short&accountable&ring&signatures based&on&ddh

31
Short Accountable Ring Signatures Based on DDH Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth, and Christophe Petit University College London

Upload: others

Post on 16-Oct-2021

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Short&Accountable&Ring&Signatures Based&on&DDH

Short  Accountable  Ring  SignaturesBased  on  DDH

Jonathan  Bootle,  Andrea  Cerulli,  Pyrros Chaidos,  Essam Ghadafi,  Jens  Groth,  and  Christophe  Petit  

University  College  London

Page 2: Short&Accountable&Ring&Signatures Based&on&DDH

Signature  SchemesLink  message  to  single  entity

– Signer– Verifier S

𝑚, 𝜎V

Page 3: Short&Accountable&Ring&Signatures Based&on&DDH

Signature  SchemesLink  message  to  single  entity

– Signer– Verifier

•Link  message  to  multiple  entities:

S𝑚, 𝜎

V

Page 4: Short&Accountable&Ring&Signatures Based&on&DDH

Ring  Signatures– Users– Verifier

Signature  SchemesLink  message  to  single  entity

– Signer– Verifier

•Link  message  to  multiple  entities:

S𝑚, 𝜎

V

Page 5: Short&Accountable&Ring&Signatures Based&on&DDH

Ring  Signatures– Users– Verifier

Signature  SchemesLink  message  to  single  entity

– Signer– Verifier

•Link  message  to  multiple  entities:

S𝑚, 𝜎

𝑚, 𝜎,R

𝑚$, 𝜎$,R′

V

Page 6: Short&Accountable&Ring&Signatures Based&on&DDH

Ring  Signatures– Users– Verifier

Group  Signatures– Manager– Users– Verifier

Signature  SchemesLink  message  to  single  entity

– Signer– Verifier

•Link  message  to  multiple  entities:

S𝑚, 𝜎

𝑚, 𝜎,R

𝑚$, 𝜎$,R′

V

Page 7: Short&Accountable&Ring&Signatures Based&on&DDH

Ring  Signatures– Users– Verifier

Group  Signatures– Manager– Users– Verifier

Signature  SchemesLink  message  to  single  entity

– Signer– Verifier

•Link  message  to  multiple  entities:

S𝑚, 𝜎

𝑚, 𝜎,R

𝑚$, 𝜎$,R′

V

M

💩 , 𝜎

Page 8: Short&Accountable&Ring&Signatures Based&on&DDH

Ring  Signatures– Users– Verifier

Group  Signatures– Manager– Users– Verifier

Signature  SchemesLink  message  to  single  entity

– Signer– Verifier

•Link  message  to  multiple  entities:

S𝑚, 𝜎

𝑚, 𝜎,R

𝑚$, 𝜎$,R′

V

M

💩 , 𝜎 Open(𝜎)

𝜋

Page 9: Short&Accountable&Ring&Signatures Based&on&DDH

Accountable  Ring  Signatures  [Xu  and  Yung]Link  message  to  multiple  entities

• Users• Opener(s)• Verifier

💩 , 𝜎,R

𝑚$, 𝜎$,𝑅′

O

Open(𝜎)

Page 10: Short&Accountable&Ring&Signatures Based&on&DDH

Accountable  Ring  Signatures

• Setup,  OpenerKeyGen,  UserKeyGen• Sign,  Vfy• Open,  Judge

Security:• Correctness• Full  Unforgeability• Anonymity• Traceability  with  Tracing  Soundness

Page 11: Short&Accountable&Ring&Signatures Based&on&DDH

Components  for  Accountable  Ring  Signatures

• One-­‐way  functions  (𝑔𝑥)• Homomorphic Commitments  (Pedersen)

• 𝐶𝑐𝑘 𝑚5 ⋅ 𝐶𝑐𝑘 𝑚7 = 𝐶𝑐𝑘 𝑚5 ⋅ 𝑚7

• IND-­‐CPA  Encryption  (ElGamal)• Non-­‐Interactive  Zero  Knowledge  Proofs• Signatures  of  Knowledge

Page 12: Short&Accountable&Ring&Signatures Based&on&DDH

Σ-­‐Protocols

• 3-­‐move  protocols  for  some  NP  relation  𝑅• Prover  demonstrates  a  statement  𝑥 ∈ 𝐿;:  there  exists  𝑤 s.t. 𝑥, 𝑤 ∈ 𝑅

0/1

• Completeness:                  outputs  1  for  𝑥 ∈ 𝐿;• 𝑛-­‐Special  Soundness:  𝑛 accepting  𝑒, 𝑧 pairs  for  same  𝑥, 𝑎:we  obtain  w• Special  Honest  Verifier  Zero  Knowledge:  Transcripts  between   and  

honest   can  be  efficiently  simulated  for  any  challenge  𝑒

𝑎𝑒𝑧

Page 13: Short&Accountable&Ring&Signatures Based&on&DDH

Non-­‐Interactive  Zero  Knowledge  Proofs

• 1-­‐move  protocols  for  some  NP  relation  𝑅• Fiat-­‐Shamir:  challenge  is  hash  of  the  transcript

0/1

• Completeness:                  outputs  1  for  𝑥 ∈ 𝐿;• Soundness:  If  𝑥   ∉   𝐿;,   almost  never  outputs  1• Zero  Knowledge:  Proofs  can  be  efficiently  simulated

𝑥, 𝜋

Page 14: Short&Accountable&Ring&Signatures Based&on&DDH

Signatures  of  Knowledge

• 1-­‐move  protocols  for  some  NP  relation  𝑅,  given  common  reference  string  𝑐𝑟𝑠

• Prover demonstrates,  w.r.t.  message  𝑚,knowledge of  𝑤 for  statement  𝑥 ∈ 𝐿;:  𝑥, 𝑤 ∈ 𝑅 0/1

• Extractability:  If              produces  good  signatures,  extract  𝑤 by  rewinding• Straightline 𝑓-­‐Extractability:  we  can  extract  𝑓(𝑤) without  rewinding  • Simulatability:  signatures  can  be  efficiently  simulated  

• Extractor,  Simulator  is  given  control  of  𝑐𝑟𝑠  creation

𝑥, 𝑚, 𝜎

Page 15: Short&Accountable&Ring&Signatures Based&on&DDH

Construction

• Setup:  Choose  discrete  log  group  𝒢  ,  generator  𝑔and  common  reference  string  𝑐𝑟𝑠

• OpenerKeyGen:  Create  ElGamal keypair,  publish  𝑝𝑘

• UserKeyGen:  Pick  secret  key  𝑠𝑘,output  verification  key  𝑣𝑘 = 𝑔MN

Page 16: Short&Accountable&Ring&Signatures Based&on&DDH

Signing

• Choose  ring  𝑅 = 𝑣𝑘O, 𝑣𝑘5,… , 𝑣𝑘 … , 𝑣𝑘N

• Prove  𝑣𝑘 ∈ 𝑅• Attach  encryption  𝑐 of  𝑣𝑘  so  opener  can  trace• Prove  knowledge  of  𝑠𝑘 = log  (𝑣𝑘)• Prove  knowledge,  correctness  of  𝑐• Bind  𝜎 to  message𝑚 via  Fiat-­‐Shamir

𝑅MTU =(𝑅, 𝑐), (𝑠𝑘, 𝑟  ):

𝑣𝑘 ∈ 𝑅   ∧  𝑣𝑘 = 𝑔MN ∧ 𝑐 = 𝐸(𝑣𝑘; 𝑟)

Page 17: Short&Accountable&Ring&Signatures Based&on&DDH

Signing

• Choose  ring  𝑅 = 𝑣𝑘O, 𝑣𝑘5,… , 𝑣𝑘 … , 𝑣𝑘N

• Prove  𝑣𝑘 ∈ 𝑅• Attach  encryption  𝑐 of  𝑣𝑘  so  opener  can  trace• Prove  knowledge  of  𝑠𝑘 = log  (𝑣𝑘)• Prove  knowledge,  correctness  of  𝑐• Bind  𝜎 to  message𝑚 via  Fiat-­‐Shamir

𝑅MTU =(𝑅, 𝑐), (𝑠𝑘, 𝑟  ):

𝑣𝑘 ∈ 𝑅   ∧  𝑣𝑘 = 𝑔MN ∧ 𝑐 = 𝐸(𝑣𝑘; 𝑟)

Page 18: Short&Accountable&Ring&Signatures Based&on&DDH

Signing

• Choose  ring  𝑅 = 𝑣𝑘O, 𝑣𝑘5, … , 𝑣𝑘 … , 𝑣𝑘N• Prove  𝑣𝑘 ∈ 𝑅

Could  prove:  𝑣𝑘 = 𝑣𝑘O OR  𝑣𝑘 = 𝑣𝑘5 OR  …  OR  𝑣𝑘 = 𝑣𝑘N– Linear  size:  too  big  for  large  rings

Use  One-­‐out-­‐of-­‐Many  proof  by  Groth and  Kohlweiss– Take  𝑐T = 𝑐/𝐸 𝑣𝑘T  ; 0– Use  modified  GK  to  show  one  node  encrypts  1

Page 19: Short&Accountable&Ring&Signatures Based&on&DDH

GK  idea

• We  want  to  open  𝑐Y without  revealing  𝑙

•  𝑐Y = ∏𝑐T\] ,  where  ΔT = 1   ⇔ 𝑖 = 𝑙

• Commit  to  ΔT. Also  commit  to  blinders  𝑎T• Given  challenge  x,  reply  with  fT = x   ⋅ ΔT + 𝑎T• ∏𝑐T

e] = 𝑐Yf ⋅ ∏𝑐Tg]

Page 20: Short&Accountable&Ring&Signatures Based&on&DDH

GK  idea

• We  want  to  open  𝑐Y without  revealing  𝑙

•  𝑐Y = ∏𝑐T\] ,  where  ΔT = 1   ⇔ 𝑖 = 𝑙

• Commit  to  ΔT. Also  commit  to  blinders  𝑎T• Given  challenge  x,  reply  with  fT = x   ⋅ ΔT + 𝑎T• ∏𝑐T

e] = 𝑐Yf ⋅ ∏𝑐Tg]

• 𝐺 = ∏𝑐Tg]does  not  depend  on  x.  Rerandomize as  𝐺’

Page 21: Short&Accountable&Ring&Signatures Based&on&DDH

GK  idea

• We  want  to  open  𝑐Y without  revealing  𝑙

•  𝑐Y = ∏𝑐T\] ,  where  ΔT = 1   ⇔ 𝑖 = 𝑙

• Commit  to  ΔT. Also  commit  to  blinders  𝑎T• Given  challenge  x,  reply  with  fT = x   ⋅ ΔT + 𝑎T• ∏𝑐T

e] = 𝑐Yf ⋅ ∏𝑐Tg]

• 𝐺 = ∏𝑐Tg]does  not  depend  on  x.  Rerandomize as  𝐺’

,  reveal  𝐺′

Page 22: Short&Accountable&Ring&Signatures Based&on&DDH

GK  idea

• We  want  to  open  𝑐Y without  revealing  𝑙

•  𝑐Y = ∏𝑐T\] ,  where  ΔT = 1   ⇔ 𝑖 = 𝑙

• Commit  to  ΔT. Also  commit  to  blinders  𝑎T• Given  challenge  x,  reply  with  fT = x   ⋅ ΔT + 𝑎T• ∏𝑐T

e] = 𝑐Yf ⋅ ∏𝑐Tg]

• 𝐺 = ∏𝑐Tg]does  not  depend  on  x.  Rerandomize as  𝐺’

• ∏𝑐Te] 𝐺$⁄ = 𝑐Yf ⋅ 𝐸 1;𝑟 = 𝐸(1; 𝑟$)

,  reveal  𝐺′

Page 23: Short&Accountable&Ring&Signatures Based&on&DDH

n-­‐tree  GK

10 0

0 010 01 0 01

• Split  𝑖, ΔT by  level:        𝑖 = ∑𝑖l ⋅ 𝑛l 𝛿𝑖l, 𝑗 :  ΔT = ∏  𝛿To,l

Height  m  n-­tree

Page 24: Short&Accountable&Ring&Signatures Based&on&DDH

n-­‐tree  GK

10 0

0 010 01 0 01

• Split  𝑖, ΔT by  level:        𝑖 = ∑𝑖l ⋅ 𝑛l 𝛿𝑖l, 𝑗 :  ΔT = ∏  𝛿To,l• Commit  to  𝛿𝑖l, 𝑗,  prove  0/1,  for  each  𝑗 exactly  one  𝛿𝑖l, 𝑗 is  1

Height  m  n-­tree

𝑖     = 3𝑖O = 1𝑖5 = 0

𝛿O = [0,1,0]

𝛿5 = [1,0,0]

Page 25: Short&Accountable&Ring&Signatures Based&on&DDH

n-­‐tree  GK

• Commit  to  𝛿l,To . Also  commit  to  blinders  𝑎T,l• Given  challenge  x,  reply  with  fl,To = x   ⋅ 𝛿l,To + 𝑎l,To• Let  𝑝T(𝑥) = ∏𝑓l,To• Key  point:  𝑥s appears  only  if  all  𝛿l,To are  1  i.e 𝑖 = 𝑙

• 𝑝T 𝑥 = Δt𝑥s + ∑ 𝑝T,N𝑥Nsu5NvO where  𝑝T,N depend  on  𝑙, 𝑎l,To

• ∏𝑐Tw] f = 𝑐Y ⋅ ∏ 𝑃N𝑥Nsu5

NvO

• 𝑃N do  not  depend  on  x.

Page 26: Short&Accountable&Ring&Signatures Based&on&DDH

n-­‐tree  GK• 𝑃N do  not  depend  on  𝑥• We  commit  beforehand  as  𝐺N

• What  is  ∏𝑐T∏e]o,o ∏ 𝐺Nf

yzsu5NvO ?

• If  𝑐Y is  an  encryption  of  1,  result  is  encryption  of  1

• Otherwise,  with  overwhelming  probability  it’s  an  encryption  of  a  value  ≠ 1,  so  can’t  be  opened  to  1

Page 27: Short&Accountable&Ring&Signatures Based&on&DDH

Opening

• Open– Check  if  𝜎 actually  verifies– Decrypt  ciphertext 𝑐 attached  in  signature– Prove  correctness  of  decryption  in  Zero  Knowledge

• Judge– Check  decryption  correctness

Page 28: Short&Accountable&Ring&Signatures Based&on&DDH

Simulated  Opening  &  Straightline Extractability

• To  prove  anonymity,  we  do  an  IND-­‐CCA  style  proof– Need  to  extract   𝑣𝑘 from  sigs– Can’t  see  the  key

• Adversary  can  obstruct  rewinding– Adversary’s  signatures  related  to  each  other– Rewinding  to  open  one  changes  previous  ⇒more  rewinding

• We  need  to  extract  𝑣𝑘 = 𝑔MN  with  no  rewinding– Cheap  solution:  Attach  2nd encryption  of  𝑣𝑘 to  proof  [NY]– Simulator  has  2nd key  in  simulation– Nobody  has  the  key  in  real  world

Page 29: Short&Accountable&Ring&Signatures Based&on&DDH

Efficiency

• log  𝑁 + 12 Group  Elements

• �7log  𝑁 + 6 Field  Elements

• Competitive  vs  sRSA/DDH  schemesScheme |𝑅| = 128 |𝑅| = 1024 |𝑅| = 1Mi[CG05]  – 2048  sRSA +  d.Log 10  Kib 10  Kib 10  KibThis – 192  ECC 6.7  Kib 8.1Kib 12.75  KibThis  – 192  ECC 7.8  Kib 9.4  Kib 14.875  Kib

• Linear  expos  (or  worse)  to  Sign• Linear  expos  to  Verify

Page 30: Short&Accountable&Ring&Signatures Based&on&DDH

• Accountable  Ring  Signatures  can  be  best  of  both  worlds– Tracing  functionality  of  Group  sigs– Free  choice  of  ring– Free  choice  of  opener– Can  derive  Ring  and  Group  signatures

• Signature  size:– Competitive  vs  sRSA/DDH  schemes– Better  than  50%  size  improvement  overoriginal  GK  construction:  binary  →𝑛-­‐tree,mixed  Com+Enc

Summary

💩 , 𝜎,R

Open(𝜎)

𝑚$, 𝜎$,𝑅′

Page 31: Short&Accountable&Ring&Signatures Based&on&DDH

Thanks!