Presentation is loading. Please wait.

Presentation is loading. Please wait.

Towards a Classification of Non-interactive Computational Assumptions in Cyclic Groups Essam Ghadafi University of the West of England Jens Groth University.

Similar presentations


Presentation on theme: "Towards a Classification of Non-interactive Computational Assumptions in Cyclic Groups Essam Ghadafi University of the West of England Jens Groth University."โ€” Presentation transcript:

1 Towards a Classification of Non-interactive Computational Assumptions in Cyclic Groups
Essam Ghadafi University of the West of England Jens Groth University College London TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAAAAAAAAAAA

2 Prime order cyclic group
Group generator ๐บ,๐‘” โ†Gen( 1 ๐œ† ) Group ๐บ of known prime order ๐‘ Uniformly random generator ๐‘” such that ๐บ=โŒฉ๐‘”โŒช Efficiently computable group operations Generic group model Adversary restricted to group operations and equality testing

3 Computational problems in cyclic groups
For now, just single cyclic group ๐บ,๐‘” of prime order ๐‘. Later, bilinear groups with pairings ( ๐บ 1 , ๐บ 2 , ๐บ ๐‘‡ , ๐‘” 1 , ๐‘” 2 ,๐‘’). Discrete Logarithm Given ๐‘”, ๐‘” ๐‘ฅ compute ๐‘ฅ Computational Diffie-Hellman Given ๐‘”, ๐‘” ๐‘Ž , ๐‘” ๐‘ compute ๐‘” ๐‘Ž๐‘ Generalized Diffie-Hellman Exponent Given ๐‘”, ๐‘” ๐‘ฅ ,โ€ฆ, ๐‘” ๐‘ฅ ๐‘žโˆ’1 , ๐‘” ๐‘ฅ ๐‘ž+1 ,โ€ฆ, ๐‘” ๐‘ฅ 2๐‘ž compute ๐‘” ๐‘ฅ ๐‘ž Strong Diffie-Hellman Given ๐‘”, ๐‘” ๐‘ฅ ,โ€ฆ, ๐‘” ๐‘ฅ ๐‘ž output ๐‘, ๐‘” 1 ๐‘ฅ+๐‘

4 Non-interactive computational assumptions
Generic group model ? ? ? Computational Diffie-Hellman (CDH) Discrete logarithm (DL)

5 Non-interactive computational assumptions
Generic group model ๐‘ž-GDHE & ๐‘ž-SFrac Fractional assumptions ๐‘ž-GDHE ๐‘ž-SFrac Polynomial assumptions Computational Diffie-Hellman (CDH) Discrete logarithm problem (DL)

6 Non-interactive computational assumption
Accept: ๐‘=1 Reject: ๐‘=0 PPT instance generator ๐‘๐‘ข๐‘,๐‘๐‘Ÿ๐‘–๐‘ฃ โ†๐ผ 1 ๐œ† DPT solution verifier ๐‘โ†๐‘‰(๐‘๐‘ข๐‘,๐‘๐‘Ÿ๐‘–๐‘ฃ,๐‘ ๐‘œ๐‘™) Definition The non-interactive computational assumption (๐ผ,๐‘‰) holds if for all PPT adversaries ๐ด Pr ๐‘๐‘ข๐‘,๐‘๐‘Ÿ๐‘–๐‘ฃ โ†๐ผ 1 ๐œ† ;๐‘ ๐‘œ๐‘™โ†๐ด(๐‘๐‘ข๐‘) ๐‘‰ ๐‘๐‘ข๐‘,๐‘๐‘Ÿ๐‘–๐‘ฃ,๐‘ ๐‘œ๐‘™ =1 โ‰ˆ0

7 (๐‘‘,๐‘š,๐‘›)-target assumption
Say assumption is simple if ๐‘ ๐‘– ๐‘‹ =0 (๐‘‘,๐‘š,๐‘›)-target assumption ๐‘š-variate polynomials of total degree ๐‘‘ or less CDH assumption 1 1 , ๐‘‹ 1 1 , ๐‘‹ โ† ๐ผ ๐‘๐‘œ๐‘Ÿ๐‘’ ๐บ ๐‘‰ ๐‘๐‘œ๐‘Ÿ๐‘’ , ๐‘‹ 1 1 , ๐‘‹ 2 1 , ๐‘Ÿ ๐‘‹ ๐‘  ๐‘‹ ,๐‘ฆ checks ๐‘Ÿ( ๐‘‹ ) ๐‘ ( ๐‘‹ ) = X 1 X 2 ๐‘ž-SDH assumption 1 1 , ๐‘‹ 1 ,โ€ฆ, ๐‘‹ ๐‘ž 1 โ† ๐ผ ๐‘๐‘œ๐‘Ÿ๐‘’ ๐บ ๐‘‰ ๐‘๐‘œ๐‘Ÿ๐‘’ , ๐‘‹ 1 ,โ€ฆ, ๐‘‹ ๐‘ž 1 , ๐‘Ÿ ๐‘‹ ๐‘  ๐‘‹ ,๐‘ฆ checks ๐‘Ÿ( ๐‘‹ ) ๐‘ ( ๐‘‹ ) = 1 ๐‘‹+๐‘ Say assumption is univariate if ๐‘š=1 ๐‘๐‘ข๐‘,๐‘๐‘Ÿ๐‘–๐‘ฃ โ†๐ผ 1 ๐œ† ๐บ,๐‘” โ†Gen 1 ๐œ† ๐‘Ž 1 ๐‘‹ ๐‘ 1 ( ๐‘‹ ) ,โ€ฆ, ๐‘Ž ๐‘› ( ๐‘‹ ) ๐‘ ๐‘› ( ๐‘‹ ) ,๐‘๐‘ข ๐‘ โ€ฒ ,๐‘๐‘Ÿ๐‘– ๐‘ฃ โ€ฒ โ† ๐ผ ๐‘๐‘œ๐‘Ÿ๐‘’ ๐บ ๐‘ฅ โ† ๐’ ๐‘ ๐‘š (such that all ๐‘ ๐‘– ๐‘ฅ โ‰ 0) ๐‘๐‘ข๐‘= ๐บ, ๐‘” ๐‘Ž 1 ๐‘ฅ ๐‘ 1 ๐‘ฅ ,โ€ฆ, ๐‘” ๐‘Ž ๐‘› ๐‘ฅ ๐‘ ๐‘› ๐‘ฅ , ๐‘Ž 1 ๐‘‹ ๐‘ 1 ๐‘‹ ,โ€ฆ, ๐‘Ž ๐‘› ๐‘‹ ๐‘ ๐‘› ๐‘‹ ,๐‘๐‘ข ๐‘ โ€ฒ ; ๐‘๐‘Ÿ๐‘–๐‘ฃ=(๐‘”, ๐‘ฅ ,๐‘๐‘Ÿ๐‘– ๐‘ฃ โ€ฒ ) ๐‘โ†๐‘‰ ๐‘๐‘ข๐‘,๐‘๐‘Ÿ๐‘–๐‘ฃ,๐‘ ๐‘œ๐‘™= ๐‘Ÿ ๐‘‹ ๐‘  ๐‘‹ ,๐‘ฆ,๐‘ ๐‘œ ๐‘™ โ€ฒ Check ๐‘Ÿ( ๐‘‹ ) ๐‘ ( ๐‘‹ ) โˆ‰span ๐‘Ž 1 ๐‘‹ ๐‘ 1 ๐‘‹ ,โ€ฆ, ๐‘Ž ๐‘› ๐‘‹ ๐‘ ๐‘› ๐‘‹ as formal polynomials Check ๐‘ฆ= ๐‘” ๐‘Ÿ ๐‘ฅ ๐‘  ๐‘ฅ and check ๐‘‰ ๐‘๐‘œ๐‘Ÿ๐‘’ ๐‘๐‘ข๐‘,๐‘๐‘Ÿ๐‘–๐‘ฃ,๐‘ ๐‘œ๐‘™ =1 Ensures generic adversary cannot break assumption Say assumption is polynomial if ๐‘  ๐‘‹ =1 Say assumption is fractional if ๐‘  ๐‘‹ โซฎ ๐‘Ÿ ๐‘‹ Adversaryโ€™s target

8 Hierarchy of target assumptions
GDHE & SFrac Polynomial & Fractional Univariate simple target Simple target assumptions Target assumptions

9 Uber assumptions Generalized Diffie-Hellman Exponent (๐‘ž-GDHE)
Given ๐‘”, ๐‘” ๐‘ฅ ,โ€ฆ, ๐‘” ๐‘ฅ ๐‘žโˆ’1 , ๐‘” ๐‘ฅ ๐‘ž+1 ,โ€ฆ, ๐‘” ๐‘ฅ 2๐‘ž hard to compute ๐‘” ๐‘ฅ ๐‘ž Simple Fractional (๐‘ž-SFrac) Given ๐‘”, ๐‘” ๐‘ฅ ,โ€ฆ, ๐‘” ๐‘ฅ ๐‘ž hard to output ๐‘Ÿ(๐‘‹) ๐‘ (๐‘‹) , ๐‘” ๐‘Ÿ(๐‘ฅ) ๐‘ (๐‘ฅ) with deg ๐‘  >degโก(๐‘Ÿ) The ๐‘ž-SDH problem: given (๐‘”, ๐‘” ๐‘ฅ ,โ€ฆ, ๐‘” ๐‘ฅ ๐‘ž ) output ๐‘, ๐‘” 1 ๐‘ฅ+๐‘ is a special case of the q-SFrac problem with ๐‘Ÿ ๐‘‹ =1 and ๐‘  ๐‘‹ =๐‘‹+๐‘

10 Target assumption hierarchy
โ‹ฎ 3-GDHE & 3-SFrac 2-GDHE & 2-SFrac 1-GDHE & 1-SFrac CDH

11 Structural analysis โ‹ฎ โ‹ฎ 3-GDHE 3-SFrac โ‡“ โ‡“ 2-GDHE โŸธ 2-SFrac โ‡“ โ‡“ 1-GDHE
Gftv#f8HJN FVDXZD\SA โ‡“ โ‡“ 1-GDHE 1-SFrac โ‡” โ‡“ CDH

12 Asymmetric bilinear groups
Bilinear group generator ๐บ 1 , ๐บ 2 , ๐บ ๐‘‡ , ๐‘” 1 , ๐‘” 2 โ†BGen( 1 ๐œ† ) Groups ๐บ 1 , ๐บ 2 , ๐บ ๐‘‡ of known prime order ๐‘ Efficiently computable group operations in ๐บ 1 , ๐บ 2 , ๐บ ๐‘‡ Efficiently computable bilinear map ๐‘’: ๐บ 1 ร— ๐บ 2 โ†’ ๐บ ๐‘‡ ๐‘’ ๐‘” 1 ๐‘Ž , ๐‘” 2 ๐‘ =๐‘’ ๐‘” 1 , ๐‘” 2 ๐‘Ž๐‘ Random generators ๐‘” 1 , ๐‘” 2 such that ๐บ 1 = ๐‘” 1 , ๐บ 2 =โŒฉ ๐‘” 2 โŒช Defining ๐‘” ๐‘‡ =๐‘’( ๐‘” 1 , ๐‘” 2 ) we have ๐บ ๐‘‡ =โŒฉ ๐‘” ๐‘‡ โŒช Asymmetric (type III) setting where ๐บ 1 โ‰  ๐บ 2

13 Bilinear target assumption stratification for ๐œถโˆˆ{๐Ÿ,๐Ÿ} ๐œถ=๐‘ป
โ‹ฎ โ‹ฎ 2-BGDHE & 2-BSFrac 2-BGap & 2-BSFrac 1-BGDHE & 1-BSFrac 1-BGap & 1-BSFrac CDH CDH

14 Open problems Prove or disprove the conjecture ๐‘ž-GDHE โ‡’ 1-SDH
Find structure in the SFrac assumptions Simplify the ๐‘ž-BGap assumptions Tightness Analyze assumptions where the goal is to output set group of elements ๐‘ฆ 1 ,โ€ฆ, ๐‘ฆ โ„“ with some relationship to each other Analyze interactive assumptions

15 Conclusions Cryptographers Cryptanalysts
Most non-interactive computational assumptions in use are implied by the GDHE & SFrac assumptions All non-fractional assumptions are implied by GDHE, giving us a โ€œcanary in the coal mineโ€ barrier Cryptanalysts The GDHE and SFrac assumptions are the easiest targets to attack Do not try to break discrete log, attack the โ€œcanary in the coal mineโ€ assumptions first


Download ppt "Towards a Classification of Non-interactive Computational Assumptions in Cyclic Groups Essam Ghadafi University of the West of England Jens Groth University."

Similar presentations


Ads by Google