The Return of the SDitH

被引:19
作者
Aguilar-Melchor, Carlos [1 ]
Gam, Nicolas [1 ]
Howe, James [1 ]
Hillsing, Andreas [2 ]
Joseph, David [1 ]
Yue, Dongze [1 ]
机构
[1] SandboxAQ, Palo Alto, CA 94301 USA
[2] Eindhoven Univ Technol, Eindhoven, Netherlands
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT V | 2023年 / 14008卷
关键词
IDENTIFICATION;
D O I
10.1007/978-3-031-30589-4_20
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a code-based signature scheme based on the well-known syndrome decoding (SD) problem. The scheme builds upon a recent line of research which uses the Multi-Party-Computationin-the-Head (MPCitH) approach to construct efficient zero-knowledge proofs, such as Syndrome Decoding in the Head (SDitH), and builds signature schemes from them using the Fiat-Shamir transform. At the heart of our proposal is a new approach, Hypercube-MPCitH, to amplify the soundness of any MPC protocol that uses additive secret sharing. An MPCitH protocol with N parties can be repeated D times using parallel composition to reach the same soundness as a protocol run with N-D parties. However, the former comes with D times higher communication costs, often mainly contributed by the usage of D 'auxiliary' states (which in general have a significantly bigger impact on size than random states). Instead of that, we begin by generating N-D shares, arranged into a D-dimensional hypercube of side N containing only one 'auxiliary' state. We derive from this hypercube D sharings of size N which are used to run D instances of an N party MPC protocol. Hypercube-MPCitH leads to a protocol with 1/N D soundness error, requiring N-D offline computation, but with only N center dot D online computation, and only 1 'auxiliary'. As the (potentially offline) share generation phase is generally inexpensive, this leads to trade-offs that are superior to just using parallel composition. Our novel method of share generation and aggregation not only improves certain MPCitH protocols in general but also shows in concrete improvements of signature schemes. Specifically, we apply it to the work of Feneuil, Joux, and Rivain (CRYPTO'22) on code-based signatures, and obtain a new signature scheme that achieves a 8.1x improvement in global runtime and a 30x improvement in online runtime for their shortest signatures size (8,481 Bytes). It is also possible to leverage the fact that most computations are offline to define parameter sets leading to smaller signatures: 6,784 Bytes for 26 ms offline and 5,689 Bytes for 320 ms offline. For NIST security level 1, online signature cost is around 3 million cycles (<1 ms on commodity processors), regardless of signature size.
引用
收藏
页码:564 / 596
页数:33
相关论文
共 19 条
[1]  
Aguilar C., 2011, IEEE Information Theory Workshop (ITW 2011), P648, DOI 10.1109/ITW.2011.6089577
[2]  
Aguilar-Melchor C., 2022, Paper 2022/1645
[3]  
BEAVER D, 1992, LECT NOTES COMPUT SC, V576, P420
[4]   INHERENT INTRACTABILITY OF CERTAIN CODING PROBLEMS [J].
BERLEKAMP, ER ;
MCELIECE, RJ ;
VANTILBORG, HCA .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1978, 24 (03) :384-386
[5]  
Bidoux L., 2022, Compact post-quantum signatures from proofs of knowledge leveraging structure for the PKP, SD and RSD Problems
[6]  
Cayrel PL, 2011, LECT NOTES COMPUT SC, V6544, P171, DOI 10.1007/978-3-642-19574-7_12
[7]   Extended security arguments for signature schemes [J].
Dagdelen, Ozgur ;
Galindo, David ;
Veron, Pascal ;
Alaoui, Sidi Mohamed El Yousfi ;
Cayrel, Pierre-Louis .
DESIGNS CODES AND CRYPTOGRAPHY, 2016, 78 (02) :441-461
[8]  
Feneuil T., 2021, Cryptology ePrint Archive, Report 2021/1576.
[9]   Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge Proofs [J].
Feneuil, Thibauld ;
Joux, Antoine ;
Rivain, Matthieu .
ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT II, 2022, 13508 :541-572
[10]   HOW TO PROVE YOURSELF - PRACTICAL SOLUTIONS TO IDENTIFICATION AND SIGNATURE PROBLEMS [J].
FIAT, A ;
SHAMIR, A .
LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 :186-194