Further Simplifications in Proactive RSA Signatures

Slides:



Advertisements
Similar presentations
On the Amortized Complexity of Zero-Knowledge Proofs Ronald Cramer, CWI Ivan Damgård, Århus University.
Advertisements

1 Chapter 7-2 Signature Schemes. 2 Outline [1] Introduction [2] Security Requirements for Signature Schemes [3] The ElGamal Signature Scheme [4] Variants.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
URSA: Providing Ubiquitous and Robust Security Support for MANET
PROVIDING ROBUST AND UBIQUITOUS SECURITY SUPPORT FOR MOBILE AD- HOC NETWORKS Georgios Georgiadis 6/5/2008.
Improving the Round Complexity of VSS in Point-to-Point Networks Jonathan Katz (University of Maryland) Chiu-Yuen Koo (Google Labs) Ranjit Kumaresan (University.
1 A few challenges in security & privacy in the context of ubiquitous computing Gene Tsudik SCONCE: Secure Computing and Networking Center UC Irvine
CNS2010handout 10 :: digital signatures1 computer and network security matt barrie.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
A Secure Fault-Tolerant Conference- Key Agreement Protocol Wen-Guey Tzeng Source : IEEE Transactions on computers Speaker : LIN, KENG-CHU.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Cryptography in Subgroups of Z n * Jens Groth UCLA.
Security Arguments for Digital Signatures and Blind Signatures Journal of Cryptology, (2000) 13: Authors: D. Pointcheval and J. Stern Presented.
1 CIS 5371 Cryptography 9. Data Integrity Techniques.
8. Data Integrity Techniques
ElGamal Public Key Cryptography CS 303 Alg. Number Theory & Cryptography Jeremy Johnson Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Lecture 3.2: Public Key Cryptography II CS 436/636/736 Spring 2014 Nitesh Saxena.
Robust Sharing of Secrets when the Dealer Is Honest or Cheating Tal Rabin 1994 Brian Fry COEN
Topic 22: Digital Schemes (2)
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
Lecture 3.4: Public Key Cryptography IV CS 436/636/736 Spring 2013 Nitesh Saxena.
Sakurai Lab. Information Technology & Security Lab. Practical Revisits for implementing the Distributing Security-Mediated PKI (Ongoing work) Jong-Phil.
Secure Computation (Lecture 5) Arpita Patra. Recap >> Scope of MPC > models of computation > network models > modelling distrust (centralized/decentralized.
1 Membership Control in P2P and MANETs Nitesh Saxena, Gene Tsudik, Jeong H. Yi Computer Science Department University of California at Irvine {nitesh,
DISTRIBUTED CRYPTOSYSTEMS Moti Yung. Distributed Trust-- traditionally  Secret sharing: –Linear sharing over a group (Sum sharing) gives n out of n sharing.
On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase Ronald Cramer, Ivan Damgard, Serge Fehr.
Identity based signature schemes by using pairings Parshuram Budhathoki Department of Mathematical Science FAU 02/21/2013 Cyber Security Seminar, FAU.
10/25/04 Security of Ad Hoc and Sensor Networks (SASN) 1/22 An Attack on the Proactive RSA Signature Scheme in the URSA Ad Hoc Network Access Control Protocol.
PROACTIVE SECRET SHARING Or: How to Cope With Perpetual Leakage Herzberg et al. Presented by: Avinash Ravi Kevin Skapinetz.
28 September 2005 Secret Sharing Amin Y. Teymorian Department of Computer Science The George Washington University.
1 Lect. 19: Secret Sharing and Threshold Cryptography.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
Presented by Edith Ngai MPhil Term 3 Presentation
Overview Modern public-key cryptosystems: RSA
Cryptographic Protocols Secret sharing, Threshold Security
Outline Primitive Element Theorem Diffie Hellman Key Distribution
Source: The Journal of Systems and Software, Vol. 73, 2004, pp.507–514
Asymmetric-Key Cryptography
Information Security message M one-way hash fingerprint f = H(M)
Boneh-Franklin Identity Based Encryption Scheme
An efficient threshold RSA digital signature scheme
Foundations of Secure Computation
Understanding Cryptography – A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl Chapter 10 – Digital Signatures.
Some slides borrowed from Philippe Golle, Markus Jacobson
IEEE TRANSACTIONS ON INFORMATION THEORY, JULY 1985
Secret Sharing (or, more accurately, “Secret Splitting”)
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
Digital Signature Schemes and the Random Oracle Model
Cryptography Lecture 27.
Topic 25: Discrete LOG, DDH + Attacks on Plain RSA
Digital Signature Schemes and the Random Oracle Model
Four-Round Secure Computation without Setup
Information Security message M one-way hash fingerprint f = H(M)
Some slides borrowed from Philippe Golle, Markus Jacobson
Threshold RSA Cryptography
SCONCE: Secure Computing and Networking Center
Practical Aspects of Modern Cryptography
For ASIACRYPT 2018 Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem Fuyou Miao University of Science and Technology of China.
Chapter 13 Digital Signature
Cryptology Design Fundamentals
Security of Wang-Li Threshold Signature Scheme
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Cryptographic Protocols Secret Sharing, Threshold Security
Network Security Design Fundamentals Lecture-13
Cryptography Lecture 26.
A Light-weight Oblivious Transfer Protocol Based on Channel Noise
LAB 3: Digital Signature
Presentation transcript:

Further Simplifications in Proactive RSA Signatures Stanisław Jarecki and Nitesh Saxena School of Information and Computer Science University of California, Irvine 02/12/05 Theory of Cryptography Conference (TCC)

Theory of Cryptography Conference (TCC) Outline Threshold Crypto, Proactive Signatures Proactive RSA - related work Rabin’s Scheme URSA Scheme (and its insecurity) Motivation Proposed Proactive RSA Scheme Tighter Analysis of Rabin’s Scheme Open Problems 02/12/05 Theory of Cryptography Conference (TCC)

(t,n)-Threshold Cryptography Due to Desmedt; Boyd; Croft and Harris; Desmedt and Frankel Tool: Shamir’s Polynomial Secret Sharing Motivation: to secure the cryptosystem against t (< n/2) corruptions Split the secret d among n entities so that any set of t+1 or more entities can recover the secret an adversary who corrupts at most t entities, learns nothing about d f(x) = S + a1x + a2x2 + … + at-1xt (mod q) ssi = f(idi) (mod q) SECURE INSECURE Polynomial interpolation: for any G, s.t. |G|=t+1 02/12/05 Theory of Cryptography Conference (TCC)

Threshold and Proactive Signatures Threshold Signatures allow any set of t+1 entities to sign messages on behalf of the system tolerate up to t corruptions in the lifetime of the system Proactive Signatures threshold signatures with increased resilience, lifetime is divided into intervals secret shares are updated tolerate up to t corruptions in every interval 02/12/05 Theory of Cryptography Conference (TCC)

Theory of Cryptography Conference (TCC) Types of Adversaries Static Adaptive/Dynamic 02/12/05 Theory of Cryptography Conference (TCC)

Applications of Proactive Signatures Distributed Certification Authority, e.g., COCA Time-stamping Service Access control in peer-to-peer and mobile ad hoc networks, e.g., URSA P2P MANET 02/12/05 Theory of Cryptography Conference (TCC)

Examples of Proactive Signatures Discrete-log based DSA based; Gennaro, et al. [EC’96] [IANDC’01] Schnorr based Gennaro, et al. [RSA Security’03] BLS based Boldyreva [PKC’03] RSA based Frankel, et al. [FOCS’97] [Crypto’97], Rabin [Crypto’98] Trusted Standard; Faster Verification 02/12/05 Theory of Cryptography Conference (TCC)

Proactive RSA – Related Work (1/3) Frankel, et al. [Crypto’97] Does not achieve optimal threshold t < n/2 Combinatorial and thus not scalable Frankel, et al. [FOCS’97] 02/12/05 Theory of Cryptography Conference (TCC)

Proactive RSA – Related Work (2/3) Rabin [Crypto’98] Main idea: share RSA secret d additively over integers share the additive shares polynomially over integers Sign using additive share Proactivize by shuffling and re-sharing additive shares. Crash == malicious fault Does not tolerate adaptive adversary 02/12/05 Theory of Cryptography Conference (TCC)

Proactive RSA – Related Work (3/3) URSA: Ubiquitous and Robust Access Control Luo, et al. [ICNP’01, ISCC’02, WCMC’02, ToN’04] Main idea: Share d polynomially in ZN Sign using polynomial shares Reconstruct sig by converting the equation in mod N into an equation in integers No proof of security Actually insecure; Jarecki, et al. [SASN’04] Equation over integers leaks certain information about d 02/12/05 Theory of Cryptography Conference (TCC)

Motivation for the Proposed Scheme Can we fix the URSA scheme to yield a proactive RSA simpler? more efficient? crash ≠ malicious fault? adaptively secure? Yes Yes No/Open No/Open 02/12/05 Theory of Cryptography Conference (TCC)

URSA Proactive RSA Scheme (1/3) Setup Dealer generates RSA private key d and public key (e, N) Randomly picks polynomial f(x) of degree t Member Mj is issued a secret share: f(x) = d + a1x + a2x2 + … + atxt (mod N) ssj = f(j) (mod N) Signature generation (signing group G, |G|=t+1) Polynomial interpolation: , , where partial key: Mj outputs partial signature: Recall: RSA signature s = md (mod N) 02/12/05 Theory of Cryptography Conference (TCC)

URSA Proactive RSA Scheme (2/3) Signature reconstruction: from t+1 Since  Try all (t+1) values of α , s.t. se = m (mod N) Note: α is revealed 02/12/05 Theory of Cryptography Conference (TCC)

Problems with URSA Proactive RSA Robustness; Narasimha, et al. [ICNP’03] Shares are computed mod N Regular verifiability mechanisms fail No verifiability  No robustness Insecure Jarecki, et al. [SASN’04] e.g., for t = 7, |N|=1024, e = 65537 , the attack recovers d in 163 rounds 02/12/05 Theory of Cryptography Conference (TCC)

Our Attack (example): Binary Search t=1, n=2 Players M1, M2 , Signing group G={1,2} Adversary A corrupts M1 Recall: d = d1 + d2 – αN Signing protocol reveals α If α = 0,  d = d1 + d2  d ≥ d1 o/w if α = 1,  d = d1 + (d2 - N)  d < d1 During proactive updates, A can choose ss1 s.t. With every update round, the search interval is halved Binary search recovers d in log2(N) rounds Recall d1 = ss1l1 (mod N) 0 d1 N 02/12/05 Theory of Cryptography Conference (TCC)

The Proposed Scheme in a Nutshell Share d additively over a large enough prime q Share the shares polynomially using Pedersen’s VSS Use additive shares to sign Use URSA signature reconstruction To detect faulty signers, use special purpose zero-knowledge proofs Boudot [EC’00] & Camenisch and Michels [Crypto’99] 02/12/05 Theory of Cryptography Conference (TCC)

Theory of Cryptography Conference (TCC) Set-up Dealer d and (e, N) ; a prime q ≥ r2|N|+τ, g, h, p Pick dj, dj’ ε Zq s.t Share dj, dj’ using polynomials fj(z) and f’j(z) over Zq and publish the commitment to the polynomials as g f(z)hf’(z) mod p Send di, di’, fj(i), fj’(i) to member Mi 02/12/05 Theory of Cryptography Conference (TCC)

Signature Generation & Reconstruction Mj outputs partial signature: Reconstruction: 02/12/05 Theory of Cryptography Conference (TCC)

Robustness during Signing Signing with (dj + q) will also succeed this proof; gq = 1 (mod p) Failure of signature reconstruction  at least a cheating signer Detect by verifying each partial sig. sj Equality of discrete log in two different groups Using proofs by Damgard-Fujisaki-Okamoato; Camenish-Michels Range of a committed number Using proofs by Boudot; Damgard-Fujisaki-Okamoato 02/12/05 Theory of Cryptography Conference (TCC)

Theory of Cryptography Conference (TCC) Proactive Update Each Mj splits his old secret share dj additively into n subshares in Zq Mi’s new share 02/12/05 Theory of Cryptography Conference (TCC)

Theory of Cryptography Conference (TCC) Security Analysis: why top level additive sharing fixes the URSA scheme Model: Existential Forgery in Chosen Message Attack Theorem: If an adversary corrupting t players can CMA attack the new (FDH) proactive RSA scheme with probabilty β in time T  he can CMA attack the standard (FDH) RSA with probability β-2-τ in time T+ poly(n, |N|) Proof: Using Simulation technique Statistical difference is due to the probability difference of generating α value in the protocol and α value in the simulator 02/12/05 Theory of Cryptography Conference (TCC)

Comparison with Rabin’s Scheme New Scheme Sharing Over integers Over prime number Additive Share size [-nN2, nN2] [0, rN2τ] Coefficient size [-nL2N3, nL2N3] (L= n!) In short, new scheme is simpler twice faster in signing 02/12/05 Theory of Cryptography Conference (TCC)

Tighter Analysis of Rabin’s Original Simulation Picking d1, d2,…, dn-1, uniformly at random from [-R,R], where R = nN2 Picking dpublic uniformly at random from [nR, nR+N] Error dpublic in protocol has normal dist. dpublic in simulation has uniform dist Immediately distinguishable Corrected Simulation Exactly as the protocol In r rounds, statistical difference δ = rN/R New share sizes R = rN2τ to make δ negligible 02/12/05 Theory of Cryptography Conference (TCC)

Theory of Cryptography Conference (TCC) Related Open Problems Can we fix the URSA scheme to yield a proactive RSA crash ≠ malicious fault? adaptively secure? Can we have upper bounds on the security of URSA scheme Upto how many rounds is it secure (if at all) Upto how many signature operations it allows in every round What threshold is it secure for (if at all) 02/12/05 Theory of Cryptography Conference (TCC)