Towards Tightly Secure Lattice Short Signature and Id-Based - - PowerPoint PPT Presentation

towards tightly secure lattice short signature and id
SMART_READER_LITE
LIVE PREVIEW

Towards Tightly Secure Lattice Short Signature and Id-Based - - PowerPoint PPT Presentation

Towards Tightly Secure Lattice Short Signature and Id-Based Encryption Xavier Boyen Qinyi Li QUT Asiacrypt16 2016-12-06 1 / 19 Motivations 1. Short lattice signature with tight security reduction w/o ROs. Techniques Short Sig? Tight


slide-1
SLIDE 1

Towards Tightly Secure Lattice Short Signature and Id-Based Encryption

Xavier Boyen Qinyi Li

QUT Asiacrypt’16

2016-12-06

1 / 19

slide-2
SLIDE 2

Motivations

  • 1. Short lattice signature with tight security reduction w/o ROs.

Techniques Short Sig? Tight Reduction? Lattice Mixing [Boy’10] ✔ ✘ Prefix Guessing [MP’12] ✔ ✘ Confined Guessing [BHJ+’13] ✔ ✘ Two-Tier Sig [BKKP’15] ✘ ✔

  • 2. Adaptively and tightly secure lattice IBE w/o. ROs.

Techniques Tight Reduction? Admissible Hash [CHKP’12] ✘ Lattice Mixing [ABB’10] ✘ Programmable Hash [ZCZ’16] ✘

2 / 19

slide-3
SLIDE 3

Tight Security Reductions

Theorem (template)

If an adversary A (t, ǫ)-breaks the scheme Π in the defined security model, there exists an algorithm B that (t′, ǫ′)-breaks some computation problem P where ǫ′ = ǫ/θ and t′ = t + o(t) for θ ≥ 1. θ measures tightness of reductions. Security parameter λ, number of adversarial queries Q

Tight reduction: θ = O(1); Almost tight reduction: θ = poly(λ); Lose reduction: θ = poly(Q).

Why tight reductions?

In practice: a tighter reduction allows shorter security parameters and, thus, higher efficiency. In theory: a tight reduction shows hardness of two computational problems is close.

3 / 19

slide-4
SLIDE 4

Our results

Fully, tightly secure short signature/IBE schemes w/o. RO from SIS/LWE assumption and a secure pseudorandom function (PRF). ǫPRF be the security level of a concrete PRF. ǫ, ǫ′ be security levels of our signature scheme and IBE scheme. ǫLWE, ǫSIS be the security levels of LWEn,q,α and SISn,q,β. ǫSIS + ǫPRF ≈ ǫ/2 ; ǫLWE + ǫPRF ≈ ǫ′/2

4 / 19

slide-5
SLIDE 5

Digital Signatures

Algorithm: ⊲ (sk, vk) ← KeyGen(1λ) ⊲ σ ← Sign(sk, m) ⊲ Ver(vk, m, σ) =

  • 1

accept reject Correctness: ⊲ ∀(sk, vk) ← KeyGen(1λ) Ver (vk, m, Sign(sk, m)) = 1 Security Model: (sk, vk) ← KeyGen(1λ) σi ← Sign(sk, mi) vk − − − − − − − − − − − → m1, . . . , mQ ← − − − − − − − − − − − σ1, . . . , σQ − − − − − − − − − − − − → Outputs (m∗, σ∗) Wins if m∗ = mi & Ver(vk, m∗, σ∗) = 1

5 / 19

slide-6
SLIDE 6

Our Method

We non-trivially combine the following techniques (from different contexts): Katz-Wang’s magic bit for tightly secure (full-domain hash)

  • signatures. [KW’03]

Two-sided lattice trapdoors. [GPV’08,ABB’10,Boy’10,MP’12] Boyen’s short lattice signature (in the plain model). [Boy’10] GSW-FHE/Fully key-homomorphic encryption. [GSW’13,BGG+14]

6 / 19

slide-7
SLIDE 7

Katz-Wang’s Magic Bit [KW’03]

An unpredictable bit bm ∈ {0, 1} associated with every m ∈ M: e.g. generated by a Pseudorandom Function (PRF) bm = PRF(K, m)

7 / 19

slide-8
SLIDE 8

Katz-Wang’s Magic Bit [KW’03]

An unpredictable bit bm ∈ {0, 1} associated with every m ∈ M: e.g. generated by a Pseudorandom Function (PRF) bm = PRF(K, m) In real schemes:

Each m has two signatures: σb and σ1−b for b ∈ {0, 1}; Signer can produce both; Only one of them is issued.

7 / 19

slide-9
SLIDE 9

Katz-Wang’s Magic Bit [KW’03]

An unpredictable bit bm ∈ {0, 1} associated with every m ∈ M: e.g. generated by a Pseudorandom Function (PRF) bm = PRF(K, m) In real schemes:

Each m has two signatures: σb and σ1−b for b ∈ {0, 1}; Signer can produce both; Only one of them is issued.

In security proofs: Query Simulator can create σbm for m, but not σ1−bm. (All queries can be answered.) Forgery Simulator can solve problem for forgery (m∗, σ1−bm∗), but fails for (m∗, σbm∗). (Adversary chooses correctly with prob. ≈ 1/2.)

7 / 19

slide-10
SLIDE 10

Short Integer Solution (SIS) Problem and Trapdoors

Definition

Let q, n ≥ 2, m = O(n log q) and β > 0. Given random A ∈ Zn×m

q

find a non-zero “short” vector σ ∈ Zm, where σ ≤ β, such that Aσ ≡ 0 (mod q)

8 / 19

slide-11
SLIDE 11

Short Integer Solution (SIS) Problem and Trapdoors

Definition

Let q, n ≥ 2, m = O(n log q) and β > 0. Given random A ∈ Zn×m

q

find a non-zero “short” vector σ ∈ Zm, where σ ≤ β, such that Aσ ≡ 0 (mod q) ⊲ Hard without Trapdoor: If A is chosen randomly, finding a solution x = 0 enables solving GapSVP problem with approximation factor ≈ β · √n on any n-dimensional lattice.

8 / 19

slide-12
SLIDE 12

Short Integer Solution (SIS) Problem and Trapdoors

Definition

Let q, n ≥ 2, m = O(n log q) and β > 0. Given random A ∈ Zn×m

q

find a non-zero “short” vector σ ∈ Zm, where σ ≤ β, such that Aσ ≡ 0 (mod q) ⊲ Hard without Trapdoor: If A is chosen randomly, finding a solution x = 0 enables solving GapSVP problem with approximation factor ≈ β · √n on any n-dimensional lattice. ⊲ Easy with Trapdoor: There is an algorithm TrapGen that generates a nearly random A and a trapdoor T. Using T one can find a “short”, non-zero solution.

8 / 19

slide-13
SLIDE 13

Short Integer Solution (SIS) Problem and Trapdoors

Definition

Let q, n ≥ 2, m = O(n log q) and β > 0. Given random A ∈ Zn×m

q

find a non-zero “short” vector σ ∈ Zm, where σ ≤ β, such that Aσ ≡ 0 (mod q) ⊲ Hard without Trapdoor: If A is chosen randomly, finding a solution x = 0 enables solving GapSVP problem with approximation factor ≈ β · √n on any n-dimensional lattice. ⊲ Easy with Trapdoor: There is an algorithm TrapGen that generates a nearly random A and a trapdoor T. Using T one can find a “short”, non-zero solution. ⊲ GPV-Style Signature Schemes [GPV’08]

8 / 19

slide-14
SLIDE 14

Short Integer Solution (SIS) Problem and Trapdoors

Definition

Let q, n ≥ 2, m = O(n log q) and β > 0. Given random A ∈ Zn×m

q

find a non-zero “short” vector σ ∈ Zm, where σ ≤ β, such that Aσ ≡ 0 (mod q) ⊲ Hard without Trapdoor: If A is chosen randomly, finding a solution x = 0 enables solving GapSVP problem with approximation factor ≈ β · √n on any n-dimensional lattice. ⊲ Easy with Trapdoor: There is an algorithm TrapGen that generates a nearly random A and a trapdoor T. Using T one can find a “short”, non-zero solution. ⊲ GPV-Style Signature Schemes [GPV’08]

A trapdoor T serves as a signing key;

8 / 19

slide-15
SLIDE 15

Short Integer Solution (SIS) Problem and Trapdoors

Definition

Let q, n ≥ 2, m = O(n log q) and β > 0. Given random A ∈ Zn×m

q

find a non-zero “short” vector σ ∈ Zm, where σ ≤ β, such that Aσ ≡ 0 (mod q) ⊲ Hard without Trapdoor: If A is chosen randomly, finding a solution x = 0 enables solving GapSVP problem with approximation factor ≈ β · √n on any n-dimensional lattice. ⊲ Easy with Trapdoor: There is an algorithm TrapGen that generates a nearly random A and a trapdoor T. Using T one can find a “short”, non-zero solution. ⊲ GPV-Style Signature Schemes [GPV’08]

A trapdoor T serves as a signing key; A valid solution σ serves as a signature.

8 / 19

slide-16
SLIDE 16

Two-Sided Lattice Trapdoors [ABB’10,Boy’10,MP’12]

9 / 19

slide-17
SLIDE 17

Two-Sided Lattice Trapdoors [ABB’10,Boy’10,MP’12]

Two-Sided Trapdoor

Let q, n ≥ 2, m = O(n log q), A, G ∈ Zn×m

q

  • matrix, secret low-norm

R ∈ Zm×m, publicly known trapdoor for G, and h ∈ Zq. Set F = [A|AR + hG] mod q

9 / 19

slide-18
SLIDE 18

Two-Sided Lattice Trapdoors [ABB’10,Boy’10,MP’12]

Two-Sided Trapdoor

Let q, n ≥ 2, m = O(n log q), A, G ∈ Zn×m

q

  • matrix, secret low-norm

R ∈ Zm×m, publicly known trapdoor for G, and h ∈ Zq. Set F = [A|AR + hG] mod q ⊲ Left trapdoor for real schemes:

If A has a trapdoor, F has a trapdoor for any h.

⊲ Right trapdoor for proofs:

h = 0: “right” trapdoor is (R, hG)

Generate signatures for F.

h = 0: no trapdoor

Can not generate signatures. A signature for F results in a SIS solution for A.

9 / 19

slide-19
SLIDE 19

Boyen’s Signature [Boy’10]

⊲ KeyGen(1λ)

vk: random Zn×m

q

  • matrices A, A0, A1, . . . , Aℓ;

sk: A’s trapdoor T.

⊲ Sign(sk, m)

m ∈ {0, 1}ℓ; m’s i-th bit is mi; Uses “left” trapdoor T to find a “short” solution σ s.t. Fσ =

  • A|A0 +

  • i=1

miAi

  • σ = 0

(mod q)

⊲ Ver(vk, σ, m)

Check if σ is “short” and non-zero; Check if Fσ = 0.

10 / 19

slide-20
SLIDE 20

Proof Idea of Boyen’s Signature

A is a SIS challenge. Let h1, . . . , hℓ ∈ Zq be secret. For any querying message m ∈ {0, 1}ℓ, set F = [A|ARm + (1 + Σℓ

i=1mihi)G]

= [A|ARm + H(m)G] Rm depends on m and is “short”, and ARm + (1 + Σℓ

i=1mihi)G ≈s A0 + Σℓ i=1miAi

11 / 19

slide-21
SLIDE 21

Proof Idea of Boyen’s Signature

A is a SIS challenge. Let h1, . . . , hℓ ∈ Zq be secret. For any querying message m ∈ {0, 1}ℓ, set F = [A|ARm + (1 + Σℓ

i=1mihi)G]

= [A|ARm + H(m)G] Rm depends on m and is “short”, and ARm + (1 + Σℓ

i=1mihi)G ≈s A0 + Σℓ i=1miAi

Apply the principle of two-sided trapdoor:

11 / 19

slide-22
SLIDE 22

Proof Idea of Boyen’s Signature

A is a SIS challenge. Let h1, . . . , hℓ ∈ Zq be secret. For any querying message m ∈ {0, 1}ℓ, set F = [A|ARm + (1 + Σℓ

i=1mihi)G]

= [A|ARm + H(m)G] Rm depends on m and is “short”, and ARm + (1 + Σℓ

i=1mihi)G ≈s A0 + Σℓ i=1miAi

Apply the principle of two-sided trapdoor: H(m) = 0 Forgeries of m allows SIS solutions;

11 / 19

slide-23
SLIDE 23

Proof Idea of Boyen’s Signature

A is a SIS challenge. Let h1, . . . , hℓ ∈ Zq be secret. For any querying message m ∈ {0, 1}ℓ, set F = [A|ARm + (1 + Σℓ

i=1mihi)G]

= [A|ARm + H(m)G] Rm depends on m and is “short”, and ARm + (1 + Σℓ

i=1mihi)G ≈s A0 + Σℓ i=1miAi

Apply the principle of two-sided trapdoor: H(m) = 0 Forgeries of m allows SIS solutions; H(m) = 0 Generate signatures using “right” trapdoor.

11 / 19

slide-24
SLIDE 24

Proof Idea of Boyen’s Signature

A is a SIS challenge. Let h1, . . . , hℓ ∈ Zq be secret. For any querying message m ∈ {0, 1}ℓ, set F = [A|ARm + (1 + Σℓ

i=1mihi)G]

= [A|ARm + H(m)G] Rm depends on m and is “short”, and ARm + (1 + Σℓ

i=1mihi)G ≈s A0 + Σℓ i=1miAi

Apply the principle of two-sided trapdoor: H(m) = 0 Forgeries of m allows SIS solutions; H(m) = 0 Generate signatures using “right” trapdoor. Simulator hopes:

11 / 19

slide-25
SLIDE 25

Proof Idea of Boyen’s Signature

A is a SIS challenge. Let h1, . . . , hℓ ∈ Zq be secret. For any querying message m ∈ {0, 1}ℓ, set F = [A|ARm + (1 + Σℓ

i=1mihi)G]

= [A|ARm + H(m)G] Rm depends on m and is “short”, and ARm + (1 + Σℓ

i=1mihi)G ≈s A0 + Σℓ i=1miAi

Apply the principle of two-sided trapdoor: H(m) = 0 Forgeries of m allows SIS solutions; H(m) = 0 Generate signatures using “right” trapdoor. Simulator hopes:

For all Q queries: H(m) = 0 (mod q), happens with prob. (1 − 1/q)Q.

11 / 19

slide-26
SLIDE 26

Proof Idea of Boyen’s Signature

A is a SIS challenge. Let h1, . . . , hℓ ∈ Zq be secret. For any querying message m ∈ {0, 1}ℓ, set F = [A|ARm + (1 + Σℓ

i=1mihi)G]

= [A|ARm + H(m)G] Rm depends on m and is “short”, and ARm + (1 + Σℓ

i=1mihi)G ≈s A0 + Σℓ i=1miAi

Apply the principle of two-sided trapdoor: H(m) = 0 Forgeries of m allows SIS solutions; H(m) = 0 Generate signatures using “right” trapdoor. Simulator hopes:

For all Q queries: H(m) = 0 (mod q), happens with prob. (1 − 1/q)Q. For forgery (σ, m): H(m) = 0 (mod q), happens with prob. 1/q.

11 / 19

slide-27
SLIDE 27

Proof Idea of Boyen’s Signature

A is a SIS challenge. Let h1, . . . , hℓ ∈ Zq be secret. For any querying message m ∈ {0, 1}ℓ, set F = [A|ARm + (1 + Σℓ

i=1mihi)G]

= [A|ARm + H(m)G] Rm depends on m and is “short”, and ARm + (1 + Σℓ

i=1mihi)G ≈s A0 + Σℓ i=1miAi

Apply the principle of two-sided trapdoor: H(m) = 0 Forgeries of m allows SIS solutions; H(m) = 0 Generate signatures using “right” trapdoor. Simulator hopes:

For all Q queries: H(m) = 0 (mod q), happens with prob. (1 − 1/q)Q. For forgery (σ, m): H(m) = 0 (mod q), happens with prob. 1/q. Gives a loose reduction: θ ≈

  • (1 − 1/q)Q · 1/q

−1 = poly(Q).

11 / 19

slide-28
SLIDE 28

Magic Bit bm Comes to Play

12 / 19

slide-29
SLIDE 29

Magic Bit bm Comes to Play

Our Idea

b ∈ {0, 1}, bm = PRF(K, m), “short” matrices Rm, R′

  • m. Replace H(m) by

1 − b − bm ∈ {0, 1}. Set (simulated) vk: Fb = [A|ARm + (1 − b − bm)G] F1−b = [A|AR′

m + (b − bm)G]

12 / 19

slide-30
SLIDE 30

Magic Bit bm Comes to Play

Our Idea

b ∈ {0, 1}, bm = PRF(K, m), “short” matrices Rm, R′

  • m. Replace H(m) by

1 − b − bm ∈ {0, 1}. Set (simulated) vk: Fb = [A|ARm + (1 − b − bm)G] F1−b = [A|AR′

m + (b − bm)G]

As required by Katz-Wang proof:

12 / 19

slide-31
SLIDE 31

Magic Bit bm Comes to Play

Our Idea

b ∈ {0, 1}, bm = PRF(K, m), “short” matrices Rm, R′

  • m. Replace H(m) by

1 − b − bm ∈ {0, 1}. Set (simulated) vk: Fb = [A|ARm + (1 − b − bm)G] F1−b = [A|AR′

m + (b − bm)G]

As required by Katz-Wang proof: ⊲ Generating only “one” signature: σbm from Fbm:

Can not produce σ1−bm since F1−bm looses trapdoor; Allows answering all signing queries.

12 / 19

slide-32
SLIDE 32

Magic Bit bm Comes to Play

Our Idea

b ∈ {0, 1}, bm = PRF(K, m), “short” matrices Rm, R′

  • m. Replace H(m) by

1 − b − bm ∈ {0, 1}. Set (simulated) vk: Fb = [A|ARm + (1 − b − bm)G] F1−b = [A|AR′

m + (b − bm)G]

As required by Katz-Wang proof: ⊲ Generating only “one” signature: σbm from Fbm:

Can not produce σ1−bm since F1−bm looses trapdoor; Allows answering all signing queries.

⊲ “Two” valid signatures for m∗.

Forgery (σ∗, m∗): σ∗ =

  • σbm∗

Fail σ1−bm∗ Solve SIS bm∗ = PRF(K, m∗) is unpredictable. With prob. ≈ 1/2, solve SIS.

12 / 19

slide-33
SLIDE 33

Embedding PRF into Fb

Magic bit bm = PRF(K, m). For public message m and secret K, we need to somehow create ARm + PRF(K, m)G

13 / 19

slide-34
SLIDE 34

Embedding PRF into Fb

Magic bit bm = PRF(K, m). For public message m and secret K, we need to somehow create ARm + PRF(K, m)G PRF(·, ·) can be expressed as a small-depth Boolean circuit: CPRF : {0, 1}|K| × {0, 1}|m| → {0, 1}

13 / 19

slide-35
SLIDE 35

Embedding PRF into Fb

Magic bit bm = PRF(K, m). For public message m and secret K, we need to somehow create ARm + PRF(K, m)G PRF(·, ·) can be expressed as a small-depth Boolean circuit: CPRF : {0, 1}|K| × {0, 1}|m| → {0, 1} ARm + PRF(K, m)G is a ciphertext of FHE [GSW13]/ public key of fully key-homomorphic encryption [BGG+14].

13 / 19

slide-36
SLIDE 36

Embedding PRF into Fb (cont.)

Let g(u, v) = w be a logical gate. Using evaluation algorithm of GSW-FHE/fully key-homomorphic encryption, given Au = ARu + uG ; Av = ARv + vG

  • ne can deterministically compute unique matrix Aw = ARw + wG.

14 / 19

slide-37
SLIDE 37

Embedding PRF into Fb (cont.)

Let g(u, v) = w be a logical gate. Using evaluation algorithm of GSW-FHE/fully key-homomorphic encryption, given Au = ARu + uG ; Av = ARv + vG

  • ne can deterministically compute unique matrix Aw = ARw + wG.

We “encrypt” PRF key K = k1k2, . . . , kt ∈ {0, 1}t as Bki = ARki + kiG

14 / 19

slide-38
SLIDE 38

Embedding PRF into Fb (cont.)

Let g(u, v) = w be a logical gate. Using evaluation algorithm of GSW-FHE/fully key-homomorphic encryption, given Au = ARu + uG ; Av = ARv + vG

  • ne can deterministically compute unique matrix Aw = ARw + wG.

We “encrypt” PRF key K = k1k2, . . . , kt ∈ {0, 1}t as Bki = ARki + kiG We “encrypt” message bit mi by Cmi = ARmi + miG.

14 / 19

slide-39
SLIDE 39

Embedding PRF into Fb (cont.)

Let g(u, v) = w be a logical gate. Using evaluation algorithm of GSW-FHE/fully key-homomorphic encryption, given Au = ARu + uG ; Av = ARv + vG

  • ne can deterministically compute unique matrix Aw = ARw + wG.

We “encrypt” PRF key K = k1k2, . . . , kt ∈ {0, 1}t as Bki = ARki + kiG We “encrypt” message bit mi by Cmi = ARmi + miG. Using Bk1, . . . , Bkt and Cm1, . . . , Cmℓ and circuit CPRF, APRF,K,m = ARm + PRF(K, m)G is publicly computable.

14 / 19

slide-40
SLIDE 40

Our Signature Scheme

⊲ KeyGen(1λ) → (vk, sk): vk = (CPRF, A, A0, A1, Bk1, . . . , Bkt, C0, C1) ; sk = (TA, K) ⊲ Sign(sk, m) → σ

Set bm = PRF(K, m); Evaluating APRF,K,m = Eval(CPRF, Ak1, . . . , Akt, Cm1, . . . , Cmℓ); Set Fbm = [A|A1−bm − APRF,K,m] and use TA to output σ = σbm s.t. Fbm · σ = 0 (mod q)

⊲ Ver(vk, m, σ) → 0/1

Check if σ is small and non-zero; Check if F0 · σ = 0 (mod q) or F1 · σ = 0 (mod q)

⋆ Using TA, one can generate signatures for Fbm and F1−bm. But only “one” of them is issued.

15 / 19

slide-41
SLIDE 41

An IBE Scheme

Our signature is“Hash-and-Sign” signature. Following ideas of [GPV08,ABB10,Boy10], we obtain an IBE scheme.

16 / 19

slide-42
SLIDE 42

An IBE Scheme

Our signature is“Hash-and-Sign” signature. Following ideas of [GPV08,ABB10,Boy10], we obtain an IBE scheme. ⊲ KeyGen(Msk, id) There are “two” keys for one identity. We only give “one” identity key skid,bid for Fbid, which is similar to our signature scheme.

16 / 19

slide-43
SLIDE 43

An IBE Scheme

Our signature is“Hash-and-Sign” signature. Following ideas of [GPV08,ABB10,Boy10], we obtain an IBE scheme. ⊲ KeyGen(Msk, id) There are “two” keys for one identity. We only give “one” identity key skid,bid for Fbid, which is similar to our signature scheme. ⊲ Encrypt(Pub, id, Msg) We give two “dual-Regev” ciphrtexts for F0, F1 Ctx0 = s⊤

0 · F0 + e⊤ 0 = s⊤ 0 [A|A1 + APRF,K,id] + e⊤

Ctx1 = s⊤

1 · F1 + e⊤ 1 = s⊤ 1 [A|A0 + APRF,K,id] + e⊤ 1

with adjusted noise vectors e0, e1.

16 / 19

slide-44
SLIDE 44

An IBE Scheme

Our signature is“Hash-and-Sign” signature. Following ideas of [GPV08,ABB10,Boy10], we obtain an IBE scheme. ⊲ KeyGen(Msk, id) There are “two” keys for one identity. We only give “one” identity key skid,bid for Fbid, which is similar to our signature scheme. ⊲ Encrypt(Pub, id, Msg) We give two “dual-Regev” ciphrtexts for F0, F1 Ctx0 = s⊤

0 · F0 + e⊤ 0 = s⊤ 0 [A|A1 + APRF,K,id] + e⊤

Ctx1 = s⊤

1 · F1 + e⊤ 1 = s⊤ 1 [A|A0 + APRF,K,id] + e⊤ 1

with adjusted noise vectors e0, e1. ⊲ Decrypt(skid, Ctx) Decryptor uses skid to try both ciphertexts.

16 / 19

slide-45
SLIDE 45

Caveats

⋆ Katz-Wang uses PRFs for making signing stateless. ⋆ The state-of-art lattice-based PRFs, e.g. [BPR’12,BP’14], require slightly stronger LWE assumptions. ⋆ Want an efficient IBE scheme w/o ROs now? Pick selectively secure schemes and do “complexity leveraging” [BB’04,BB’11].

⋆⋆ DO take “leveraging slack” into account setting parameters! ⋆⋆ Still more efficient than native adaptive security (usually)

17 / 19

slide-46
SLIDE 46

Conclusion

We proposed a lattice-based signature/IBE scheme with tight security reduction in the plain model, through a non-trivial combination of the following techniques coming from different contexts:

Katz-Wang’s tightly secure Full-Domain Hash signatures in the Random Oracle model. Two-sided lattice trapdoor techniques and Boyen’s lattice signature. GSW-FHE/fully key-homomorphic encryption for fully homomorphic encryption and attribute-based encryption for circuits.

Our signature scheme has both tight security reduction and short signatures. Our IBE scheme archives tight security and unbounded collusion in the plain model for the first time among other lattice-based IBE schemes.

18 / 19

slide-47
SLIDE 47

Towards Tightly Secure Lattice Short Signature and IBE

Xavier Boyen, Qinyi Li

Thank you!

19 / 19