Blind Signatures: Definitions and Constructions Carmit Hazay Yehuda Lindell Bar-Ilan University Jonathan Katz Chiu-Yuen Koo University of Maryland.

Slides:



Advertisements
Similar presentations
Dov Gordon & Jonathan Katz University of Maryland.
Advertisements

Simulation-sound NIZK Proofs for a Practical Language and Constant Size Group Signatures Jens Groth University of California Los Angeles Presenter: Eike.
On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols Iftach Haitner, Alon Rosen and Ronen Shaltiel 1.
Coin Tossing With A Man In The Middle Boaz Barak.
Strict Polynomial-Time in Simulation and Extraction Boaz Barak & Yehuda Lindell.
Quantum Money from Hidden Subspaces Scott Aaronson and Paul Christiano.
Secure Multiparty Computations on Bitcoin
Efficient Zero-Knowledge Proof Systems Jens Groth University College London.
1 Identity-Based Zero-Knowledge Jonathan Katz Rafail Ostrovsky Michael Rabin U. Maryland U.C.L.A. Harvard U.
Dominique Unruh Non-interactive zero-knowledge with quantum random oracles Dominique Unruh University of Tartu With Andris Ambainis, Ansis Rosmanis Estonian.
Computational Security. Overview Goal: Obtain computational security against an active adversary. Hope: under a reasonable cryptographic assumption, obtain.
Amortizing Garbled Circuits Yan Huang, Jonathan Katz, Alex Malozemoff (UMD) Vlad Kolesnikov (Bell Labs) Ranjit Kumaresan (Technion) Cut-and-Choose Yao-Based.
Eran Omri, Bar-Ilan University Joint work with Amos Beimel and Ilan Orlov, BGU Ilan Orlov…!??!!
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
1 Vipul Goyal Abhishek Jain Rafail Ostrovsky Silas Richelson Ivan Visconti Microsoft Research India MIT and BU UCLA University of Salerno, Italy Constant.
Improving the Round Complexity of VSS in Point-to-Point Networks Jonathan Katz (University of Maryland) Chiu-Yuen Koo (Google Labs) Ranjit Kumaresan (University.
Modeling Insider Attacks on Group Key Exchange Protocols Jonathan Katz Ji Sun Shin University of Maryland.
Yan Huang, Jonathan Katz, David Evans University of Maryland, University of Virginia Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose.
Impossibility Results for Concurrent Two-Party Computation Yehuda Lindell IBM T.J.Watson.
A Parallel Repetition Theorem for Any Interactive Argument Iftach Haitner Microsoft Research TexPoint fonts used in EMF. Read the TexPoint manual before.
CS426Fall 2010/Lecture 351 Computer Security CS 426 Lecture 35 Commitment & Zero Knowledge Proofs.
Explorations in Anonymous Communication Andrew Bortz with Luis von Ahn Nick Hopper Aladdin Center, Carnegie Mellon University, 8/19/2003.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
1 Zaps and Apps Cynthia Dwork Microsoft Research Moni Naor Weizmann Institute of Science.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
Optimistic Synchronous Multi-Party Contract Signing N. Asokan, Baum-Waidner, M. Schunter, M. Waidner Presented By Uday Nayak Advisor: Chris Lynch.
Security Arguments for Digital Signatures and Blind Signatures Journal of Cryptology, (2000) 13: Authors: D. Pointcheval and J. Stern Presented.
Security Arguments for Digital Signatures and Blind Signatures Journal of Cryptology, (2000) 13: Authors: D. Pointcheval and J. Stern Presented.
1. Outline 1. Background 1. Attacks on distance-bounding 2. Symmetric vs asymmetric protocol 3. Motivation: DBPK-Log 2. VSSDB 1. Building blocks 2. Protocol.
K-Anonymous Message Transmission Luis von Ahn Andrew Bortz Nick Hopper The Aladdin Center Carnegie Mellon University.
Slide 1 Vitaly Shmatikov CS 380S Oblivious Transfer and Secure Multi-Party Computation With Malicious Parties.
Foundations of Cryptography Lecture 8 Lecturer: Moni Naor.
1 Cross-Domain Secure Computation Chongwon Cho (HRL Laboratories) Sanjam Garg (IBM T.J. Watson) Rafail Ostrovsky (UCLA)
Information-Theoretic Security and Security under Composition Eyal Kushilevitz (Technion) Yehuda Lindell (Bar-Ilan University) Tal Rabin (IBM T.J. Watson)
Adaptively Secure Broadcast, Revisited
Digital signature in automatic analyses for confidentiality against active adversaries Ilja Tšahhirov, Peeter Laud.
Andrew Lindell Aladdin Knowledge Systems and Bar-Ilan University 04/09/08 CRYP-202 Legally-Enforceable Fairness in Secure Two-Party Computation.
1 CIS 5371 Cryptography 3. Private-Key Encryption and Pseudorandomness B ased on: Jonathan Katz and Yehuda Lindel Introduction to Modern Cryptography.
Impossibility and Feasibility Results for Zero Knowledge with Public Keys Joël Alwen Tech. Univ. Vienna AUSTRIA Giuseppe Persiano Univ. Salerno ITALY Ivan.
Introduction to Modern Cryptography Sharif University Spring 2015 Data and Network Security Lab Sharif University of Technology Department of Computer.
Introduction to Modern Cryptography Sharif University Spring 2015 Data and Network Security Lab Sharif University of Technology Department of Computer.
Password Mistyping in Two-Factor Authenticated Key Exchange Vladimir KolesnikovCharles Rackoff Bell LabsU. Toronto ICALP 2008.
On the Communication Complexity of SFE with Long Output Daniel Wichs (Northeastern) joint work with Pavel Hubáček.
1 Reasoning about Concrete Security in Protocol Proofs A. Datta, J.Y. Halpern, J.C. Mitchell, R. Pucella, A. Roy.
1 Information Security – Theory vs. Reality , Winter Lecture 10: Garbled circuits and obfuscation Eran Tromer Slides credit: Boaz.
Rational Cryptography Some Recent Results Jonathan Katz University of Maryland.
Signatures, etc. Network Security Gene Itkis Signature scheme: Formal definition GenKey Generation: Gen(1 k )   PK, SK  SignSigning: Sign(SK, M) 
On the (Im)possibility of Blind Message Authentication Codes Gregory Neven (Katholieke Universiteit Leuven, Belgium) Joint work with: Michel Abdalla (Ecole.
New Techniques for NIZK Jens Groth Rafail Ostrovsky Amit Sahai University of California Los Angeles.
Game-based composition for key exchange Cristina Brzuska, Marc Fischlin (University of Darmstadt) Nigel Smart, Bogdan Warinschi, Steve Williams (University.
On Simulation-Sound Trapdoor Commitments Phil MacKenzie, Bell Labs Ke Yang, CMU.
Identity based signature schemes by using pairings Parshuram Budhathoki Department of Mathematical Science FAU 02/21/2013 Cyber Security Seminar, FAU.
Secure Computation Lecture Arpita Patra. Recap >> Improving the complexity of GMW > Step I: Offline: O(n 2 c AND ) OTs; Online: i.t., no crypto.
Non-interactive quantum zero-knowledge proofs
1/28 Chosen-Ciphertext Security from Identity- Based Encryption Jonathan Katz U. Maryland Ran Canetti, Shai Halevi IBM.
Jonathan Katz University of Maryland Andrew Lindell Aladdin Knowledge Systems and Bar-Ilan University 04/08/08 CRYP-108 Aggregate Message- Authentication.
ICICS2002, Singapore 1 A Group Signature Scheme Committing the Group Toru Nakanishi, Masayuki Tao, and Yuji Sugiyama Dept. of Communication Network Engineering.
Round-Efficient Multi-Party Computation in Point-to-Point Networks Jonathan Katz Chiu-Yuen Koo University of Maryland.
Topic 36: Zero-Knowledge Proofs
On the Size of Pairing-based Non-interactive Arguments
Topic 14: Random Oracle Model, Hashing Applications
Digital Signature Schemes and the Random Oracle Model
Digital Signature Schemes and the Random Oracle Model
cryptographic protocols 2014, lecture 12 Getting full zero knowledge
Masayuki Fukumitsu Hokkaido Information University, Japan
Quantum-security of commitment schemes and hash functions
Fiat-Shamir for Highly Sound Protocols is Instantiable
On the (Im)possibility of Blind Message Authentication Codes
Presentation transcript:

Blind Signatures: Definitions and Constructions Carmit Hazay Yehuda Lindell Bar-Ilan University Jonathan Katz Chiu-Yuen Koo University of Maryland

Blind Signatures [Chaum] Enables a user to obtain a signature from a signer on a message m, without the signer learning anything about m Motivation: e-cash, e-voting Useful when values need to be certified, yet anonymity should be preserved

Example: e-cash (simplified) Bank has public key PK User: Sends its account information to the bank Obtains a signature  on a coin c When the user later presents (c,  ) to a merchant, the merchant can verify  Should be infeasible to trace a coin to a particular user

Example: e-voting (simplified) Registration authority has public key PK Voter: Proves she is a valid voter… Obtains signature  i on public key pk i (generated and used for this application only) Voter can later cast her vote v (on a public bulletin board) by posting (pk i,  i, v,  ) Should be infeasible to trace a public key to a particular voter

Requirements Need to consider security requirements of both the signer and the user Protection of signer: Unforgeability Protection of user: Blindness

Unforgeability Intuitively: If a malicious user interacts with the (honest) signer n times, it should be infeasible for the user to output valid signatures on n+1 distinct messages Note: these interactions might be Sequential Parallel Concurrent Easy to show a protocol secure against parallel attacks, but not concurrent ones

Blindness Intuitively: Malicious signer should be unable to link a (message, signature) pair to any particular execution of the protocol A bit messy to formalize…

Blindness (“standard” def’n) (Malicious) signer outputs PK, m 0, m 1 Random bit b selected; signer interacts concurrently with U(m b ), U(m 1-b ) If either user-instance aborts, signer gets nothing If neither user-instances aborts, signer gets the computed signatures on m 0, m 1 Pr[Signer guesses b] – ½ = negl

Necessity of dealing with abort Say signer can induce a message-dependent abort I.e., can act so that user aborts if using m 0 but not if using m 1 Consider the following attack: Act as above in first session; act honestly in second session Learning whether users abort or not enables correct guess of b Leads to “real-world” attack

Extending blindness def’n It is not clear how to extend the “stand- alone” definition to the general case of polynomially-many users Issue is how to deal with aborts…

Rethinking the definition Let us recall what we want… Signer should be unable to link (m i,  i ) with any particular completed session, any better than random guessing Equivalently (2-user case), want: In applications, messages chosen by user, not signer Pr[guess b | both sessions completed] – ½ = negl

More generally… Signer outputs PK, D {m i } chosen according to D Signer interacts with U(m 1 ), …, U(m l ); given (m i,  i ) for completed sessions (lex order) Signer succeeds if it identifies a message/signature pair with its correct session Require: for all i, Pr[Succ ٨ #completed = i] – 1/i (Pr[#completed = i]) < negl Equivalently: Exp[Succ · (# completed)] ≤ 1 + negl

Prior work I Blind signatures introduced by Chaum Chaum’s construction later proved secure by [BNPS02] based on the “one-more-RSA” assumption in the RO model Provably-secure schemes (RO model) [PS96] – logarithmically-many sigs [P97] –poly-many sigs [A01, BNPS02, B03] – concurrently-secure

Prior work II Provably-secure schemes (standard model) [JLO97] – using generic secure 2PC [CKW04] – efficient protocol Both give sequential unforgeability only

Prior work III [L03] – impossibility of concurrently-secure blind signatures (without setup)! Lindell’s impossibility result has recently motivated the search for concurrently-secure signatures in the CRS model E.g., [O’06, KZ’06, F’06] Circumventing [L03] explicitly mentioned as justification for using a CRS

Is a CRS really necessary…? The impossibility result seems to suggest so… …but in fact, [L04] only rules out simulation-based security (with black-box reductions) Question: can we circumvent the impossibility result by moving to game-based definitions?

Main result We show the first concurrently-secure blind signature scheme Standard assumptions, no trusted setup Remark: work of [BS05] could seemingly be used as well Would require super-poly hardness assumptions, which we avoid here

Perspective Our work gives (further?) evidence that game-based definitions give a viable approach for concurrent security Rather than imposing additional assumptions (CRS, PKI, network delay,…) …or other relaxations (bounded concurrency, super-poly simulation, …)

The construction Preliminaries Fischlin’s approach to blind signatures A partial solution (Using complexity leveraging) The PRS cZK protocol The full solution

Preliminaries I ZAPs [DN00] ≤2-round WI proofs for NP; 1 st message independent of statement Constructions given in [DN00,BOV03,GOS06a,GOS06b]

Preliminaries II Ambiguous commitment (cf. DN02]) Two types of keys One type gives perfect hiding; other type gives perfect binding (with trapdoor for extraction) Easy constructions based on standard number- theoretic assumptions (e.g., DDH)

Fischlin’s approach Previous blind signature schemes define a protocol to generate some “standard” signature “Blinding” [Chaum, …] Secure computation approach Fischlin takes a different route

Fischlin’s approach CRS: pk, r Signer(SK)User(PK, m) com = Com(m)  = Sign SK (com)  C = E pk (com |  ) NIZK proof  : {C correct for m}

Removing the CRS… Removing r: Use ZAP instead of NIZK Need to introduce “extra” witness in protocol Use Feige-Shamir trick… Removing pk: Want semantic security, yet extraction! Use complexity leveraging… Commitment scheme that is hiding for PPT adversaries, but allows extraction in time T(k) Other components should have T(k)-time security

A partial solution PK: pk’, y 0, y 1, r SignerUser(m) com = Com(m)  = Sign SK (com)  C 1 = Com*(com |  ) C 2 = Com*(0 k ) ZAP  : {C 1 correct for m} or {C 2 correct} WI-PoK: x 0 or x 1

Toward a full solution… In our full solution, we use (a modification of) the cZK protocol of [PRS02] Modified to be an argument of knowledge (in stand-alone sense) (Unfortunately…) we cannot use cZK as a “black- box” but instead must use specific properties of the PRS simulation strategy Look-aheads and straight-line simulation Fixed schedule

Main idea Instead of using complexity leveraging, use an ambiguous commitment scheme Signer includes commitment key as part of its public key To prevent cheating, signer must give cZK proof that the key is of the correct type

First try PK: pk’, pk*, r SignerUser(m) com = Com(m)  = Sign SK (com)  C = Com pk* (com |  ) ZAP  : {C correct for m} or {pk* correct} cZK: pk* correct

Proof? Fairly straightforward to show the following: Given user U who interacts with the (honest) signer and outputs n+1 signatures on distinct messages with non-neg probability… …can construct forger F who interacts with a (standard) signing oracle and outputs n+1 signatures on distinct messages with non-neg probability Problem: F might make >n queries (even if U does not)!

Modification The signer will append a random nonce to what is being signed The forger F we construct will still output n+1 signatures but make >n oracle queries… …but the signatures output by F are (in some sense) independent of the nonces used during rewinding With high probability, one of the signatures output by F will be a forgery

The protocol PK: pk’, pk*, r SignerUser(m) com = Com(m) nc  {0,1} k  = Sign SK (nc|com) nc,  C = Com pk* (nc|com|  ) ZAP  : {C correct for m} or {pk* correct} cZK: pk* correct

Analysis (unforgeability) Given a user who outputs n+1 forgeries: Simlate cZK protocol… Replace pk* by a commitment key that allows extraction… With roughly equal probability, we obtain a forger F who outputs n+1 valid signatures on distinct messages But makes more than n signing queries!

Analysis (unforgeability) F(pk’) U U Sign sk’ nc|com  Sign sk’ nc|com  Only these affect the final output of U! (assuming simulation is successful…) Successful simulation may depend on these Upshot: The n+1 signatures output by U include a nonce used in the “look-ahead” phase with only negligible probability I.e., they yield an actual forgery for F with overwhelming probability

Analysis (blindness) Key point: if any sessions are successful, then pk* is (with overwhelming probability) a key that gives perfectly-hiding commitment So C leaks no information! Perfect hiding needed here By extracting the witness for pk*, can give a ZAP independent of m The rest of the analysis is straightforward…

Conclusion Concurrently-secure blind signatures are possible without setup assumptions If we are satisfied with a game-based definition… Is the use of cZK inherent? In particular, can we improve the round complexity? One bottleneck is the lack of secure signatures… Can we hope for efficient protocols?