limitations on transformations from composite order to
play

Limitations on Transformations from Composite-Order to Prime-Order - PowerPoint PPT Presentation

Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures Sarah Meiklejohn (UC San Diego) Hovav Shacham (UC San Diego) David Mandell Freeman (Stanford University) 1 Elliptic curves:


  1. Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures Sarah Meiklejohn (UC San Diego) Hovav Shacham (UC San Diego) David Mandell Freeman (Stanford University) 1

  2. Elliptic curves: what are they and why do we care? Bilinear groups are cyclic groups G of some finite order that admit a nondegenerate bilinear map e: G × G → G T • Bilinear: e(x a ,y) = e(x,y) a = e(x,y a ), nondegenerate: e(x,y) = 1 for all y ⇔ x = 1 • Composite order: |G| = N (often use N = pq), prime order: |G| = p 2

  3. Elliptic curves: what are they and why do we care? Bilinear groups are cyclic groups G of some finite order that admit a nondegenerate bilinear map e: G × G → G T • Bilinear: e(x a ,y) = e(x,y) a = e(x,y a ), nondegenerate: e(x,y) = 1 for all y ⇔ x = 1 • Composite order: |G| = N (often use N = pq), prime order: |G| = p 3

  4. Elliptic curves: what are they and why do we care? Bilinear groups are cyclic groups G of some finite order that admit a nondegenerate bilinear map e: G × G → G T • Bilinear: e(x a ,y) = e(x,y) a = e(x,y a ), nondegenerate: e(x,y) = 1 for all y ⇔ x = 1 • Composite order: |G| = N (often use N = pq), prime order: |G| = p Historically, we use elliptic curves for two main reasons: • Functionality: IBE [BF01], functional encryption, etc. • Efficiency: discrete log problem is harder, can use smaller parameters 4

  5. Outline 5

  6. Outline Divide the talk into three main parts: 5

  7. Outline Divide the talk into three main parts: • The setting: work in composite-order bilinear groups 5

  8. Outline Divide the talk into three main parts: • The setting: work in composite-order bilinear groups • The application: a round-optimal blind signature scheme 5

  9. Outline Divide the talk into three main parts: • The setting: work in composite-order bilinear groups • The application: a round-optimal blind signature scheme • The problem: what if we want to instantiate our scheme in a prime-order setting instead? 5

  10. The setting: composite-order groups • Cyclic groups G and G T of order N = pq, G = G p × G q but p,q are secret • Bilinear map e: G × G → G T • Often use the subgroup hiding assumption: element of G q indistinguishable from an element of G • This setting has proved to be quite useful: 6

  11. The setting: composite-order groups • Cyclic groups G and G T of order N = pq, G = G p × G q but p,q are secret • Bilinear map e: G × G → G T • Often use the subgroup hiding assumption: element of G q indistinguishable from an element of G • This setting has proved to be quite useful: “somewhat” homomorphic encryption [BGN05] 6

  12. The setting: composite-order groups • Cyclic groups G and G T of order N = pq, G = G p × G q but p,q are secret • Bilinear map e: G × G → G T • Often use the subgroup hiding assumption: element of G q indistinguishable from an element of G • This setting has proved to be quite useful: traitor “somewhat” tracing homomorphic [BSW06] zero knowledge encryption [GOS06,GS08] group [BGN05] signatures predicate [BW07] ring encryption signatures HIBE [KSW08] [SW07] [LW10] 6

  13. The setting: composite-order groups • Cyclic groups G and G T of order N = pq, G = G p × G q but p,q are secret • Bilinear map e: G × G → G T • Often use the subgroup hiding assumption: element of G q indistinguishable from an element of G • This setting has proved to be quite useful: traitor “somewhat” tracing homomorphic [BSW06] zero knowledge encryption [GOS06,GS08] group [BGN05] signatures blind predicate [BW07] signatures ring encryption [MSF10] signatures HIBE [KSW08] [SW07] [LW10] 6

  14. Composite- vs. prime-order groups 7

  15. Composite- vs. prime-order groups Why would we switch to prime-order groups? 7

  16. Composite- vs. prime-order groups Why would we switch to prime-order groups? • Composite-order means bigger : in prime-order groups, can use group of size ~160 bits; in composite-order groups need ~1024 bits (discrete log vs. factoring) • In addition, there aren’t many composite-order curve families (need to use supersingular vs. ordinary curves) 7

  17. Composite- vs. prime-order groups Why would we switch to prime-order groups? • Composite-order means bigger : in prime-order groups, can use group of size ~160 bits; in composite-order groups need ~1024 bits (discrete log vs. factoring) • In addition, there aren’t many composite-order curve families (need to use supersingular vs. ordinary curves) Previously, people converted schemes in an ad-hoc way [W09,GSW09,LW10] Freeman [F10] is first to provide a general conversion method 7

  18. The application: round-optimal blind signatures 8

  19. The application: round-optimal blind signatures Signatures: user U obtains a signature σ on a message m from a signer S 8

  20. The application: round-optimal blind signatures Signatures: user U obtains a signature σ on a message m from a signer S 8

  21. The application: round-optimal blind signatures Signatures: user U obtains a signature σ on a message m from a signer S m 8

  22. The application: round-optimal blind signatures Signatures: user U obtains a signature σ on a message m from a signer S m σ 8

  23. The application: round-optimal blind signatures Signatures: user U obtains a signature σ on a message m from a signer S m σ In a blind signature scheme [Ch82], user gets this signature without the signer learning which message it signed! 8

  24. The application: round-optimal blind signatures Signatures: user U obtains a signature σ on a message m from a signer S m σ In a blind signature scheme [Ch82], user gets this signature without the signer learning which message it signed! req 8

  25. The application: round-optimal blind signatures Signatures: user U obtains a signature σ on a message m from a signer S m σ In a blind signature scheme [Ch82], user gets this signature without the signer learning which message it signed! req σ ´ 8

  26. The application: round-optimal blind signatures Signatures: user U obtains a signature σ on a message m from a signer S m σ In a blind signature scheme [Ch82], user gets this signature without the signer learning which message it signed! req σ σ ´ 8

  27. The application: round-optimal blind signatures Signatures: user U obtains a signature σ on a message m from a signer S m σ In a blind signature scheme [Ch82], user gets this signature without the signer learning which message it signed! req σ σ ´ Same σ as in the unblinded case above 8

  28. The application: round-optimal blind signatures Signatures: user U obtains a signature σ on a message m from a signer S m σ In a blind signature scheme [Ch82], user gets this signature without the signer learning which message it signed! req σ σ ´ Same σ as in the unblinded case above Applications: electronic cash, anonymous credentials, etc. 8

  29. The application: round-optimal blind signatures Signatures: user U obtains a signature σ on a message m from a signer S m σ In a blind signature scheme [Ch82], user gets this signature without the signer learning which message it signed! req σ σ ´ Same σ as in the unblinded case above Applications: electronic cash, anonymous credentials, etc. Still a very active research area [O06,F09,AO10,AHO10,R10,GRSSU11] 8

  30. Our scheme: ideas 9

  31. Our scheme: ideas Simple construction (inspired by [BW06]): combine Waters signature [W07] with Groth-Sahai zero-knowledge proofs [GS08] 9

  32. Our scheme: ideas Simple construction (inspired by [BW06]): combine Waters signature [W07] with Groth-Sahai zero-knowledge proofs [GS08] Recap of Groth-Sahai setting: 9

  33. Our scheme: ideas Simple construction (inspired by [BW06]): combine Waters signature [W07] with Groth-Sahai zero-knowledge proofs [GS08] Recap of Groth-Sahai setting: e: G × G → G T 9

  34. Our scheme: ideas Simple construction (inspired by [BW06]): combine Waters signature [W07] with Groth-Sahai zero-knowledge proofs [GS08] Recap of Groth-Sahai setting: e: G × G → G T τ ↓ ................. E: B × B → B T 9

  35. Our scheme: ideas Simple construction (inspired by [BW06]): combine Waters signature [W07] with Groth-Sahai zero-knowledge proofs [GS08] Recap of Groth-Sahai setting: e: G × G → G T τ ↓ ................. E: B × B → B T • Abstract assumption: B = B 1 × B 2 , where B 1 is indistinguishable from B • Subgroup hiding: set B = G = G p × G q 9

  36. Our scheme: ideas Simple construction (inspired by [BW06]): combine Waters signature [W07] with Groth-Sahai zero-knowledge proofs [GS08] Recap of Groth-Sahai setting: e: G × G → G T τ ↓ ................. E: B × B → B T • Abstract assumption: B = B 1 × B 2 , where B 1 is indistinguishable from B • Subgroup hiding: set B = G = G p × G q • DLIN: rank 2 matrix ~ rank 3 matrix for a 3 × 3 matrix over F p 9

  37. Our scheme: ideas Simple construction (inspired by [BW06]): combine Waters signature [W07] with Groth-Sahai zero-knowledge proofs [GS08] Recap of Groth-Sahai setting: e: G × G → G T τ ↓ ................. E: B × B → B T • Abstract assumption: B = B 1 × B 2 , where B 1 is indistinguishable from B • Subgroup hiding: set B = G = G p × G q • DLIN: rank 2 matrix ~ rank 3 matrix for a 3 × 3 matrix over F p • Benefits: can use composite- and prime-order settings 9

  38. Our scheme: sketch 10

Recommend


More recommend