Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle - - PowerPoint PPT Presentation

tighter security proofs for gpv ibe in the quantum random
SMART_READER_LITE
LIVE PREVIEW

Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle - - PowerPoint PPT Presentation

Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model (The University of Tokyo /AIST) *Pronounced as Shu ichi Katsumata (The University of Tokyo /AIST) Shota Yamada Takashi Yamakawa (AIST) (NTT) 1 Post Quantum Cryptography


slide-1
SLIDE 1

(The University of Tokyo /AIST)

1

Shuichi Katsumata

(The University of Tokyo /AIST)

Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model

Shota Yamada

(AIST)

Takashi Yamakawa

(NTT)

*Pronounced as

slide-2
SLIDE 2

2

Post Quantum Cryptography

Owing to NIST’s announcement, PQ Crypto has been gathering increasingly more attention. Scheme secure under a PQ assumption in the standard model Scheme is secure against quantum algorithms In General…

slide-3
SLIDE 3

Scheme secure under a PQ assumption in the RO model Owing to NIST’s announcement, PQ Crypto has been gathering increasingly more attention. Scheme secure under a PQ assumption in the standard model Scheme is secure against quantum algorithms In General…

3

Post Quantum Cryptography

However… Scheme may NOT be secure against quantum algorithms(*)

(*) [BDF+11] Boneh et al. “Random oracles in a quantum world”. EUROCRYPT.

slide-4
SLIDE 4

Scheme secure under a PQ assumption in the RO model Owing to NIST’s announcement, PQ Crypto has been gathering increasingly more attention. Scheme secure under a PQ assumption in the standard model Scheme is secure against quantum algorithms In General…

4

Post Quantum Cryptography

However… Scheme may NOT be secure against quantum algorithms(*) Many practical algorithms rely on ROM!

Recent Works on QROM p Signatures: [Zha12][ARU14][Unr17][KLS18]… p PKE: [TU16][JZC+18][SXY18]…

(*) [BDF+11] Boneh et al. “Random oracles in a quantum world”. EUROCRYPT.

slide-5
SLIDE 5

Scheme secure under a PQ assumption in the RO model Owing to NIST’s announcement, PQ Crypto has been gathering increasingly more attention. Scheme secure under a PQ assumption in the standard model Scheme is secure against quantum algorithms In General…

5

Post Quantum Cryptography

However… Scheme may NOT be secure against quantum algorithms(*) Many practical algorithms rely on ROM!

Recent Works on QROM p Signatures: [Zha12][ARU14][Unr17][KLS18]… p PKE: [TU16][JZC+18][SXY18]… This work is on Identity-based Encryptions (IBEs)

(*) [BDF+11] Boneh et al. “Random oracles in a quantum world”. EUROCRYPT.

slide-6
SLIDE 6

6

IBEs from Post Quantum Assumptions

There are few IBEs secure under PQ assumptions.

pLattice-based IBEs pCode-based IBEs

ROM: [GHPT17] ROM: [GPV08][ABB10][CHKP10] Standard: [ABB10][CHKP10][Yam16][KY16]…. This line of work is quantumly secure.

slide-7
SLIDE 7

7

IBEs from Post Quantum Assumptions

There are few IBEs secure under PQ assumptions.

pLattice-based IBEs pCode-based IBEs What can we say about efficient schemes proven secure in the ROM??

ROM: [GHPT17] ROM: [GPV08][ABB10][CHKP10] Standard: [ABB10][CHKP10][Yam16][KY16]…. This line of work is quantumly secure.

slide-8
SLIDE 8

8

IBEs Secure in the QROM

Work of Zhandry [Zha12]

ü Presented a general technique to use in QROM. ü Proved security of lattice-based IBEs of [GPV08], [ABB10],[CHKP10] in QROM.

[Zha12] Zhandry. “Secure identity-based encryption in the quantum random oracle model”. CRYPTO.

slide-9
SLIDE 9

9

IBEs Secure in the QROM

Work of Zhandry [Zha12]

ü Presented a general technique to use in QROM. ü Proved security of lattice-based IBEs of [GPV08], [ABB10],[CHKP10] in QROM.

However…

ü Comes at a cost of a huge reduction loss. ü Requires descent knowledge on quantum computation.

[Zha12] Zhandry. “Secure identity-based encryption in the quantum random oracle model”. CRYPTO.

slide-10
SLIDE 10

10

IBEs Secure in the QROM

Work of Zhandry [Zha12]

ü Presented a general technique to use in QROM. ü Proved security of lattice-based IBEs of [GPV08], [ABB10],[CHKP10] in QROM.

However…

A breaks IBE with advantage 𝜗 B solves LWE problem with advantage ≈ 𝜗#/𝑅&

'

𝑅&:= #RO query

ü Comes at a cost of a huge reduction loss. ü Requires descent knowledge on quantum computation.

slide-11
SLIDE 11

ü Comes at a cost of a huge reduction loss. ü Requires descent knowledge on quantum computation.

11

IBEs Secure in the QROM

Work of Zhandry [Zha12]

ü Presented a general technique to use in QROM. ü Proved security of lattice-based IBEs of [GPV08], [ABB10],[CHKP10] in QROM.

However…

A breaks IBE with advantage 𝜗 B solves LWE problem with advantage ≈ 𝜗#/𝑅&

'

𝑅&:= #RO query

If we want 128-bit secure IBE 𝜗 = 2*+#, , assuming 𝑅& = 2+--. We need at least 656-bit secure LWE problem!!

slide-12
SLIDE 12

ü Comes at a cost of a huge reduction loss. ü Requires descent knowledge on quantum computation.

12

IBEs Secure in the QROM

Work of Zhandry [Zha12]

ü Presented a general technique to use in QROM. ü Proved security of lattice-based IBEs of [GPV08], [ABB10],[CHKP10] in QROM.

However…

A breaks IBE with advantage 𝜗 B solves LWE problem with advantage ≈ 𝜗#/𝑅&

'

𝑅&:= #RO query

If we want 128-bit secure IBE 𝜗 = 2*+#, , assuming 𝑅& = 2+--. We need at least 656-bit secure LWE problem!!

Question

Can we construct tightly secure IBEs in QROM??

slide-13
SLIDE 13

13

Summary of Our Result

① Tight security proof for GPV-IBE in QROM in the single-challenge setting. ② (Almost) tight security proof for a variant of GPV-IBE in QROM in the multi-challenge setting.

ü Our proofs are much simpler than [Zha12]. ü Easy to follow for non-experts of quantum computation.

slide-14
SLIDE 14

14

Overview of This Talk

Review of GPV-IBE What Goes Wrong in QROM

1 2 3 Result 1: 4 Result 2: Tightly Secure GPV-IBE in QROM Extending it to Multi-Challenge

*Kangaroo...?

slide-15
SLIDE 15

15

  • 1. Review of GPV-IBE
slide-16
SLIDE 16

16

Identity-based Encryption [Sha84]

Al Alice Bob Bob

I ID01234

sk789:;<= Public Key Generator

ciphertext

alice@example.com

[Sha84]: A. Shamir. “Identity-Based Cryptosystems and Signature Schemes”. Crypto.

Any string can be a public key!

slide-17
SLIDE 17

17

IND-CPA Security of IBE in ROM

mpk, msk ← SetUp(1H) mpk 𝐉𝐄

𝐚 ← 𝐕𝐨𝐣(𝒂)

𝐉𝐄𝐣 sk𝐉𝐄𝐣 (𝐉𝐄∗ ≠ 𝐉𝐄𝐣, 𝐍)

Random Oracle

𝐈: 𝑱𝑬 → 𝒂 KeyGen ID2, msk → sk78;

𝐃𝐔∗

𝐚

b ← {0, 1} Pr b′ = b ≈ 1 2 b′

slide-18
SLIDE 18

18

IND-CPA Security of IBE in ROM

mpk, msk ← SetUp(1H) mpk 𝐉𝐄

𝐚 ← 𝐕𝐨𝐣(𝒂)

𝐉𝐄𝐣 sk𝐉𝐄𝐣 (𝐉𝐄∗ ≠ 𝐉𝐄𝐣, 𝐍)

Random Oracle

𝐈: 𝑱𝑬 → 𝒂 KeyGen ID2, msk → sk78;

𝐃𝐔∗

𝐚

b ← {0, 1} Pr b′ = b ≈ 1 2 b′ Multi-Challenge if

can obtain challenge ciphertext multi-times.

slide-19
SLIDE 19

19

Gentry-Peikert-Vaikuntanathan IBE

p mpk, msk

  • mpk =

A

∈ ℤh

i×k,

H: 0,1 ∗ → ℤh

i

*Programmed as RO

  • msk = trapdoof T0 for A

[GPV08] Gentry, Peikert, and Vaikuntanathan. “Trapdoors for hard lattices and new cryptographic constructions”. STOC.

slide-20
SLIDE 20

20

Gentry-Peikert-Vaikuntanathan IBE

p mpk, msk

  • mpk =

A

∈ ℤh

i×k,

H: 0,1 ∗ → ℤh

i

*Programmed as RO

  • msk = trapdoof T0 for A

pSecret Key sk78

A

  • Short vector e78 ∈ ℤw s. t.

𝐟𝐉𝐄 =

: = 𝐈(𝐉𝐄)

𝐯𝐉𝐄

slide-21
SLIDE 21

21

Gentry-Peikert-Vaikuntanathan IBE

p mpk, msk

  • mpk =

A

∈ ℤh

i×k,

H: 0,1 ∗ → ℤh

i

*Programmed as RO

  • msk = trapdoof T0 for A

pSecret Key sk78

A

  • Short vector e78 ∈ ℤw s. t.

𝐟𝐉𝐄 =

: = 𝐈(𝐉𝐄)

pEncryption CT78 of M

A

𝐭

𝐯𝐉𝐄

𝐭

𝐯𝐉𝐄

+

𝐲

+x′+𝐍 𝒓

𝟑

  • LWE instance for (A, u78):

c-= c+= ,

slide-22
SLIDE 22

22

Security Proof in Classical ROM

p Proof similar to FDH-signature p Simulator guesses one ID to embed LWE problem Ø For ID ≠ ID∗

𝐭 𝐁 𝐯 + [𝐲|x′]

Simulator (LWE adversary)

Sample e78 and program RO as H ID ≔ Ae78.

Ø For ID∗

Program RO as H ID∗ ≔ u.

LWE Problem

slide-23
SLIDE 23

23

Security Proof in Classical ROM

p Proof similar to FDH-signature p Simulator guesses one ID to embed LWE problem Ø For ID ≠ ID∗

𝐭 𝐁 𝐯 + [𝐲|x′]

Simulator (LWE adversary)

Sample e78 and program RO as H ID ≔ Ae78.

Ø For ID∗

Program RO as H ID∗ ≔ u.

  • Sim. knows secret key.
  • Sim. doesn’t know secret key.

LWE Problem

slide-24
SLIDE 24

24

Security Proof in Classical ROM

p Proof similar to FDH-signature p Simulator guesses one ID to embed LWE problem Ø For ID ≠ ID∗

𝐭 𝐁 𝐯 + [𝐲|x′]

Simulator (LWE adversary)

Sample e78 and program RO as H ID ≔ Ae78.

Ø For ID∗

Program RO as H ID∗ ≔ u.

  • Sim. knows secret key.
  • Sim. doesn’t know secret key.

Embed into chall. ciphertext.

LWE Problem

Can answer secret key queries.

slide-25
SLIDE 25

25

Security Proof in Classical ROM

p Proof similar to FDH-signature p Simulator guesses one ID to embed LWE problem Ø For ID ≠ ID∗

𝐭 𝐁 𝐯 + [𝐲|x′]

Simulator (LWE adversary)

Sample e78 and program RO as H ID ≔ Ae78.

Ø For ID∗

Program RO as H ID∗ ≔ u.

  • Sim. knows secret key.
  • Sim. doesn’t know secret key.

Embed into chall. ciphertext.

LWE Problem

Can answer secret key queries.

Guess challenge ID∗ and programs RO differently for ID∗.

slide-26
SLIDE 26

26

  • 2. What Goes Wrong in QROM
slide-27
SLIDE 27

27

Minimum Preparation for Qunt. Crypt.

Qbits is a register in superposition between a few states: 0, 1, ...

Notation:

𝜚 = 𝛽- 0 + 𝛽+ 1 (Generally ∑ 𝛽Œ|𝑦⟩

Œ

)

  • 𝛽- # + 𝛽+ # = 1
  • 𝛽• # = Prob. of getting 𝑐 when measuring 𝜚
slide-28
SLIDE 28

28

Minimum Preparation for Qunt. Crypt.

Qbits is a register in superposition between a few states: 0, 1, ...

Notation:

𝜚 = 𝛽- 0 + 𝛽+ 1 (Generally ∑ 𝛽Œ|𝑦⟩

Œ

)

  • 𝛽- # + 𝛽+ # = 1
  • 𝛽• # = Prob. of getting 𝑐 when measuring 𝜚

∑ 𝛽Œ|𝑦⟩

Œ

→ ∑ 𝛽Œ|𝑦, H 𝑦 ⟩

Œ

In short… A quantum adversary can evaluate hash function H over qbits in real-world.

slide-29
SLIDE 29

29

Minimum Preparation for Qunt. Crypt.

Qbits is a register in superposition between a few states: 0, 1, ...

Notation:

𝜚 = 𝛽- 0 + 𝛽+ 1 (Generally ∑ 𝛽Œ|𝑦⟩

Œ

)

  • 𝛽- # + 𝛽+ # = 1
  • 𝛽• # = Prob. of getting 𝑐 when measuring 𝜚

∑ 𝛽Œ|𝑦⟩

Œ

→ ∑ 𝛽Œ|𝑦, H 𝑦 ⟩

Œ

In short… A quantum adversary can evaluate hash function H over qbits in real-world.

QROM should model this capability!

slide-30
SLIDE 30

30

What this Means for QROM

FDH-type proofs in ROM doesn’t hold in QROM! Why?

ID+ ID# ID’“

Classical RO

In ROM…

slide-31
SLIDE 31

31

What this Means for QROM

FDH-type proofs in ROM doesn’t hold in QROM! Why?

ID+ ID# ID’“

Classical RO

In ROM…

∑ 𝛽Œ

Œ

|IDŒ⟩

Quantum RO

In QROM…

*Query superposition of all ID

slide-32
SLIDE 32

32

What this Means for QROM

FDH-type proofs in ROM doesn’t hold in QROM! Why?

ID+ ID# ID’“ ∑ 𝛽Œ

Œ

|IDŒ⟩

Quantum RO Classical RO

*Query superposition of all ID

Guess 𝑗 ∈ [𝑅&] and program RO differently

  • n single ID∗ ≔ ID2

In ROM… In QROM…

slide-33
SLIDE 33

33

What this Means for QROM

FDH-type proofs in ROM doesn’t hold in QROM! Why? In ROM…

ID+ ID# ID’“

Guess 𝑗 ∈ [𝑅&] and program RO differently

  • n single ID∗ ≔ ID2

∑ 𝛽Œ

Œ

|IDŒ⟩

In QROM…

Quantum RO Classical RO

*Query superposition of all ID

Can’t guess 𝐉𝐄∗!!

*with more than negl. prob.

slide-34
SLIDE 34

34

Overcoming the Difficulty [Zha12]

Zhandry [Zha12] introduced semi-constant distributions to prove security of FDH-type proofs in QROM.

[Zha12] Zhandry. “Secure identity-based encryption in the quantum random oracle model”. CRYPTO.

slide-35
SLIDE 35

35

Overcoming the Difficulty [Zha12]

Zhandry [Zha12] introduced semi-constant distributions to prove security of FDH-type proofs in QROM.

[Zha12] Zhandry. “Secure identity-based encryption in the quantum random oracle model”. CRYPTO.

Technique is conceptually similar to the partitioning technique used to prove adaptively secure IBEs in the standard model. Ø Program RO on many points instead of a single point.

slide-36
SLIDE 36

36

Overcoming the Difficulty [Zha12]

Zhandry [Zha12] introduced semi-constant distributions to prove security of FDH-type proofs in QROM.

[Zha12] Zhandry. “Secure identity-based encryption in the quantum random oracle model”. CRYPTO.

Technique is conceptually similar to the partitioning technique used to prove adaptively secure IBEs in the standard model. Ø Program RO on many points instead of a single point.

Downside

The reduction loss is huge.

𝜗 ≈ 𝜗#/𝑅&

'

  • Adv. of breaking IBE
  • Adv. of solving LWE
slide-37
SLIDE 37

37

  • 3. Result 1:

Tightly Secure GPV-IBE in QROM

slide-38
SLIDE 38

38

Idea: Depart from Partitioning

Partitioning techniques are not good with tight reduction. Non-partitioning technique??

slide-39
SLIDE 39

39

Idea: Depart from Partitioning

Partitioning techniques are not good with tight reduction. Non-partitioning technique?? p Simulator programs RO identically for all inputs. p Simulator can answer all secret key queries. p Simulator can generate chall. cipher. for all identity.

slide-40
SLIDE 40

40

Idea: Depart from Partitioning

Partitioning techniques are not good with tight reduction. Non-partitioning technique?? p Simulator programs RO identically for all inputs. p Simulator can answer all secret key queries. p Simulator can generate chall. cipher. for all identity. Is this even possible?

slide-41
SLIDE 41

41

Idea: Depart from Partitioning

Partitioning techniques are not good with tight reduction. Non-partitioning technique?? p Simulator programs RO identically for all inputs. p Simulator can answer all secret key queries. p Simulator can generate chall. cipher. for all identity. Is this even possible? Yes! Similar to Cramer-Shoup PKE Use secret key to construct challenge ciphertext J

*Idea also used in pairing-based Gentry’s IBE.

slide-42
SLIDE 42

42

Knowing the Secret Key of All IDs

Let us consider the first two problem.

p Simulator programs RO identically for all inputs. p Simulator can answer all secret key queries.

slide-43
SLIDE 43

43

Knowing the Secret Key of All IDs

Let us consider the first two problem.

p Simulator programs RO identically for all inputs. p Simulator can answer all secret key queries.

Unlike original GPV-IBE proof…

Sample e78 and program RO as H ID ≔ Ae78.

Ø For ∀𝐉𝐄

slide-44
SLIDE 44

44

Knowing the Secret Key of All IDs

Let us consider the first two problem.

p Simulator programs RO identically for all inputs. p Simulator can answer all secret key queries.

Unlike original GPV-IBE proof…

Sample e78 and program RO as H ID ≔ Ae78.

Ø For ∀𝐉𝐄 Main Observation

Given A, u78 = H ID , the secret key e78 retains sufficient entropy.

Just like Cramer-Shoup!

slide-45
SLIDE 45

45

Simulating the Challenge Ciphertext

Remaining problem.

p Simulator can generate chall. cipher. for all identity.

As in Cramer-Shoup, use secret key to construct chall. cipher.

slide-46
SLIDE 46

46

Simulating the Challenge Ciphertext

Remaining problem.

p Simulator can generate chall. cipher. for all identity.

Simulator

As in Cramer-Shoup, use secret key to construct chall. cipher.

c- = sA + x c+ = c-, e78∗ + M

h #

secret key

slide-47
SLIDE 47

47

Simulating the Challenge Ciphertext

Remaining problem.

p Simulator can generate chall. cipher. for all identity.

Simulator

As in Cramer-Shoup, use secret key to construct chall. cipher.

c- = sA + x c+ = c-, e78∗ + M

h #

= sAe78∗ + x, e78∗ + M

h #

slide-48
SLIDE 48

48

Simulating the Challenge Ciphertext

Remaining problem.

p Simulator can generate chall. cipher. for all identity.

Simulator

As in Cramer-Shoup, use secret key to construct chall. cipher.

c- = sA + x c+ = c-, e78∗ + M

h #

= sAe78∗ + x, e78∗ + M

h #

≈ ⟨s, u78∗⟩ + x— + M

˜ #

Same as in real-world modulo

small difference in noise distribution.

slide-49
SLIDE 49

49

Simulating the Challenge Ciphertext

Remaining problem.

p Simulator can generate chall. cipher. for all identity.

Simulator

As in Cramer-Shoup, use secret key to construct chall. cipher.

c- = sA + x c+ = c-, e78∗ + M

h #

= sAe78∗ + x, e78∗ + M

h #

≈ ⟨s, u78∗⟩ + x— + M

˜ #

Same as in real-world modulo

small difference in noise distribution.

Why is this secure??

slide-50
SLIDE 50

50

Simulating the Challenge Ciphertext

Remaining problem.

p Simulator can generate chall. cipher. for all identity.

𝐭𝐁 + 𝐲

Simulator LWE Problem

As in Cramer-Shoup, use secret key to construct chall. cipher.

c- = sA + x c+ = c-, e78∗ + M

h #

c- = b (random in ℤh

k)

c+ = b, e78∗ + M

h #

Hybrid 1

slide-51
SLIDE 51

51

Simulating the Challenge Ciphertext

Remaining problem.

p Simulator can generate chall. cipher. for all identity.

Simulator

As in Cramer-Shoup, use secret key to construct chall. cipher.

c- = b (random in ℤh

k)

c+ = b, e78∗ + M

h #

slide-52
SLIDE 52

52

Simulating the Challenge Ciphertext

Remaining problem.

p Simulator can generate chall. cipher. for all identity.

Simulator

As in Cramer-Shoup, use secret key to construct chall. cipher.

c- = b (random in ℤh

k)

c+ = b, e78∗ + M

h #

Left over hash lemma using entropy of 𝐟𝐉𝐄∗

Hybrid 2

c- = b (random in ℤh

k)

c+ = r (random in ℤh )

slide-53
SLIDE 53

53

Simulating the Challenge Ciphertext

Remaining problem.

p Simulator can generate chall. cipher. for all identity.

Simulator

As in Cramer-Shoup, use secret key to construct chall. cipher.

c- = b (random in ℤh

k)

c+ = b, e78∗ + M

h #

Left over hash lemma using entropy of 𝐟𝐉𝐄∗

Hybrid 2

c- = b (random in ℤh

k)

c+ = r (random in ℤh ) No information on M!!

slide-54
SLIDE 54

54

Combining Everything Together

p Simulator programs RO identically for all inputs. p Simulator can answer all secret key queries. p Simulator can generate chall. cipher. for all identity.

ü ü ü

slide-55
SLIDE 55

55

Combining Everything Together

p Simulator programs RO identically for all inputs. p Simulator can answer all secret key queries. p Simulator can generate chall. cipher. for all identity.

ü ü ü

Proof naturally fits the QROM setting!

slide-56
SLIDE 56

56

Combining Everything Together

p Simulator programs RO identically for all inputs. p Simulator can answer all secret key queries. p Simulator can generate chall. cipher. for all identity.

ü ü ü

Proof naturally fits the QROM setting! Moreover… Ø Since the simulator never aborts, the security proof is tight. Ø Proof is (almost) as simple as in the classical setting J

slide-57
SLIDE 57

57

  • 4. Result 2:

Extending it to Multi-Challenge

slide-58
SLIDE 58

58

Tight Security for Multi-Challenge

An adversary gets to query many challenge ciphertext:

c-

(+) = s+A + x+

c+

(+) = s+u78 + x+ — + M+ h #

c-

(™) = s™A + x™

c+

(™) = s™u78 + x™ — + M™ h #

CT(+) CT(™)

slide-59
SLIDE 59

59

Tight Security for Multi-Challenge

An adversary gets to query many challenge ciphertext:

c-

(+) = s+A + x+

c+

(+) = s+u78 + x+ — + M+ h #

c-

(™) = s™A + x™

c+

(™) = s™u78 + x™ — + M™ h #

CT(+) CT(™)

Fact Ø Single-chall. can be reduced to Multi-chall. security. Ø However, the reduction is not tight and loses a factor

  • f N in the reduction.
slide-60
SLIDE 60

60

Tight Security for Multi-Challenge

An adversary gets to query many challenge ciphertext:

c-

(+) = s+A + x+

c+

(+) = s+u78 + x+ — + M+ h #

c-

(™) = s™A + x™

c+

(™) = s™u78 + x™ — + M™ h #

CT(+) CT(™)

Fact Ø Single-chall. can be reduced to Multi-chall. security. Can we make the reduction loss independent of N?? Ø However, the reduction is not tight and loses a factor

  • f N in the reduction.

Question

slide-61
SLIDE 61

61

Requires New Technique

Previous technique does not work anymore…

slide-62
SLIDE 62

62

Requires New Technique

Previous technique does not work anymore… Why?

*Proof of Single-Challenge

slide-63
SLIDE 63

63

Requires New Technique

Previous technique does not work anymore… Why?

*Proof of Single-Challenge

Not enough entropy in secret key 𝐟𝐉𝐄 to modify all N = poly(λ) ciphertext to random!!

slide-64
SLIDE 64

64

Requires New Technique

Previous technique does not work anymore… Why?

*Proof of Single-Challenge

Not enough entropy in secret key 𝐟𝐉𝐄 to modify all N = poly(λ) ciphertext to random!!

Need to get more entropy from some other source…

slide-65
SLIDE 65

65

Idea: Use Lossy LWE to Boost Entropy

Standard LWE: (𝐁, 𝐭𝐁 + 𝐲) where 𝐁 ← ℤh

i×k

uniquely determines 𝐭

slide-66
SLIDE 66

66

Idea: Use Lossy LWE to Boost Entropy

Standard LWE: (𝐁, 𝐭𝐁 + 𝐲) where 𝐁 ← ℤh

i×k

uniquely determines 𝐭 Lossy LWE: (𝐁 Ÿ, 𝐭𝐁 Ÿ + 𝐲) where 𝐁 Ÿ ← Lossy(⋅) leaks almost no information on 𝐭

slide-67
SLIDE 67

67

Idea: Use Lossy LWE to Boost Entropy

Standard LWE: (𝐁, 𝐭𝐁 + 𝐲) where 𝐁 ← ℤh

i×k

uniquely determines 𝐭 Lossy LWE: (𝐁 Ÿ, 𝐭𝐁 Ÿ + 𝐲) where 𝐁 Ÿ ← Lossy(⋅) leaks almost no information on 𝐭 Indistinguishable assuming the LWE problem J

slide-68
SLIDE 68

68

Idea: Use Lossy LWE to Boost Entropy

Standard LWE: (𝐁, 𝐭𝐁 + 𝐲) where 𝐁 ← ℤh

i×k

uniquely determines 𝐭 Lossy LWE: (𝐁 Ÿ, 𝐭𝐁 Ÿ + 𝐲) where 𝐁 Ÿ ← Lossy(⋅) leaks almost no information on 𝐭 Indistinguishable assuming the LWE problem J Use entropy of 𝐭 2

2∈[™] to proceed with LHL.

slide-69
SLIDE 69

69

Attempt to Change CT to Random

c-

(¢) = s2A + x2,

c+

(¢) = s2u78 + x2 — + M2 h #

CT(2):

Program RO to answer to secret keys query

c-

(¢) = s2A + x2,

c+

(¢) = s2Ae78 + x2 — + M2 h #

CT(2):

slide-70
SLIDE 70

70

Attempt to Change CT to Random

c-

(¢) = s2A + x2,

c+

(¢) = s2u78 + x2 — + M2 h #

CT(2):

Program RO to answer to secret keys query

c-

(¢) = s2A + x2,

c+

(¢) = s2Ae78 + x2 — + M2 h #

CT(2):

c-

(¢) = s2A

Ÿ + x2, c+

(¢) = s2A

Ÿe78 + x2

— + M2 h #

CT(2):

Change to Lossy LWE

slide-71
SLIDE 71

71

Attempt to Change CT to Random

c-

(¢) = s2A + x2,

c+

(¢) = s2u78 + x2 — + M2 h #

CT(2):

Program RO to answer to secret keys query

c-

(¢) = s2A + x2,

c+

(¢) = s2Ae78 + x2 — + M2 h #

CT(2):

c-

(¢) = s2A

Ÿ + x2, c+

(¢) = s2A

Ÿe78 + x2

— + M2 h #

CT(2):

Change to Lossy LWE

c-

(¢) = s2A

Ÿ + x2, c+

(¢) = r

CT(2):

Left over hash lemma

*Leaks almost no information of s2

using entropy of 𝐭𝐣

slide-72
SLIDE 72

72

Attempt to Change CT to Random

c-

(¢) = s2A + x2,

c+

(¢) = s2u78 + x2 — + M2 h #

CT(2):

Program RO to answer to secret keys query

c-

(¢) = s2A + x2,

c+

(¢) = s2Ae78 + x2 — + M2 h #

CT(2):

c-

(¢) = s2A

Ÿ + x2, c+

(¢) = s2A

Ÿe78 + x2

— + M2 h #

CT(2):

Change to Lossy LWE

c-

(¢) = s2A

Ÿ + x2, c+

(¢) = r

CT(2):

Left over hash lemma using entropy of 𝐭𝐣

*Leaks almost no information of s2

WRONG!!

When A Ÿ is in Lossy mode, A Ÿe78 is no longer uniform over ℤh

i!!

slide-73
SLIDE 73

73

Attempt to Change CT to Random

c-

(¢) = s2A + x2,

c+

(¢) = s2u78 + x2 — + M2 h #

CT(2):

Program RO to answer to secret keys query

c-

(¢) = s2A + x2,

c+

(¢) = s2Ae78 + x2 — + M2 h #

CT(2):

c-

(¢) = s2A

Ÿ + x2, c+

(¢) = s2A

Ÿe78 + x2

— + M2 h #

CT(2):

Change to Lossy LWE

c-

(¢) = s2A

Ÿ + x2, c+

(¢) = r

CT(2):

Left over hash lemma using entropy of 𝐭𝐣

*Leaks almost no information of s2

WRONG!!

A Ÿe78 is not universal, so cannot apply LHL! When A Ÿ is in Lossy mode, A Ÿe78 is no longer uniform over ℤh

i!!

slide-74
SLIDE 74

74

Fixing it by Katz-Wang Technique

Double the ciphertext and use Katz-Wang technique.

c-

(¢) = s2A + x2,

c+||-

(¢) = s2u78||- + x2||- —

+ M2

h #

CT(2):

c+||+

(¢) = s2u78||+ + x2||+ —

+ M2

h #

where 𝐯𝐉𝐄||𝐜 ≔ 𝐈(𝐉𝐄||𝐜)

[KW03] Katz and Wang. “Efficiency improvements for signature schemes with tight security reductions”. CCS.

slide-75
SLIDE 75

75

Fixing it by Katz-Wang Technique

Double the ciphertext and use Katz-Wang technique.

c-

(¢) = s2A + x2,

c+||-

(¢) = s2u78||- + x2||- —

+ M2

h #

CT(2):

c+||+

(¢) = s2u78||+ + x2||+ —

+ M2

h #

where 𝐯𝐉𝐄||𝐜 ≔ 𝐈(𝐉𝐄||𝐜)

[KW03] Katz and Wang. “Efficiency improvements for signature schemes with tight security reductions”. CCS.

In scheme, only give out one secret key e78 s.t. Ae78 = u78||¤ for random bit b.

slide-76
SLIDE 76

76

Fixing it by Katz-Wang Technique

Double the ciphertext and use Katz-Wang technique.

c-

(¢) = s2A + x2,

c+||-

(¢) = s2u78||- + x2||- —

+ M2

h #

CT(2):

c+||+

(¢) = s2u78||+ + x2||+ —

+ M2

h #

where 𝐯𝐉𝐄||𝐜 ≔ 𝐈(𝐉𝐄||𝐜)

During Simulation

[KW03] Katz and Wang. “Efficiency improvements for signature schemes with tight security reductions”. CCS.

p Sim. Programs H(ID| b ≔ u78||¤ = A Ÿe78 for random bit b. p Programs H(ID| 1 − b ≔ u78||+*¤ ← ℤh

i.

p Use LHL on u78||+*¤ which is now universal and repeat J

slide-77
SLIDE 77

77

  • 5. Conclusion
slide-78
SLIDE 78

78

Conclusion

① Tight security proof for GPV-IBE in QROM in the single-challenge setting. ② (Almost) tight security proof for a variant of GPV-IBE in QROM in the multi-challenge setting.

ü Our proofs are much simpler than [Zha12]. ü Easy to follow for non-experts of quantum computation.

slide-79
SLIDE 79

79

slide-80
SLIDE 80

80

*Key Lemma Used in Proof We can set (e78, u78) in reverse order!

  • 1. Set u78: = H(ID)
  • 2. Sample short e78 s.t.

Ae78 = u78

  • 3. Output (e78, u78)
  • 1. Sample short e78 from

appropriate distribution.

  • 2. Program RO as
  • 3. Output (e78, u78)

*Discrete Gaussian

H ID ≔ Ae78 Requires trapdoor T0 Doesn’t require trapdoor T0

slide-81
SLIDE 81

81

Minimum Preparation for Qunt. Crypt.

Qbits is a register in superposition between a few states: 0, 1, ...

Notation:

𝜚 = 𝛽- 0 + 𝛽+ 1 (Generally ∑ 𝛽Œ|𝑦⟩

Œ

)

  • 𝛽- # + 𝛽+ # = 1
  • 𝛽• # = Prob. of getting 𝑐 when measuring 𝜚

Given any classical function 𝑔, can compute: ∑ 𝛽Œ|𝑦⟩

Œ

→ ∑ 𝛽Œ|𝑦, 𝑔 𝑦 ⟩

Œ

In particular… A quantum adversary can evaluate hash function H over qbits.

slide-82
SLIDE 82

82

Overcoming the Difficulty [Zha12]

Zhandry [Zha12] introduced semi-constant distributions to prove security of FDH-type proofs in QROM. High level idea is…

ü On p-fractions of inputs, program RO to embed hard problem. ü On the other fraction, program RO to output random values.

[Zha12] Zhandry. “Secure identity-based encryption in the quantum random oracle model”. CRYPTO.

slide-83
SLIDE 83

83

Overcoming the Difficulty [Zha12]

Zhandry [Zha12] introduced semi-constant distributions to prove security of FDH-type proofs in QROM. High level idea is…

ü On p-fractions of inputs, program RO to embed hard problem. ü On the other fraction, program RO to output random values. ü Show that such programmed ROs are ind. from random functions.

[Zha12] Zhandry. “Secure identity-based encryption in the quantum random oracle model”. CRYPTO.

slide-84
SLIDE 84

84

Overcoming the Difficulty [Zha12]

Zhandry [Zha12] introduced semi-constant distributions to prove security of FDH-type proofs in QROM. High level idea is…

ü On p-fractions of inputs, program RO to embed hard problem. ü On the other fraction, program RO to output random values. ü Show that such programmed ROs are ind. from random functions. ü Hope the chall. identiy 𝐉𝐄∗ ∈ {p-fractions of inputs}.

[Zha12] Zhandry. “Secure identity-based encryption in the quantum random oracle model”. CRYPTO.

slide-85
SLIDE 85

85

Overcoming the Difficulty [Zha12]

Zhandry [Zha12] introduced semi-constant distributions to prove security of FDH-type proofs in QROM. High level idea is…

ü On p-fractions of inputs, program RO to embed hard problem. ü On the other fraction, program RO to output random values. ü Show that such programmed ROs are ind. from random functions. ü Hope the chall. identiy 𝐉𝐄∗ ∈ {p-fractions of inputs}.

Technique is conceptually similar to the partitioning technique used to prove adaptively secure IBEs in the standard model.

[Zha12] Zhandry. “Secure identity-based encryption in the quantum random oracle model”. CRYPTO.

slide-86
SLIDE 86

86

Overcoming the Difficulty [Zha12]

Zhandry [Zha12] introduced semi-constant distributions to prove security of FDH-type proofs in QROM. High level idea is…

ü On p-fractions of inputs, program RO to embed hard problem. ü On the other fraction, program RO to output random values. ü Show that such programmed ROs are ind. from random functions. ü Hope the chall. identiy 𝐉𝐄∗ ∈ {p-fractions of inputs}.

Technique is conceptually similar to the partitioning technique used to prove adaptively secure IBEs in the standard model.

Downside

The reduction loss is huge.

𝜗 ≈ 𝜗#/𝑅&

'

  • Adv. of breaking IBE
  • Adv. of solving LWE

[Zha12] Zhandry. “Secure identity-based encryption in the quantum random oracle model”. CRYPTO.