Partitioning via Non-Linear Polynomial Functions: More Compact IBEs - - PowerPoint PPT Presentation

partitioning via non linear polynomial functions more
SMART_READER_LITE
LIVE PREVIEW

Partitioning via Non-Linear Polynomial Functions: More Compact IBEs - - PowerPoint PPT Presentation

Partitioning via Non-Linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps Shuichi Katsumata (The University of Tokyo) Shota Yamada (AIST) ASIACRYPT Born in 1991 (Japan) Me Born in 1991 (Japan) Background


slide-1
SLIDE 1

Partitioning via Non-Linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps

Shuichi Katsumata (The University of Tokyo) Shota Yamada (AIST)

slide-2
SLIDE 2

ASIACRYPT Born in 1991 (Japan) Me Born in 1991 (Japan)

slide-3
SLIDE 3

Background

Can we achieve more compact IBEs??

 From Lattices  From Bilinear Maps Adaptively secure identity-based encryption

Adaptively secure lattice IBE requires long public parameters compared to selectively secure ones. Adaptively secure bilinear map-based IBE under search problems require long public parameters.

Topic of This Talk

slide-4
SLIDE 4

Our Results: New Adaptively Secure IBEs

  • Both based on partitioning technique with

non-linear functions

  • New IBE from ideal lattices:

– Improve currently best scheme of [Yam16]: super-poly modulus → poly modulus RLWE – Use commutativity of Ring in an essential way

  • New IBE from bilinear maps:

– First scheme with sub-linear-size mpk from search problem rather than decisional problem – Boneh-Boyen technique in the construction rather than in the security proof

slide-5
SLIDE 5

Agenda

I. Preliminaries II. Lattice Section

 Previous Works  Our Work

  • III. Bilinear Map Section

 Previous Works  Our Work

  • IV. Summary
slide-6
SLIDE 6

Adaptive Security for IBE

slide-7
SLIDE 7

Agenda

I. Preliminaries II. Lattice Section

 Previous Works  Our Work

  • III. Bilinear Map Section

 Previous Works  Our Work

  • IV. Summary
slide-8
SLIDE 8

Template Construction (1)

A u e

Secret key for ID: short vector e

KeyGen

u

H(ID)

A

A lattice for ID

slide-9
SLIDE 9

Template Construction

A u e

Secret key for ID: short vector e

KeyGen

u

H(ID)

A

A lattice for ID

A

H(ID)

s

x

s u

Small errors

Encryption

slide-10
SLIDE 10

Partitioning Technique We embed the problem instance into the public parameters so that H(ID)

A RID

G In the simulation, We hope

Template for Security Proof

Publicly Computable

slide-11
SLIDE 11

Partitioning Technique We embed the problem instance into the public parameters so that H(ID)

A RID

G In the simulation, We hope

Gadget matrix

Template for Security Proof

Publicly Computable Simulator’s Trapdoor (Needs to be “small”)

Only Known to Simulator

slide-12
SLIDE 12

Hashing the Identities

H(ID) Bi B0

  • Ex. [ABB10]+[Boy10]

i∈S(ID)

B5 B1 B2 B3 B4 B6

0 1 0 0 1 1

S(ID)={2, 5, 6}

Example) ID Length 𝜆 = 6

ID=010011

𝜆: ID Length

slide-13
SLIDE 13

Hashing the Identities

H(ID) Bi B0

i∈S(ID)

Bi

A Ri

G 𝑧𝑗 In Simulation

A RID

G

𝑧0 +

i∈S(ID)

𝑧𝑗

Set Then H(ID)

  • Ex. [ABB10]+[Boy10]

𝜆: ID Length

slide-14
SLIDE 14

Hashing the Identities

H(ID) Bi B0

𝑗∈𝑇(𝐽𝐸)

Bi

A Ri

G 𝑧𝑗 In Simulation

A RID

G

𝑧0 +

𝑗∈𝑇(𝐽𝐸)

𝑧𝑗

Set Then H(ID) Long public key! #matrices linear in ID length F(ID): Linear Function

  • Ex. [ABB10]+[Boy10]

𝜆: ID Length

slide-15
SLIDE 15

H(ID) B1,i B0

  • Ex. [Yam16] (Currently, the most (asymptotically) compact lattice-based IBE)

(𝑗,𝑘)∈𝑇(𝐽𝐸)

Hashing the Identities

(𝐁, 𝐯, 𝐂0 )

𝐂1,1, ⋯ , 𝐂1, 𝜆 𝐂2,1, ⋯ , 𝐂2, 𝜆 B2,j G−1( ) Create 𝜆 matrices from 2 𝜆 matrices

Artificial 𝝀 Matrices

slide-16
SLIDE 16

H(ID) B1,i B0

(𝑗,𝑘)∈𝑇(𝐽𝐸)

Hashing the Identities

(𝐁, 𝐯, 𝐂0 )

𝐂1,1, ⋯ , 𝐂1, 𝜆 𝐂2,1, ⋯ , 𝐂2, 𝜆 B2,j G−1( ) Bi,j

A Ri,j

G 𝑧𝑗,𝑘 In Simulation Set Then

A RID

𝑧0 +

𝑗∈𝑇(𝐽𝐸)

𝑧1,𝑗𝑧2,𝑘

H(ID) G

  • Ex. [Yam16] (Currently, the most (asymptotically) compact lattice-based IBE)
slide-17
SLIDE 17

H(ID) B1,i B0

(𝑗,𝑘)∈𝑇(𝐽𝐸)

Hashing the Identities

(𝐁, 𝐯, 𝐂0 )

𝐂1,1, ⋯ , 𝐂1, 𝜆 𝐂2,1, ⋯ , 𝐂2, 𝜆 B2,j G−1( ) Bi,j

A Ri,j

G 𝑧𝑗,𝑘 In Simulation Set Then

A RID

𝑧0 +

𝑗∈𝑇(𝐽𝐸)

𝑧1,𝑗𝑧2,𝑘

H(ID) G Shorter public key! #matrices sqrt in ID length F(ID): Non-Linear Function

  • Ex. [Yam16] (Currently, the most (asymptotically) compact lattice-based IBE)
slide-18
SLIDE 18

H(ID) B1,i B0

(𝑗,𝑘)∈𝑇(𝐽𝐸)

Hashing the Identities

(𝐁, 𝐯, 𝐂0 )

𝐂1,1, ⋯ , 𝐂1, 𝜆 𝐂2,1, ⋯ , 𝐂2, 𝜆 B2,j G−1( ) Bi,j

A Ri,j

G 𝑧𝑗,𝑘 In Simulation Set Then

A RID

𝑧0 +

𝑗∈𝑇(𝐽𝐸)

𝑧1,𝑗𝑧2,𝑘

H(ID) G Shorter public key! #matrices sqrt in ID length F(ID): Non-Linear Function

Downside

For the scheme to be secure, the modulus size 𝒓 must be super-poly

  • Ex. [Yam16] (Currently, the most (asymptotically) compact lattice-based IBE)
slide-19
SLIDE 19

Agenda

I. Preliminaries II. Lattice Section

 Previous Works  Our Work

  • III. Bilinear Map Section

 Previous Works  Our Work

  • IV. Summary
slide-20
SLIDE 20

A Closer Look at [Yam16]

In Simulation Several conditions on 𝐒ID and 𝑧𝑗,𝑘’s must hold for the security proof to hold. H(ID)

A RID

G

slide-21
SLIDE 21
  • For the simulation to succeed 𝑧1,𝑘 must grow

proportionally with Q (#query).

RID

Main Obstacle of [Yam16]

slide-22
SLIDE 22
  • For the simulation to succeed 𝑧1,𝑘 must grow

proportionally with Q (#query).

  • For the trapdoor 𝐒ID to work, 𝑧1,𝑗 must be

small compared with q (modulus size).

RID

Main Obstacle of [Yam16]

Simulator’s “small” Trapdoor

slide-23
SLIDE 23
  • For the simulation to succeed 𝑧1,𝑘 must grow

proportionally with Q (#query).

  • For the trapdoor 𝐒ID to work, 𝑧1,𝑗 must be

small compared with q (modulus size).

RID

Main Obstacle of [Yam16]

∀Q :poly(n) < y < q q needs to be super-poly(n)!!

slide-24
SLIDE 24

Initial Idea (that doesn’t quite work)

Extend the definition of 𝑧𝑗,𝑘 ∈ ℤ𝑟 to 𝐙1,𝑘 ∈ ℤ𝑟

𝑜×𝑜

𝐂𝑗,𝑘 = 𝐁𝐒𝑗,𝑘 + 𝑧𝑗,𝑘𝐇 𝐂𝑗,𝑘 = 𝐁𝐒𝑗,𝑘 + 𝐙𝑗,𝑘𝐇

Before

𝑧𝑗,𝑘 “pack” Q in one entry

After

𝐙𝑗,𝑘

“pack” Q in 𝑜2 entries

  • 𝑧𝑗,𝑘 needs to be big.

=> Big modulus q

  • Each entry of 𝐙𝑗,𝑘 can be
  • small. => Small modulus q
slide-25
SLIDE 25

Why it doesn’t work

𝐂 = 𝐁𝐒 + 𝐙𝐇, 𝐂′ = 𝐁𝐒′ + 𝐙′𝐇

We can’t compute the hash homomorphically!! Since we loose commutativity of 𝐁 and 𝐙𝑗,𝑘 . Let

slide-26
SLIDE 26

Why it doesn’t work

𝐂 = 𝐁𝐒 + 𝐙𝐇, 𝐂′ = 𝐁𝐒′ + 𝐙′𝐇

We can’t compute the hash homomorphically!! Since we loose commutativity of 𝐁 and 𝐙𝑗,𝑘 .

𝐂 ⋅ 𝐇−1 𝐂′ = 𝐁𝐒 + 𝐙𝐇 ⋅ 𝐇−1 𝐂′

Let

slide-27
SLIDE 27

Why it doesn’t work

𝐂 = 𝐁𝐒 + 𝐙𝐇, 𝐂′ = 𝐁𝐒′ + 𝐙′𝐇

We can’t compute the hash homomorphically!! Since we loose commutativity of 𝐁 and 𝐙𝑗,𝑘 .

𝐂 ⋅ 𝐇−1 𝐂′ = 𝐁𝐒 + 𝐙𝐇 ⋅ 𝐇−1 𝐂′ = 𝐁𝐒 ⋅ 𝐇−𝟐 𝐂′ + 𝐙(𝐁𝐒′ + 𝐙′𝐇)

Let

slide-28
SLIDE 28

Why it doesn’t work

𝐂 = 𝐁𝐒 + 𝐙𝐇, 𝐂′ = 𝐁𝐒′ + 𝐙′𝐇

We can’t compute the hash homomorphically!! Since we loose commutativity of 𝐁 and 𝐙𝑗,𝑘 .

𝐂 ⋅ 𝐇−1 𝐂′ = 𝐁𝐒 + 𝐙𝐇 ⋅ 𝐇−1 𝐂′ = 𝐁𝐒 ⋅ 𝐇−𝟐 𝐂′ + 𝐙(𝐁𝐒′ + 𝐙′𝐇) = 𝐁𝐒 ⋅ 𝐇−𝟐 𝐂′ + 𝐙𝐁𝐒′ + 𝐙𝐙′𝐇

GOOD!! BAD!! In general, 𝐙𝐁𝐒′ ≠ 𝐁𝐙𝐒′

Let

Can’t obtain H(ID) = 𝐁𝐒ID + F ID 𝐇 GOOD!!

slide-29
SLIDE 29

Idea (that works)

Move to the polynomial ring setting. View elements of ℤ𝑟

𝑜 (or a subring of ℤ𝑟 𝑜×𝑜) as the

polynomial ring 𝑆𝑟 = ℤ𝑟[𝑌]/(𝑌𝑜 + 1).

ℤ𝑟

𝑜 ∋

𝑏0 ⋮ 𝑏𝑜−1

𝑗=0 𝑜−1

𝑏𝑗𝑌𝑗 ∈ 𝑆𝑟

slide-30
SLIDE 30

Idea (that works)

ℤ𝑟

𝑜 ∋

𝑏0 ⋮ 𝑏𝑜−1

𝑗=0 𝑜−1

𝑏𝑗𝑌𝑗 ∈ 𝑆𝑟

𝐂 = 𝐁𝐒 + y𝐇 𝒄 = 𝒃𝑺 + 𝑧𝒉, where

𝒃, 𝒄, 𝒉 ∈ 𝑆𝑟

𝑙, 𝑺 ∈ 𝑆𝑟 𝑙×𝑙 ,

𝑧 ∈ 𝑆𝑟 Then, y ∈ ℤ𝑟 Move to the polynomial ring setting. View elements of ℤ𝑟

𝑜 (or a subring of ℤ𝑟 𝑜×𝑜) as the

polynomial ring 𝑆𝑟 = ℤ𝑟[𝑌]/(𝑌𝑜 + 1).

slide-31
SLIDE 31

Why it works

  • When 𝑧𝑗,𝑘 ∈ 𝑆𝑟, we get commutativity

with 𝒃 ∈ 𝑆𝑟

𝑙 for free.

  • Since 𝑧𝑗,𝑘 ∈ 𝑆𝑟 can be viewed as vectors

in ℤ𝑟

𝑜, we can “pack” Q in n entries, which

allows us to use poly-sized modulus q.

𝒄 = 𝒃𝑺 + 𝑧𝒉

※𝒃, 𝒄, 𝒉 ∈ 𝑆𝑟

𝑙,

𝑺 ∈ 𝑆𝑟

𝑙×𝑙 , 𝑧 ∈ 𝑆𝑟

slide-32
SLIDE 32

Some Ignored Problems

  • 𝑆𝑟 is no longer a field, so even when

𝒃𝑺𝐽𝐸 + F𝑧 ID 𝒉 for F𝑧 ID ≠ 0, the trapdoor may not be useful in case 𝑆𝑟 is not invertible.

  • In Yam16, the “smudging” technique was

used to create the challenge ciphertext, however, this necessarily leads to super-poly modulus q.

slide-33
SLIDE 33

Agenda

I. Preliminaries II. Lattice Section

 Previous Works  Our Work

  • III. Bilinear Map Section

 Previous Works  Our Work

  • IV. Summary
slide-34
SLIDE 34
  • Dual system encryption methodology

inherently requires decisional problem. (SXDH, DLIN, Matrix-DDH,…)

IBE from Search Problems

  • n Bilinear Maps
slide-35
SLIDE 35
  • Dual system encryption methodology

inherently requires decisional problem. (SXDH, DLIN, Matrix-DDH,…)

  • Known Solutions:

IBE from Search Problems

  • n Bilinear Maps

Boneh-Boyen IBE + Hardcore function Waters IBE

slide-36
SLIDE 36
  • Dual system encryption methodology

inherently requires decisional problem. (SXDH, DLIN, Matrix-DDH,…)

  • Known Solutions:
  • Secure Under the Computational BDH assumption
  • Short Ciphertexts (Waters).
  • Long public parameters.

IBE from Search Problems

  • n Bilinear Maps

Boneh-Boyen IBE + Hardcore function Waters IBE

slide-37
SLIDE 37

Waters IBE + Hardcore-bit Function

slide-38
SLIDE 38

Waters IBE + Hardcore-bit Function

GL: Goldreich-Levin hardcore bit function : To be determined

slide-39
SLIDE 39

Waters IBE + Hardcore-bit Function

GL: Goldreich-Levin hardcore bit function : To be determined

slide-40
SLIDE 40

Waters IBE + Hardcore-bit Function

GL: Goldreich-Levin hardcore bit function : To be determined

slide-41
SLIDE 41

Waters IBE + Hardcore-bit Function

GL: Goldreich-Levin hardcore bit function Decryption : To be determined

slide-42
SLIDE 42

Hashing the Identities

Waters’ hash [Wat05]

slide-43
SLIDE 43

Hashing the Identities

Waters’ hash [Wat05]

Long public key! #group elements linear in ID length Linear Function

slide-44
SLIDE 44

Initial Idea to Reduce the Key Size (that doesn’t quite work)

slide-45
SLIDE 45

Initial Idea to Reduce the Key Size (that doesn’t quite work)

slide-46
SLIDE 46

Initial Idea to Reduce the Key Size (that doesn’t quite work)

Non-linear terms cannot be efficiently computed from mpk!!

slide-47
SLIDE 47

Initial Idea to Reduce the Key Size (that doesn’t quite work)

Non-linear terms cannot be efficiently computed from mpk!!

How should we compute this publicly??

slide-48
SLIDE 48

Use Boneh-Boyen technique:

Idea (that works)

Some Random Element

slide-49
SLIDE 49

Use Boneh-Boyen technique:

Idea (that works)

Some Random Element

Change of Variables:

(Mental Experiment)

slide-50
SLIDE 50

Use Boneh-Boyen technique:

Idea (that works)

Some Random Element

Change of Variables:

(Mental Experiment)

slide-51
SLIDE 51

Use Boneh-Boyen technique:

Idea (that works)

Some Random Element

Change of Variables:

(Mental Experiment)

Linear in ? (= Efficiently computable?)

slide-52
SLIDE 52

Use Boneh-Boyen technique:

Idea (that works)

Some Random Element

Change of Variables:

(Mental Experiment)

Linear in ? (= Efficiently computable?)

slide-53
SLIDE 53

Use Boneh-Boyen technique:

Idea (that works)

Some Random Element

Change of Variables:

(Mental Experiment)

Linear in ? (= Efficiently computable?)

slide-54
SLIDE 54

Use Boneh-Boyen technique:

Idea (that works)

Some Random Element

Change of Variables:

(Mental Experiment) Random Element Chosen by the Encryptor

slide-55
SLIDE 55

Resulting Scheme

slide-56
SLIDE 56

Resulting Scheme

longer

slide-57
SLIDE 57

Resulting Scheme

Shorter! longer

slide-58
SLIDE 58

Comparison

Assumption

[Wat05] + hardcore

CBDH assumption

Ours

3CBDHE assumption

3CBDH assumption: 3CBDHE assumption:

*We count the number of group elements.

slide-59
SLIDE 59

Agenda

I. Preliminaries II. Lattice Section

 Previous Works  Our Work

  • III. Bilinear Map Section

 Previous Works  Our Work

  • IV. Summary
slide-60
SLIDE 60

Summary: New Adaptively Secure IBEs

  • Both based on partitioning technique with

non-linear functions

  • New IBE from ideal lattices:

– Improve currently best scheme of [Yam16]: super-poly modulus → poly modulus RLWE – Use commutativity of Ring in an essential way

  • New IBE from bilinear maps:

– First scheme with sub-linear-size mpk from search problem rather than decisional problem – Boneh-Boyen technique in the construction rather than in the security proof

slide-61
SLIDE 61
slide-62
SLIDE 62

Comparison with (Very) Recent Works

  • Comparison of adaptively secure lattice IBEs when

instantiated with ideal lattices

|mpk| |CT| |SK_ID| Assumption Property [ABB10] +[Boy10] 𝑃(𝑜κ) 𝑃(𝑜) 𝑃(𝑜) Poly RLWE [Yam16] 𝑃(𝑜κ1/𝑒) 𝑃(𝑜) 𝑃(𝑜) Super-poly RLWE [AFL16] 𝑃(𝑜) 𝑃(𝑜) 𝑃(𝑜) Poly RLWE [ZCZ16] 𝑃(log 𝑅) 𝑃(𝑜) 𝑃(𝑜) Poly RWE Q-bounded [BL16] 𝑃(𝑜κ) 𝑃(𝑜) 𝑃(𝑜) Super-poly RLWE Tightly secure [Ours] 𝑃(𝑜κ1/𝑒) 𝑃(𝑜) 𝑃(𝑜) Poly RLWE