Static to Dynamic Our solution

Problem

zi,0, zi,1, zi ∈ Zm Consequence. {(zi, zi,0, zi,1)|zi,0 ← ֓ Dσ0, zi,1 ← ֓ Dσ1, zi = zi,0 + zi,1} ≁ ∆ {(zi, zi,0, zi,1)|zi ← ֓ Dσ, zi,0 ← ֓ Dσ0, zi,1 = zi − zi,0}

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 39/30

slide-88
SLIDE 88

Rényi Divergence

Presentation

Ra(P||Q) =  

  • x∈Supp(P)

P(x)a Q(x)a−1  

1/(a−1)

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 40/30

slide-89
SLIDE 89

Rényi Divergence

Presentation

Ra(P||Q) =  

  • x∈Supp(P)

P(x)a Q(x)a−1  

1/(a−1) ◮ Measurement of the distance between two distributions

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 40/30

slide-90
SLIDE 90

Rényi Divergence

Presentation

Ra(P||Q) =  

  • x∈Supp(P)

P(x)a Q(x)a−1  

1/(a−1) ◮ Measurement of the distance between two distributions ◮ Multiplicative instead of additive ◮ Probability preservation:

Q(A) P(A)

a a−1 /Ra(P||Q) Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 40/30

slide-91
SLIDE 91

Rényi Divergence

Hybrid argument: Real game Game 1 Game 2 Hard Game Hardness assumptions Bound winning probability. Can be done through probability preservation!

Recall

Q(A) P(A)

a a−1 /Ra(P||Q)

Pr[W2] ≥ Pr[W1]

a a−1 /Ra(Game1||Game2)

For instance: Pr[W2] ≥ Pr[W1]2/R2(Game1||Game2)

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 41/30

slide-92
SLIDE 92

Rényi Divergence

In Crypto

Consequence

Usually use statistical distance to measure distance between probabilities. → In our setting, implies q ∼ exp(λ) (smudging) → Higher cost compared to usual lattice-based crypto parameters

Fabrice Mouhartem Signatures with Efficient Protocols and Lattice-Based Dynamic GS 06.12.2016 42/30