Transcript
Page 1: Short&Accountable&Ring&Signatures Based&on&DDH

Short  Accountable  Ring  SignaturesBased  on  DDH

Jonathan  Bootle,  Andrea  Cerulli,  Pyrros Chaidos,  Essam Ghadafi,  Jens  Groth,  and  Christophe  Petit  

University  College  London

Page 2: Short&Accountable&Ring&Signatures Based&on&DDH

Signature  SchemesLink  message  to  single  entity

โ€“ Signerโ€“ Verifier S

๐‘š, ๐œŽV

Page 3: Short&Accountable&Ring&Signatures Based&on&DDH

Signature  SchemesLink  message  to  single  entity

โ€“ Signerโ€“ Verifier

โ€ขLink  message  to  multiple  entities:

S๐‘š, ๐œŽ

V

Page 4: Short&Accountable&Ring&Signatures Based&on&DDH

Ring  Signaturesโ€“ Usersโ€“ Verifier

Signature  SchemesLink  message  to  single  entity

โ€“ Signerโ€“ Verifier

โ€ขLink  message  to  multiple  entities:

S๐‘š, ๐œŽ

V

Page 5: Short&Accountable&Ring&Signatures Based&on&DDH

Ring  Signaturesโ€“ Usersโ€“ Verifier

Signature  SchemesLink  message  to  single  entity

โ€“ Signerโ€“ Verifier

โ€ขLink  message  to  multiple  entities:

S๐‘š, ๐œŽ

๐‘š, ๐œŽ,R

๐‘š$, ๐œŽ$,Rโ€ฒ

V

Page 6: Short&Accountable&Ring&Signatures Based&on&DDH

Ring  Signaturesโ€“ Usersโ€“ Verifier

Group  Signaturesโ€“ Managerโ€“ Usersโ€“ Verifier

Signature  SchemesLink  message  to  single  entity

โ€“ Signerโ€“ Verifier

โ€ขLink  message  to  multiple  entities:

S๐‘š, ๐œŽ

๐‘š, ๐œŽ,R

๐‘š$, ๐œŽ$,Rโ€ฒ

V

Page 7: Short&Accountable&Ring&Signatures Based&on&DDH

Ring  Signaturesโ€“ Usersโ€“ Verifier

Group  Signaturesโ€“ Managerโ€“ Usersโ€“ Verifier

Signature  SchemesLink  message  to  single  entity

โ€“ Signerโ€“ Verifier

โ€ขLink  message  to  multiple  entities:

S๐‘š, ๐œŽ

๐‘š, ๐œŽ,R

๐‘š$, ๐œŽ$,Rโ€ฒ

V

M

๐Ÿ’ฉ , ๐œŽ

Page 8: Short&Accountable&Ring&Signatures Based&on&DDH

Ring  Signaturesโ€“ Usersโ€“ Verifier

Group  Signaturesโ€“ Managerโ€“ Usersโ€“ Verifier

Signature  SchemesLink  message  to  single  entity

โ€“ Signerโ€“ Verifier

โ€ขLink  message  to  multiple  entities:

S๐‘š, ๐œŽ

๐‘š, ๐œŽ,R

๐‘š$, ๐œŽ$,Rโ€ฒ

V

M

๐Ÿ’ฉ , ๐œŽ Open(๐œŽ)

๐œ‹

Page 9: Short&Accountable&Ring&Signatures Based&on&DDH

Accountable  Ring  Signatures  [Xu  and  Yung]Link  message  to  multiple  entities

โ€ข Usersโ€ข Opener(s)โ€ข Verifier

๐Ÿ’ฉ , ๐œŽ,R

๐‘š$, ๐œŽ$,๐‘…โ€ฒ

O

Open(๐œŽ)

Page 10: Short&Accountable&Ring&Signatures Based&on&DDH

Accountable  Ring  Signatures

โ€ข Setup,  OpenerKeyGen,  UserKeyGenโ€ข Sign,  Vfyโ€ข Open,  Judge

Security:โ€ข Correctnessโ€ข Full  Unforgeabilityโ€ข Anonymityโ€ข Traceability  with  Tracing  Soundness

Page 11: Short&Accountable&Ring&Signatures Based&on&DDH

Components  for  Accountable  Ring  Signatures

โ€ข One-ยญโ€way  functions  (๐‘”๐‘ฅ)โ€ข Homomorphic Commitments  (Pedersen)

โ€ข ๐ถ๐‘๐‘˜ ๐‘š5 โ‹… ๐ถ๐‘๐‘˜ ๐‘š7 = ๐ถ๐‘๐‘˜ ๐‘š5 โ‹… ๐‘š7

โ€ข IND-ยญโ€CPA  Encryption  (ElGamal)โ€ข Non-ยญโ€Interactive  Zero  Knowledge  Proofsโ€ข Signatures  of  Knowledge

Page 12: Short&Accountable&Ring&Signatures Based&on&DDH

ฮฃ-ยญโ€Protocols

โ€ข 3-ยญโ€move  protocols  for  some  NP  relation  ๐‘…โ€ข Prover  demonstrates  a  statement  ๐‘ฅ โˆˆ ๐ฟ;:  there  exists  ๐‘ค s.t. ๐‘ฅ, ๐‘ค โˆˆ ๐‘…

0/1

โ€ข Completeness:                  outputs  1  for  ๐‘ฅ โˆˆ ๐ฟ;โ€ข ๐‘›-ยญโ€Special  Soundness:  ๐‘› accepting  ๐‘’, ๐‘ง pairs  for  same  ๐‘ฅ, ๐‘Ž:we  obtain  wโ€ข Special  Honest  Verifier  Zero  Knowledge:  Transcripts  between   and  

honest   can  be  efficiently  simulated  for  any  challenge  ๐‘’

๐‘Ž๐‘’๐‘ง

Page 13: Short&Accountable&Ring&Signatures Based&on&DDH

Non-ยญโ€Interactive  Zero  Knowledge  Proofs

โ€ข 1-ยญโ€move  protocols  for  some  NP  relation  ๐‘…โ€ข Fiat-ยญโ€Shamir:  challenge  is  hash  of  the  transcript

0/1

โ€ข Completeness:                  outputs  1  for  ๐‘ฅ โˆˆ ๐ฟ;โ€ข Soundness:  If  ๐‘ฅ   โˆ‰   ๐ฟ;,   almost  never  outputs  1โ€ข Zero  Knowledge:  Proofs  can  be  efficiently  simulated

๐‘ฅ, ๐œ‹

Page 14: Short&Accountable&Ring&Signatures Based&on&DDH

Signatures  of  Knowledge

โ€ข 1-ยญโ€move  protocols  for  some  NP  relation  ๐‘…,  given  common  reference  string  ๐‘๐‘Ÿ๐‘ 

โ€ข Prover demonstrates,  w.r.t.  message  ๐‘š,knowledge of  ๐‘ค for  statement  ๐‘ฅ โˆˆ ๐ฟ;:  ๐‘ฅ, ๐‘ค โˆˆ ๐‘… 0/1

โ€ข Extractability:  If              produces  good  signatures,  extract  ๐‘ค by  rewindingโ€ข Straightline ๐‘“-ยญโ€Extractability:  we  can  extract  ๐‘“(๐‘ค) without  rewinding  โ€ข Simulatability:  signatures  can  be  efficiently  simulated  

โ€ข Extractor,  Simulator  is  given  control  of  ๐‘๐‘Ÿ๐‘   creation

๐‘ฅ, ๐‘š, ๐œŽ

Page 15: Short&Accountable&Ring&Signatures Based&on&DDH

Construction

โ€ข Setup:  Choose  discrete  log  group  ๐’ข  ,  generator  ๐‘”and  common  reference  string  ๐‘๐‘Ÿ๐‘ 

โ€ข OpenerKeyGen:  Create  ElGamal keypair,  publish  ๐‘๐‘˜

โ€ข UserKeyGen:  Pick  secret  key  ๐‘ ๐‘˜,output  verification  key  ๐‘ฃ๐‘˜ = ๐‘”MN

Page 16: Short&Accountable&Ring&Signatures Based&on&DDH

Signing

โ€ข Choose  ring  ๐‘… = ๐‘ฃ๐‘˜O, ๐‘ฃ๐‘˜5,โ€ฆ , ๐‘ฃ๐‘˜ โ€ฆ , ๐‘ฃ๐‘˜N

โ€ข Prove  ๐‘ฃ๐‘˜ โˆˆ ๐‘…โ€ข Attach  encryption  ๐‘ of  ๐‘ฃ๐‘˜  so  opener  can  traceโ€ข Prove  knowledge  of  ๐‘ ๐‘˜ = log  (๐‘ฃ๐‘˜)โ€ข Prove  knowledge,  correctness  of  ๐‘โ€ข Bind  ๐œŽ to  message๐‘š via  Fiat-ยญโ€Shamir

๐‘…MTU =(๐‘…, ๐‘), (๐‘ ๐‘˜, ๐‘Ÿ  ):

๐‘ฃ๐‘˜ โˆˆ ๐‘…   โˆง  ๐‘ฃ๐‘˜ = ๐‘”MN โˆง ๐‘ = ๐ธ(๐‘ฃ๐‘˜; ๐‘Ÿ)

Page 17: Short&Accountable&Ring&Signatures Based&on&DDH

Signing

โ€ข Choose  ring  ๐‘… = ๐‘ฃ๐‘˜O, ๐‘ฃ๐‘˜5,โ€ฆ , ๐‘ฃ๐‘˜ โ€ฆ , ๐‘ฃ๐‘˜N

โ€ข Prove  ๐‘ฃ๐‘˜ โˆˆ ๐‘…โ€ข Attach  encryption  ๐‘ of  ๐‘ฃ๐‘˜  so  opener  can  traceโ€ข Prove  knowledge  of  ๐‘ ๐‘˜ = log  (๐‘ฃ๐‘˜)โ€ข Prove  knowledge,  correctness  of  ๐‘โ€ข Bind  ๐œŽ to  message๐‘š via  Fiat-ยญโ€Shamir

๐‘…MTU =(๐‘…, ๐‘), (๐‘ ๐‘˜, ๐‘Ÿ  ):

๐‘ฃ๐‘˜ โˆˆ ๐‘…   โˆง  ๐‘ฃ๐‘˜ = ๐‘”MN โˆง ๐‘ = ๐ธ(๐‘ฃ๐‘˜; ๐‘Ÿ)

Page 18: Short&Accountable&Ring&Signatures Based&on&DDH

Signing

โ€ข Choose  ring  ๐‘… = ๐‘ฃ๐‘˜O, ๐‘ฃ๐‘˜5, โ€ฆ , ๐‘ฃ๐‘˜ โ€ฆ , ๐‘ฃ๐‘˜Nโ€ข Prove  ๐‘ฃ๐‘˜ โˆˆ ๐‘…

Could  prove:  ๐‘ฃ๐‘˜ = ๐‘ฃ๐‘˜O OR  ๐‘ฃ๐‘˜ = ๐‘ฃ๐‘˜5 OR  โ€ฆ  OR  ๐‘ฃ๐‘˜ = ๐‘ฃ๐‘˜Nโ€“ Linear  size:  too  big  for  large  rings

Use  One-ยญโ€out-ยญโ€of-ยญโ€Many  proof  by  Groth and  Kohlweissโ€“ Take  ๐‘T = ๐‘/๐ธ ๐‘ฃ๐‘˜T  ; 0โ€“ Use  modified  GK  to  show  one  node  encrypts  1

Page 19: Short&Accountable&Ring&Signatures Based&on&DDH

GK  idea

โ€ข We  want  to  open  ๐‘Y without  revealing  ๐‘™

โ€ข  ๐‘Y = โˆ๐‘T\] ,  where  ฮ”T = 1   โ‡” ๐‘– = ๐‘™

โ€ข Commit  to  ฮ”T. Also  commit  to  blinders  ๐‘ŽTโ€ข Given  challenge  x,  reply  with  fT = x   โ‹… ฮ”T + ๐‘ŽTโ€ข โˆ๐‘T

e] = ๐‘Yf โ‹… โˆ๐‘Tg]

Page 20: Short&Accountable&Ring&Signatures Based&on&DDH

GK  idea

โ€ข We  want  to  open  ๐‘Y without  revealing  ๐‘™

โ€ข  ๐‘Y = โˆ๐‘T\] ,  where  ฮ”T = 1   โ‡” ๐‘– = ๐‘™

โ€ข Commit  to  ฮ”T. Also  commit  to  blinders  ๐‘ŽTโ€ข Given  challenge  x,  reply  with  fT = x   โ‹… ฮ”T + ๐‘ŽTโ€ข โˆ๐‘T

e] = ๐‘Yf โ‹… โˆ๐‘Tg]

โ€ข ๐บ = โˆ๐‘Tg]does  not  depend  on  x.  Rerandomize as  ๐บโ€™

Page 21: Short&Accountable&Ring&Signatures Based&on&DDH

GK  idea

โ€ข We  want  to  open  ๐‘Y without  revealing  ๐‘™

โ€ข  ๐‘Y = โˆ๐‘T\] ,  where  ฮ”T = 1   โ‡” ๐‘– = ๐‘™

โ€ข Commit  to  ฮ”T. Also  commit  to  blinders  ๐‘ŽTโ€ข Given  challenge  x,  reply  with  fT = x   โ‹… ฮ”T + ๐‘ŽTโ€ข โˆ๐‘T

e] = ๐‘Yf โ‹… โˆ๐‘Tg]

โ€ข ๐บ = โˆ๐‘Tg]does  not  depend  on  x.  Rerandomize as  ๐บโ€™

,  reveal  ๐บโ€ฒ

Page 22: Short&Accountable&Ring&Signatures Based&on&DDH

GK  idea

โ€ข We  want  to  open  ๐‘Y without  revealing  ๐‘™

โ€ข  ๐‘Y = โˆ๐‘T\] ,  where  ฮ”T = 1   โ‡” ๐‘– = ๐‘™

โ€ข Commit  to  ฮ”T. Also  commit  to  blinders  ๐‘ŽTโ€ข Given  challenge  x,  reply  with  fT = x   โ‹… ฮ”T + ๐‘ŽTโ€ข โˆ๐‘T

e] = ๐‘Yf โ‹… โˆ๐‘Tg]

โ€ข ๐บ = โˆ๐‘Tg]does  not  depend  on  x.  Rerandomize as  ๐บโ€™

โ€ข โˆ๐‘Te] ๐บ$โ„ = ๐‘Yf โ‹… ๐ธ 1;๐‘Ÿ = ๐ธ(1; ๐‘Ÿ$)

,  reveal  ๐บโ€ฒ

Page 23: Short&Accountable&Ring&Signatures Based&on&DDH

n-ยญโ€tree  GK

10 0

0 010 01 0 01

โ€ข Split  ๐‘–, ฮ”T by  level:        ๐‘– = โˆ‘๐‘–l โ‹… ๐‘›l ๐›ฟ๐‘–l, ๐‘— :  ฮ”T = โˆ  ๐›ฟTo,l

Height  m  n-ยญtree

Page 24: Short&Accountable&Ring&Signatures Based&on&DDH

n-ยญโ€tree  GK

10 0

0 010 01 0 01

โ€ข Split  ๐‘–, ฮ”T by  level:        ๐‘– = โˆ‘๐‘–l โ‹… ๐‘›l ๐›ฟ๐‘–l, ๐‘— :  ฮ”T = โˆ  ๐›ฟTo,lโ€ข Commit  to  ๐›ฟ๐‘–l, ๐‘—,  prove  0/1,  for  each  ๐‘— exactly  one  ๐›ฟ๐‘–l, ๐‘— is  1

Height  m  n-ยญtree

๐‘–     = 3๐‘–O = 1๐‘–5 = 0

๐›ฟO = [0,1,0]

๐›ฟ5 = [1,0,0]

Page 25: Short&Accountable&Ring&Signatures Based&on&DDH

n-ยญโ€tree  GK

โ€ข Commit  to  ๐›ฟl,To . Also  commit  to  blinders  ๐‘ŽT,lโ€ข Given  challenge  x,  reply  with  fl,To = x   โ‹… ๐›ฟl,To + ๐‘Žl,Toโ€ข Let  ๐‘T(๐‘ฅ) = โˆ๐‘“l,Toโ€ข Key  point:  ๐‘ฅs appears  only  if  all  ๐›ฟl,To are  1  i.e ๐‘– = ๐‘™

โ€ข ๐‘T ๐‘ฅ = ฮ”t๐‘ฅs + โˆ‘ ๐‘T,N๐‘ฅNsu5NvO where  ๐‘T,N depend  on  ๐‘™, ๐‘Žl,To

โ€ข โˆ๐‘Tw] f = ๐‘Y โ‹… โˆ ๐‘ƒN๐‘ฅNsu5

NvO

โ€ข ๐‘ƒN do  not  depend  on  x.

Page 26: Short&Accountable&Ring&Signatures Based&on&DDH

n-ยญโ€tree  GKโ€ข ๐‘ƒN do  not  depend  on  ๐‘ฅโ€ข We  commit  beforehand  as  ๐บN

โ€ข What  is  โˆ๐‘Tโˆe]o,o โˆ ๐บNf

yzsu5NvO ?

โ€ข If  ๐‘Y is  an  encryption  of  1,  result  is  encryption  of  1

โ€ข Otherwise,  with  overwhelming  probability  itโ€™s  an  encryption  of  a  value  โ‰  1,  so  canโ€™t  be  opened  to  1

Page 27: Short&Accountable&Ring&Signatures Based&on&DDH

Opening

โ€ข Openโ€“ Check  if  ๐œŽ actually  verifiesโ€“ Decrypt  ciphertext ๐‘ attached  in  signatureโ€“ Prove  correctness  of  decryption  in  Zero  Knowledge

โ€ข Judgeโ€“ Check  decryption  correctness

Page 28: Short&Accountable&Ring&Signatures Based&on&DDH

Simulated  Opening  &  Straightline Extractability

โ€ข To  prove  anonymity,  we  do  an  IND-ยญโ€CCA  style  proofโ€“ Need  to  extract   ๐‘ฃ๐‘˜ from  sigsโ€“ Canโ€™t  see  the  key

โ€ข Adversary  can  obstruct  rewindingโ€“ Adversaryโ€™s  signatures  related  to  each  otherโ€“ Rewinding  to  open  one  changes  previous  โ‡’more  rewinding

โ€ข We  need  to  extract  ๐‘ฃ๐‘˜ = ๐‘”MN  with  no  rewindingโ€“ Cheap  solution:  Attach  2nd encryption  of  ๐‘ฃ๐‘˜ to  proof  [NY]โ€“ Simulator  has  2nd key  in  simulationโ€“ Nobody  has  the  key  in  real  world

Page 29: Short&Accountable&Ring&Signatures Based&on&DDH

Efficiency

โ€ข log  ๐‘ + 12 Group  Elements

โ€ข ๏ฟฝ7log  ๐‘ + 6 Field  Elements

โ€ข Competitive  vs  sRSA/DDH  schemesScheme |๐‘…| = 128 |๐‘…| = 1024 |๐‘…| = 1Mi[CG05]  โ€“ 2048  sRSA +  d.Log 10  Kib 10  Kib 10  KibThis โ€“ 192  ECC 6.7  Kib 8.1Kib 12.75  KibThis  โ€“ 192  ECC 7.8  Kib 9.4  Kib 14.875  Kib

โ€ข Linear  expos  (or  worse)  to  Signโ€ข Linear  expos  to  Verify

Page 30: Short&Accountable&Ring&Signatures Based&on&DDH

โ€ข Accountable  Ring  Signatures  can  be  best  of  both  worldsโ€“ Tracing  functionality  of  Group  sigsโ€“ Free  choice  of  ringโ€“ Free  choice  of  openerโ€“ Can  derive  Ring  and  Group  signatures

โ€ข Signature  size:โ€“ Competitive  vs  sRSA/DDH  schemesโ€“ Better  than  50%  size  improvement  overoriginal  GK  construction:  binary  โ†’๐‘›-ยญโ€tree,mixed  Com+Enc

Summary

๐Ÿ’ฉ , ๐œŽ,R

Open(๐œŽ)

๐‘š$, ๐œŽ$,๐‘…โ€ฒ

Page 31: Short&Accountable&Ring&Signatures Based&on&DDH

Thanks!


Top Related