Lattice-Based Group Signatures with Logarithmic Signature Size - - PowerPoint PPT Presentation

lattice based group signatures with logarithmic signature
SMART_READER_LITE
LIVE PREVIEW

Lattice-Based Group Signatures with Logarithmic Signature Size - - PowerPoint PPT Presentation

Lattice-Based Group Signatures with Logarithmic Signature Size Fabien Laguillaumie 1 Adeline Langlois 2 Benot Libert 3 Damien Stehl 2 1 LIP, Universit Lyon 1 2 LIP, ENS de Lyon 3 Technicolor December 4, 2013 Laguillaumie et al. LB Group


slide-1
SLIDE 1

Lattice-Based Group Signatures with Logarithmic Signature Size

Fabien Laguillaumie1 Adeline Langlois2 Benoît Libert3 Damien Stehlé2

1LIP, Université Lyon 1 2LIP, ENS de Lyon 3Technicolor

December 4, 2013

Laguillaumie et al. LB Group Signature December 4, 2013 1/ 15

slide-2
SLIDE 2

Our main result

with N members

The first lattice-based group signature with logarithmic signature size, and security under the SIS and LWE assumptions in the Random Oracle Model.

hard problems logarithmic in N

Laguillaumie et al. LB Group Signature December 4, 2013 2/ 15

slide-3
SLIDE 3

Group Signatures

[ChaumVanHeyst91]

Group signatures allow any member of a group to anonymously and accountably sign on behalf of this group.

◮ Group manager (mpk, msk) + ski

KeyGen, Open

◮ Group members (ski)

Sign

◮ Anyone

Verify Group Members Group Manager Anyone KeyGen Sign Verify Open Security:

  • Anonymity
  • Traceability

Laguillaumie et al. LB Group Signature December 4, 2013 3/ 15

slide-4
SLIDE 4

Security: Anonymity and Traceability

Security requirements [BellareMicciancioWarinschi03]

◮ Anonymity

A given signature does not leak the identity of its originator. Two types: weak and full.

weak full Given ski for all users

  • pening oracle

Goal distinguish between two users

◮ Traceability

No collusion of malicious users can produce a valid signature that cannot be traced to one of them.

Given msk and ski of users in the collusion, Goal create a valid signature that doesn’t trace to someone not in the collusion (or nobody).

Laguillaumie et al. LB Group Signature December 4, 2013 4/ 15

slide-5
SLIDE 5

Applications

Need for authenticity and anonymity

◮ Anonymous credentials: anonymous use of certified attributes

◮ E.g.: student card - name, picture, date, grade...

◮ Traffic management (Vehicle Safety Communications project of

the U.S. Dept. of Transportation).

◮ Restrictive area access.

Laguillaumie et al. LB Group Signature December 4, 2013 5/ 15

slide-6
SLIDE 6

Prior works

◮ Introduced by [ChaumVanHest91], ◮ Generic construction [BellareMicciancioWarinschi03].

signature size Realization based

[BoyenWaters07]

constant number of elements

  • n bilinear maps

and [Groth07]

  • f a large algebraic group

[GordonKatz

Lattice-based

Vaikuntanathan10]

linear in N

[CamenischNeven

(number of group members)

Rückert10]

constructions Our result logarithmic in N

Laguillaumie et al. LB Group Signature December 4, 2013 6/ 15

slide-7
SLIDE 7

Lattice-Based Cryptography

From basic to very advanced primitives

◮ Public key encryption [Regev05, ...], ◮ Lyubashevsky signature scheme [Lyubashevsky12], ◮ Identity-based encryption [GentryPeikertVaikuntanathan08, ...], ◮ Attribute-based encryption [Boyen13, GorbunovVaikuntanathanWee13], ◮ Fully homomorphic encryption [Gentry09, ...].

Advantages of lattice-based primitives

◮ (Asymptotically) efficient, ◮ Security proofs from the hardness of LWE and SIS, ◮ Likely to resist quantum attacks.

Laguillaumie et al. LB Group Signature December 4, 2013 7/ 15

slide-8
SLIDE 8

SISβ and LWEα

Parameters: n dimension, m ≥ n, q modulus. For A ← U(Zm×n

q

):

Small Integer Solution Learning With Errors

x

A

= 0 mod q ,

A A

s

+ e

m n s ← U(Zn

q ),

e a small error ≈ αq.

Goal: Given A ← U(Zm×n

q

), Goal: Given ( A , A s + e ), find x s.t. 0 < x ≤ β. find s .

Laguillaumie et al. LB Group Signature December 4, 2013 8/ 15

slide-9
SLIDE 9

Lattice-Based Cryptography Toolbox: Trapdoors

◮ TrapGen (A, TA) such that TA is a short basis of the lattice

Λ⊥

q (A) = {x ∈ Zm : xT · A = 0

(mod q)}.

  • A public description of the lattice

TA short basis, kept secret

◮ Note that:

  • 1. Computing TA given A is hard,
  • 2. Constructing A together with TA is easy.

◮ With TA, we can sample short vectors in Λ⊥ q (A). ◮ Can add constraints:

find B such that BT · A = 0 (with trapdoor for A and B).

Laguillaumie et al. LB Group Signature December 4, 2013 9/ 15

slide-10
SLIDE 10

Group Signatures

A generic construction [BellareMicciancioWarinschi03]

Ingredients:

◮ Signature & Encryption schemes. ◮ Non-Interactive Zero Knowledge proof system.

Scheme:

◮ Public key: pk of Enc (pke) and Sign (pks). ◮ Opening key: secret key of Enc ske. ◮ User sk: signing key ski and Signsks(i) from group manager. ◮ To sign a message m by a member i:

  • 1. c = Encpke(i, Signsks(i), Signski(m)),
  • 2. π : ZKPoK of valid plaintext.
  • 3. Output Σ = (c, Π).

Construction not efficient (Generic ZKPoK). First attempt with lattices [GKV10]: size of signature = O(N).

Laguillaumie et al. LB Group Signature December 4, 2013 10/ 15

slide-11
SLIDE 11

Our construction

Ingredients

Certificate of users key to produce temporary certificate,

[Boyen2010]’s signature (standard model),

[GenPeiVai2008] variant of Dual-Regev encryption,

ZKPoK adapted from Lyubashevsky’s signature.

KeyGen

◮ N = 2ℓ group members, ◮ ℓ public matrices A, Ai’s and Bi’s such that BT i · Ai = 0 mod q. ◮ Each user is given a short basis Tid of a public lattice associated

to its identity (using TA): Aid =

  • A

A0 + ℓ

i=1 id[i]Ai

  • .

◮ Group manager secret key is {TBi}i.

Laguillaumie et al. LB Group Signature December 4, 2013 11/ 15

slide-12
SLIDE 12

Our construction

◮ Create a temporary membership certificate:

Boyen’s signature of id (using Tid).

◮ Encrypt this certificate: {ci}0≤i≤ℓ. ◮ Prove that the ciphertext encrypts a valid certificate

belonging to a group member: π0, {πOR,i}1≤i≤ℓ, πK.

◮ Message?

Σ =

  • {ci}0≤i≤ℓ, π0, {πOR,i}1≤i≤ℓ, πK
  • Laguillaumie et al.

LB Group Signature December 4, 2013 12/ 15

slide-13
SLIDE 13

Our construction

◮ Produce (x1||x2)T short such that:

x1T · A + x2T · (A0 + ℓ

i=1 id[i] · Ai) = 0 (mod q) ◮ Encrypt this certificate: {ci}0≤i≤ℓ. ◮ Prove that the ciphertext encrypts a valid certificate

belonging to a group member: π0, {πOR,i}1≤i≤ℓ, πK.

◮ Message?

Σ =

  • {ci}0≤i≤ℓ, π0, {πOR,i}1≤i≤ℓ, πK
  • Laguillaumie et al.

LB Group Signature December 4, 2013 12/ 15

slide-14
SLIDE 14

Our construction

◮ Produce (x1||x2)T short such that:

x1T · A + x2T · (A0 + ℓ

i=1 id[i] · Ai) = 0 (mod q) ◮ Encrypt x2 as c0 = B0 · s0 + x2

s0 ← ֓ U(Zn

q )

◮ For all i = 1, . . . , ℓ encrypt idi · x2 as

ci = Bi · s + p · ei + idi · x2

poly(n) ≪ p ≪ q

◮ Prove that the ciphertext encrypts a valid certificate

belonging to a group member: π0, {πOR,i}1≤i≤ℓ, πK.

◮ Message?

Σ =

  • {ci}0≤i≤ℓ, π0, {πOR,i}1≤i≤ℓ, πK
  • Laguillaumie et al.

LB Group Signature December 4, 2013 12/ 15

slide-15
SLIDE 15

Our construction

◮ Produce (x1||x2)T short such that:

x1T · A + x2T · (A0 + ℓ

i=1 id[i] · Ai) = 0 (mod q) ◮ Encrypt x2 as c0 = B0 · s0 + x2

s0 ← ֓ U(Zn

q )

◮ For all i = 1, . . . , ℓ encrypt idi · x2 as

ci = Bi · s + p · ei + idi · x2

poly(n) ≪ p ≪ q

◮ Generate a proof π0: c0 close to a point in the Zq-span of B0.

We have that ci and c0 encrypt the same x2 (idi = 1)

  • r ci encrypts 0

(idi = 0)

Generate a proof πOR,i of these relations (disjunctions). Generate a proof πK of knowledge of the ei’s and idi · x2’s

with their corresponding relation.

◮ Message?

Σ =

  • {ci}0≤i≤ℓ, π0, {πOR,i}1≤i≤ℓ, πK
  • Laguillaumie et al.

LB Group Signature December 4, 2013 12/ 15

slide-16
SLIDE 16

Our construction

◮ Produce (x1||x2)T short such that:

x1T · A + x2T · (A0 + ℓ

i=1 id[i] · Ai) = 0 (mod q) ◮ Encrypt x2 as c0 = B0 · s0 + x2

s0 ← ֓ U(Zn

q )

◮ For all i = 1, . . . , ℓ encrypt idi · x2 as

ci = Bi · s + p · ei + idi · x2

poly(n) ≪ p ≪ q

◮ Generate a proof π0: c0 close to a point in the Zq-span of B0.

We have that ci and c0 encrypt the same x2 (idi = 1)

  • r ci encrypts 0

(idi = 0)

Generate a proof πOR,i of these relations (disjunctions). Generate a proof πK of knowledge of the ei’s and idi · x2’s

with their corresponding relation.

◮ ZKPoK made non-interactive ZKPoK via Fiat-Shamir,

(incorporating the message in πK).

Σ =

  • {ci}0≤i≤ℓ, π0, {πOR,i}1≤i≤ℓ, πK
  • Laguillaumie et al.

LB Group Signature December 4, 2013 12/ 15

slide-17
SLIDE 17

Our construction

Verify:

◮ Check the proofs.

Open:

◮ Decrypt c0 ( x2) and check whether p−1ci or p−1(ci − x2) is

close to the Zq-span of Bi.

Laguillaumie et al. LB Group Signature December 4, 2013 13/ 15

slide-18
SLIDE 18

Our construction

Verify:

◮ Check the proofs.

Open:

◮ Decrypt c0 ( x2) and check whether p−1ci or p−1(ci − x2) is

close to the Zq-span of Bi.

◮ Size of the signatures: ˜

O(λ· log(N)).

◮ Size of the key of member i: ˜

O(λ2).

◮ λ = Θ(n) is the security parameter.

Laguillaumie et al. LB Group Signature December 4, 2013 13/ 15

slide-19
SLIDE 19

Anonymity and Traceability

In the random oracle model

Anonymity

Weak anonymity under LWE, and the simulation of the ZKPoK.

Traceability

Traceability under SIS, and extraction of information in the ZKPoK.

◮ We also provide a variant with full-anonymity,

⇒ the adversary has an opening oracle.

◮ Find a way to open adversarially chosen signatures,

⇒ using IND-CCA encryption.

Laguillaumie et al. LB Group Signature December 4, 2013 14/ 15

slide-20
SLIDE 20

Conclusion

Our result

◮ We give the first lattice-based signature with logarithmic

signature and public key sizes.

◮ Weak and full anonymity (LWE), traceability (SIS).

Open problems

◮ Practice, ◮ Ring variants of LWE and SIS, ◮ Improving the sizes of the signature and public key, ◮ Removing the random oracle model.

Laguillaumie et al. LB Group Signature December 4, 2013 15/ 15