(The University of Tokyo /AIST)
1
Shuichi Katsumata
(The University of Tokyo /AIST)
Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model
Shota Yamada
(AIST)
Takashi Yamakawa
(NTT)
*Pronounced as
Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle - - PowerPoint PPT Presentation
Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model (The University of Tokyo /AIST) *Pronounced as Shu ichi Katsumata (The University of Tokyo /AIST) Shota Yamada Takashi Yamakawa (AIST) (NTT) 1 Post Quantum Cryptography
(The University of Tokyo /AIST)
1
(The University of Tokyo /AIST)
(AIST)
(NTT)
*Pronounced as
2
3
(*) [BDF+11] Boneh et al. “Random oracles in a quantum world”. EUROCRYPT.
4
Recent Works on QROM p Signatures: [Zha12][ARU14][Unr17][KLS18]… p PKE: [TU16][JZC+18][SXY18]…
(*) [BDF+11] Boneh et al. “Random oracles in a quantum world”. EUROCRYPT.
5
Recent Works on QROM p Signatures: [Zha12][ARU14][Unr17][KLS18]… p PKE: [TU16][JZC+18][SXY18]… This work is on Identity-based Encryptions (IBEs)
(*) [BDF+11] Boneh et al. “Random oracles in a quantum world”. EUROCRYPT.
6
7
8
[Zha12] Zhandry. “Secure identity-based encryption in the quantum random oracle model”. CRYPTO.
9
[Zha12] Zhandry. “Secure identity-based encryption in the quantum random oracle model”. CRYPTO.
10
'
𝑅&:= #RO query
11
'
𝑅&:= #RO query
12
'
𝑅&:= #RO query
13
14
*Kangaroo...?
15
16
Al Alice Bob Bob
I ID01234
sk789:;<= Public Key Generator
alice@example.com
[Sha84]: A. Shamir. “Identity-Based Cryptosystems and Signature Schemes”. Crypto.
Any string can be a public key!
17
mpk, msk ← SetUp(1H) mpk 𝐉𝐄
𝐉𝐄𝐣 sk𝐉𝐄𝐣 (𝐉𝐄∗ ≠ 𝐉𝐄𝐣, 𝐍)
𝐈: 𝑱𝑬 → 𝒂 KeyGen ID2, msk → sk78;
𝐚
18
mpk, msk ← SetUp(1H) mpk 𝐉𝐄
𝐉𝐄𝐣 sk𝐉𝐄𝐣 (𝐉𝐄∗ ≠ 𝐉𝐄𝐣, 𝐍)
𝐈: 𝑱𝑬 → 𝒂 KeyGen ID2, msk → sk78;
𝐚
can obtain challenge ciphertext multi-times.
19
i×k,
i
*Programmed as RO
[GPV08] Gentry, Peikert, and Vaikuntanathan. “Trapdoors for hard lattices and new cryptographic constructions”. STOC.
20
i×k,
i
*Programmed as RO
: = 𝐈(𝐉𝐄)
21
i×k,
i
*Programmed as RO
: = 𝐈(𝐉𝐄)
22
Simulator (LWE adversary)
LWE Problem
23
Simulator (LWE adversary)
LWE Problem
24
Simulator (LWE adversary)
LWE Problem
25
Simulator (LWE adversary)
LWE Problem
Guess challenge ID∗ and programs RO differently for ID∗.
26
27
𝜚 = 𝛽- 0 + 𝛽+ 1 (Generally ∑ 𝛽Œ|𝑦⟩
Œ
)
28
𝜚 = 𝛽- 0 + 𝛽+ 1 (Generally ∑ 𝛽Œ|𝑦⟩
Œ
)
Œ
Œ
29
𝜚 = 𝛽- 0 + 𝛽+ 1 (Generally ∑ 𝛽Œ|𝑦⟩
Œ
)
Œ
Œ
30
Classical RO
31
Classical RO
Œ
Quantum RO
*Query superposition of all ID
32
Œ
Quantum RO Classical RO
*Query superposition of all ID
Guess 𝑗 ∈ [𝑅&] and program RO differently
33
Guess 𝑗 ∈ [𝑅&] and program RO differently
Œ
Quantum RO Classical RO
*Query superposition of all ID
*with more than negl. prob.
34
[Zha12] Zhandry. “Secure identity-based encryption in the quantum random oracle model”. CRYPTO.
35
[Zha12] Zhandry. “Secure identity-based encryption in the quantum random oracle model”. CRYPTO.
36
[Zha12] Zhandry. “Secure identity-based encryption in the quantum random oracle model”. CRYPTO.
37
38
39
40
41
42
p Simulator programs RO identically for all inputs. p Simulator can answer all secret key queries.
43
p Simulator programs RO identically for all inputs. p Simulator can answer all secret key queries.
44
p Simulator programs RO identically for all inputs. p Simulator can answer all secret key queries.
Just like Cramer-Shoup!
45
p Simulator can generate chall. cipher. for all identity.
46
p Simulator can generate chall. cipher. for all identity.
Simulator
h #
secret key
47
p Simulator can generate chall. cipher. for all identity.
Simulator
h #
h #
48
p Simulator can generate chall. cipher. for all identity.
Simulator
h #
h #
˜ #
Same as in real-world modulo
small difference in noise distribution.
49
p Simulator can generate chall. cipher. for all identity.
Simulator
h #
h #
˜ #
Same as in real-world modulo
small difference in noise distribution.
50
p Simulator can generate chall. cipher. for all identity.
Simulator LWE Problem
h #
k)
h #
Hybrid 1
51
p Simulator can generate chall. cipher. for all identity.
Simulator
k)
h #
52
p Simulator can generate chall. cipher. for all identity.
Simulator
k)
h #
Left over hash lemma using entropy of 𝐟𝐉𝐄∗
Hybrid 2
k)
53
p Simulator can generate chall. cipher. for all identity.
Simulator
k)
h #
Left over hash lemma using entropy of 𝐟𝐉𝐄∗
Hybrid 2
k)
54
55
56
57
58
c-
(+) = s+A + x+
c+
(+) = s+u78 + x+ — + M+ h #
c-
(™) = s™A + x™
c+
(™) = s™u78 + x™ — + M™ h #
59
c-
(+) = s+A + x+
c+
(+) = s+u78 + x+ — + M+ h #
c-
(™) = s™A + x™
c+
(™) = s™u78 + x™ — + M™ h #
60
c-
(+) = s+A + x+
c+
(+) = s+u78 + x+ — + M+ h #
c-
(™) = s™A + x™
c+
(™) = s™u78 + x™ — + M™ h #
61
62
*Proof of Single-Challenge
63
*Proof of Single-Challenge
64
*Proof of Single-Challenge
65
i×k
66
i×k
67
i×k
68
i×k
2∈[™] to proceed with LHL.
69
(¢) = s2A + x2,
(¢) = s2u78 + x2 — + M2 h #
Program RO to answer to secret keys query
(¢) = s2A + x2,
(¢) = s2Ae78 + x2 — + M2 h #
70
(¢) = s2A + x2,
(¢) = s2u78 + x2 — + M2 h #
Program RO to answer to secret keys query
(¢) = s2A + x2,
(¢) = s2Ae78 + x2 — + M2 h #
(¢) = s2A
(¢) = s2A
— + M2 h #
Change to Lossy LWE
71
(¢) = s2A + x2,
(¢) = s2u78 + x2 — + M2 h #
Program RO to answer to secret keys query
(¢) = s2A + x2,
(¢) = s2Ae78 + x2 — + M2 h #
(¢) = s2A
(¢) = s2A
— + M2 h #
Change to Lossy LWE
(¢) = s2A
(¢) = r
Left over hash lemma
*Leaks almost no information of s2
using entropy of 𝐭𝐣
72
(¢) = s2A + x2,
(¢) = s2u78 + x2 — + M2 h #
Program RO to answer to secret keys query
(¢) = s2A + x2,
(¢) = s2Ae78 + x2 — + M2 h #
(¢) = s2A
(¢) = s2A
— + M2 h #
Change to Lossy LWE
(¢) = s2A
(¢) = r
Left over hash lemma using entropy of 𝐭𝐣
*Leaks almost no information of s2
i!!
73
(¢) = s2A + x2,
(¢) = s2u78 + x2 — + M2 h #
Program RO to answer to secret keys query
(¢) = s2A + x2,
(¢) = s2Ae78 + x2 — + M2 h #
(¢) = s2A
(¢) = s2A
— + M2 h #
Change to Lossy LWE
(¢) = s2A
(¢) = r
Left over hash lemma using entropy of 𝐭𝐣
*Leaks almost no information of s2
i!!
74
(¢) = s2A + x2,
(¢) = s2u78||- + x2||- —
h #
(¢) = s2u78||+ + x2||+ —
h #
[KW03] Katz and Wang. “Efficiency improvements for signature schemes with tight security reductions”. CCS.
75
(¢) = s2A + x2,
(¢) = s2u78||- + x2||- —
h #
(¢) = s2u78||+ + x2||+ —
h #
[KW03] Katz and Wang. “Efficiency improvements for signature schemes with tight security reductions”. CCS.
76
(¢) = s2A + x2,
(¢) = s2u78||- + x2||- —
h #
(¢) = s2u78||+ + x2||+ —
h #
[KW03] Katz and Wang. “Efficiency improvements for signature schemes with tight security reductions”. CCS.
i.
77
78
79
80
*Discrete Gaussian
81
𝜚 = 𝛽- 0 + 𝛽+ 1 (Generally ∑ 𝛽Œ|𝑦⟩
Œ
)
Œ
Œ
82
ü On p-fractions of inputs, program RO to embed hard problem. ü On the other fraction, program RO to output random values.
[Zha12] Zhandry. “Secure identity-based encryption in the quantum random oracle model”. CRYPTO.
83
ü On p-fractions of inputs, program RO to embed hard problem. ü On the other fraction, program RO to output random values. ü Show that such programmed ROs are ind. from random functions.
[Zha12] Zhandry. “Secure identity-based encryption in the quantum random oracle model”. CRYPTO.
84
ü On p-fractions of inputs, program RO to embed hard problem. ü On the other fraction, program RO to output random values. ü Show that such programmed ROs are ind. from random functions. ü Hope the chall. identiy 𝐉𝐄∗ ∈ {p-fractions of inputs}.
[Zha12] Zhandry. “Secure identity-based encryption in the quantum random oracle model”. CRYPTO.
85
ü On p-fractions of inputs, program RO to embed hard problem. ü On the other fraction, program RO to output random values. ü Show that such programmed ROs are ind. from random functions. ü Hope the chall. identiy 𝐉𝐄∗ ∈ {p-fractions of inputs}.
[Zha12] Zhandry. “Secure identity-based encryption in the quantum random oracle model”. CRYPTO.
86
ü On p-fractions of inputs, program RO to embed hard problem. ü On the other fraction, program RO to output random values. ü Show that such programmed ROs are ind. from random functions. ü Hope the chall. identiy 𝐉𝐄∗ ∈ {p-fractions of inputs}.
[Zha12] Zhandry. “Secure identity-based encryption in the quantum random oracle model”. CRYPTO.