Hidden pairings and trapdoor DDH groups Alexander W. Dent Joint work with Steven D. Galbraith.

Slides:



Advertisements
Similar presentations
Asymptotically Optimal Communication for Torus- Based Cryptography David Woodruff MIT Joint work with Marten van Dijk Philips/MIT.
Advertisements

An Introduction to Pairing Based Cryptography Dustin Moody October 31, 2008.
Spreading Alerts Quietly and the Subgroup Escape Problem Aleksandr Yampolskiy (Yale) Joint work with James Aspnes, Zoë Diamadi, Kristian Gjøsteen, and.
Notation Intro. Number Theory Online Cryptography Course Dan Boneh
1 The RSA Algorithm Supplementary Notes Prepared by Raymond Wong Presented by Raymond Wong.
Great Theoretical Ideas in Computer Science.
Simple Lattice Trapdoor Sampling from a Broad Class of Distributions Vadim Lyubashevsky and Daniel Wichs.
ELECTRONIC PAYMENT SYSTEMSFALL 2002COPYRIGHT © 2002 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
CNS2010handout 8 :: introduction to number theory1 computer and network security matt barrie.
Elliptic Curve. p2. Outline EC over Z p EC over GF(2 n )
CS470, A.SelcukPublic Key Cryptography1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Introduction to Computer and Network Security Iliano Cervesato 26 August 2008 – Modern Cryptography.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Cryptography and Network Security Chapter 13
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Dan Boneh Intro. Number Theory Intractable problems Online Cryptography Course Dan Boneh.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
ElGamal Public Key Cryptography CS 303 Alg. Number Theory & Cryptography Jeremy Johnson Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme.
Bob can sign a message using a digital signature generation algorithm
The RSA Algorithm Rocky K. C. Chang, March

Cryptography Lecture 6 Stefan Dziembowski
CPSC 3730 Cryptography and Network Security
1 Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 4 – Finite Fields.
Information Security and Management 4. Finite Fields 8
Cryptography and Network Security Introduction to Finite Fields.
Great Theoretical Ideas in Computer Science.
September 20 th, 2006 U-Prove crypto overview Copyright © 2006, Quebec Inc. Proprietary and Confidential.
A New Approach on Bilinear Pairings and Its Applications Tatsuaki Okamoto.
Computer Science CSC 774 Advanced Network Security Topic 2.6 ID Based Cryptography #2 Slides by An Liu.
Quantum Factoring Michele Mosca The Fifth Canadian Summer School on Quantum Information August 3, 2005.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 4 – Finite Fields
Data Security and Encryption (CSE348) 1. Lecture # 12 2.
Controlled Algebras and GII’s Ronald L. Rivest MIT CSAIL IPAM Workshop October 9, 2006.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Great Theoretical Ideas in Computer Science.
Scott CH Huang COM 5336 Cryptography Lecture 6 Public Key Cryptography & RSA Scott CH Huang COM 5336 Cryptography Lecture 6.
Information and Coding Theory Cyclic codes Juris Viksna, 2015.
Math 3121 Abstract Algebra I Lecture 5 Finish Sections 6 + Review: Cyclic Groups, Review.
Ryan Henry I 538 /B 609 : Introduction to Cryptography.
Cryptography and Network Security Chapter 4. Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic.
Copyright 2012, Toshiba Corporation. A Survey on the Algebraic Surface Cryptosystems Koichiro Akiyama ( TOSHIBA Corporation ) Joint work with Prof. Yasuhiro.
Great Theoretical Ideas In Computer Science Anupam GuptaCS Fall 2006 Lecture 15Oct 17, 2006Carnegie Mellon University Algebraic Structures: Groups,
11 RSA Variants.  Scheme ◦ Select s.t. p and q = 3 mod 4 ◦ n=pq, public key =n, private key =p,q ◦ y= e k (x)=x (x+b) mod n ◦ x=d k (y)=  y mod n.
Weaknesses in the Generic Group Model
15-499Page :Algorithms and Applications Cryptography II – Number theory (groups and fields)
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Great Theoretical Ideas in Computer Science.
Multiplicative Group The multiplicative group of Z n includes every a, 0
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Key Exchange in Systems VPN usually has two phases –Handshake protocol: key exchange between parties sets symmetric keys –Traffic protocol: communication.
Cryptography and Network Security Chapter 13
Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-5 Mathematical Background:
Elliptic Curve Public Key Cryptography Why ? ● ECC offers greater security for a given key size. ● The smaller key size also makes possible much more compact.
Elliptic Curve Public Key Cryptography
Topic 26: Discrete LOG Applications
On the Size of Pairing-based Non-interactive Arguments
B504/I538: Introduction to Cryptography
Elliptic Curves.
Homework 3 As announced: not due today 
Cryptography Lecture 23.
Math 3121 Abstract Algebra I
Cryptography Lecture 19.
Cryptography Lecture 21.
Mathematical Background: Extension Finite Fields
Presentation transcript:

Hidden pairings and trapdoor DDH groups Alexander W. Dent Joint work with Steven D. Galbraith

2

3 Pairings in cryptography Elliptic curves have become an important tool in cryptography… …and pairings have become an important tool within elliptic curve cryptography, both as an attack technique and to provide extra functionality. The main use is to solve the DDH and DL problems in large prime-order subgroups.

4 Pairings in cryptography High security pairing-based cryptography (Granger, Page and Smart) Constructing pairing-friendly curves of embedding degree 10 (Freeman) Fast bilinear maps from the Tate-Lichtenbaum pairing on hyperelliptic curves (Frey and Lange)

5 Pairings in cryptography In this paper we will be mostly concerned with the decisional Diffie-Hellam (DDH) problem: Let G be a group generated by an element P. The DDH problem is to determine, given (A,B,C), where A=aP, B=bP, whether C=cP or C=abP, when a, b and (potentially) c are chosen at random.

6 Pairings in cryptography In all normal situations, when a pairing is computable, the pairing algorithm is comparatively obvious given the curve description. We conjecture that there exist elliptic curve groups on which a pairing can only be computed given some extra trapdoor information. We call these hidden pairings.

7 Pairings in cryptography A hidden pairing is an instantiation of a trapdoor DDH group: a group on which the DDH problem can only be efficiently solved by an algorithm with the trapdoor information. We also conjecture the existence of trapdoor discrete logarithm groups.

First construction

9 Let p and q be large primes. Let E: y 2 = x 3 + ax + b be an elliptic curve such that E(F p ) and E(F q ) both have a small embedding degree. Hence, there exist a public pairing algorithm for E(F p ) and E(F q ). Suppose further than #E(F p ) and #E(F q ) have large prime divisors r and s.

10 First construction Now consider the elliptic curve E over the ring Z N where N=pq. Clearly, group operations are efficient. E(Z N ) contains a cyclic subgroup of order rs. The security of elliptic curves over rings has been studied by Galbraith and McKee in “Pairings on elliptic curves over finite commutative rings”.

11 First construction Yes?

12 First construction There is no evidence to suggest that, without knowing (a multiple of) rs, that we can compute pairings on this subgroup. If r and s are large enough, then knowledge of rs is enough to factor N. However, knowledge of (a multiple of) rs is sufficient to be able to compute a pairing.

13 First construction So, if we know #E(F p ) and #E(F q ), then we can compute pairings because rs divides #E(F p )#E(F q ). Alternatively, we can solve the DDH problem by projecting the points of the curve E(Z N ) onto E(F p ) and E(F q ) and solving these two problems individually. Hence, we can solve the DDH problem if we know p and q.

14 First construction Take p and q to be large primes congruent to 3 mod 4 for which there exists large prime divisors of r and s of p+1 and q+1. Take E: y 2 = x 3 + x. Then E is a supersingular curve over F p with embedding degree 2 and p+1 points. And #E(F p ) has the large prime divisor r.

15 First construction This means that #E(Z N ) = (p+1)(q+1). If we know p and q then we can compute pairings because rs divides into (p+1)(q+1). Hence we have a hidden pairing. We can also solve the DDH problem on E(Z N ) by solving two DDH problems on E(F p ) and E(F q ).

16 First construction What about the practicalities of cryptography: – We can hash into the group by using the techniques of Demytko, i.e. we use the x-coordinate only and use a standard hash algorithm to map an arbitrary string to an element of Z N. – We can use similar techniques to randomly sample elements from the group. – The DDH problem has to be generalised in this case, but it’s not difficult. – Points will be of size log N ≈ 1024-bits.

17 First construction Our example also a cute property: We can delegate the ability to compute a pairing to a third party by releasing rs without giving away the factorisation of N. Obviously, in this case we want r and s to be large enough so that we can’t break the system, but not so large that knowledge of rs implies knowledge of p and q.

Second construction

19 Second construction This time we consider an elliptic curve E over a finite field F q of characteristic 2. In particular, we want q to be equal to 2 mn. We also want there to exist an efficiently computable pairing on the elliptic curve. We will represent points on E using projective coordinates (x:y:z). And we will steal adapt an idea of Frey’s.

20 Second construction We may think F q as a vector space of dimension n over the field F q´ where q´=2 m. Hence, we may think of points as 3m-tuples: (x 0,x 1,…,x m-1,y 0,y 1,..y m-1,z 0,z 1,…,z m-1 ) We may think of the doubling formula as a series of 3m formulae (fx i,fy i,fz i ) in 3m variables such that if (x´:y´:z´)=[2](x:y:z) then x´ i = fx i (x 0,x 1,…,x m-1,y 0,y 1,..y m-1,z 0,z 1,…,z m-1)

21 Second construction Each of these formulae are homogeneous polynomials of degree at most six. We can do the same thing to the addition formula to get 3m formulae in 6m variables, (gx i,gy i,gz i ).

22 Second construction Now we apply Frey’s idea of disguising an elliptic curve. Let U be an invertible linear transformation on 3m-variables. We apply U to the point of E(F q ). Note that we can express the addition and doubling formulae in this new system as fx´ i = U fx i U -1 and gx´ i = U gx i U -1

23 Second construction Public group description: – Blinded doubling and addition formulae – Blinded generator U(P) – The order r of the point P Trapdoor information: – The inverse transformation U -1 Difficult to hash onto the group, sample group elements at random or even test for equality.

24 Second construction Wow, this all seems very dodgy! It is easy to break for finite fields and the algebraic torus T 2. “Disguising tori and elliptic curves” ( It’s also related to the isomorphism of polynomials problem. Faugère and Perret’s result from Eurocrypt 2006 suggests parameter sizes have to be so large as to be infeasible in practice.

Applications

26 Applications to cryptography Not as many as one would like. If trapdoor to be used by an individual, that individual must compute the group description. We give a few simple examples in the paper. Perhaps useful for a situation with a central authority that generates a group description on behalf of a set of users. Group signatures?

27 Applications to cryptography Applications to the Gap-DH problem? Most people assume that the Gap-DH problem is hard on any group for which the CDH problem is hard. Not proven when the DDH problem is hard. Our results do not necessarily give new gap groups. However, most proofs can be easily adapted.

Questions?

29 First construction Wow, that’s a great question.

30 First construction I’m not sure what the answer is right now, But why don’t you pop it in an and I’ll think about and get back to you. You might want to CC Alex on the too.

31 First construction Oh that’s an easy question. The answer’s ‘yes’. Or, in certain circumstances, ‘no’. Hmmm. Maybe it’s not as easy as I thought. Why don’t you it to me?