Lattice-Based Group Signatures and Zero-Knowledge Proofs of Automorphism Stability

被引:63
作者
del Pino, Rafael [1 ,2 ]
Lyubashevsky, Vadim [2 ]
Seiler, Gregor [2 ,3 ]
机构
[1] ENS Paris, Paris, France
[2] IBM Res Zurich, Zurich, Switzerland
[3] Swiss Fed Inst Technol, Zurich, Switzerland
来源
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) | 2018年
关键词
Group Signature; Lattices; Zero-Knowledge; Post-Quantum; Implementation; TRAPDOORS;
D O I
10.1145/3243734.3243852
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a group signature scheme, based on the hardness of lattice problems, whose outputs are more than an order of magnitude smaller than the currently most efficient schemes in the literature. Since lattice-based schemes are also usually non-trivial to efficiently implement, we additionally provide the first experimental implementation of lattice-based group signatures demonstrating that our construction is indeed practical - all operations take less than half a second on a standard laptop. A key component of our construction is a new zero-knowledge proof system for proving that a committed value belongs to a particular set of small size. The sets for which our proofs are applicable are exactly those that contain elements that remain stable under Galois automorphisms of the underlying cyclotomic number field of our lattice-based protocol. We believe that these proofs will find applications in other settings as well. The motivation of the newzero-knowledge proof in our construction is to allow the efficient use of the selectively-secure signature scheme (i.e. a signature scheme in which the adversary declares the forgery message before seeing the public key) of Agrawal et al. (Eurocrypt 2010) in constructions of lattice-based group signatures and other privacy protocols. For selectively-secure schemes to be meaningfully converted to standard signature schemes, it is crucial that the size of the message space is not too large. Using our zero-knowledge proofs, we can strategically pick small sets for which we can provide efficient zero-knowledge proofs of membership.
引用
收藏
页码:574 / 591
页数:18
相关论文
共 40 条
[11]   CRYSTALS - Kyber: a CCA-secure module-lattice-based KEM [J].
Bos, Joppe ;
Ducas, Leo ;
Kiltz, Eike ;
Lepoint, Tancrede ;
Lyubashevsky, Vadim ;
Schanck, John M. ;
Schwabe, Peter ;
Seiler, Gregor ;
Stehle, Damien .
2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2018), 2018, :353-367
[12]  
Boschini Cecilia, 2018, Applied Cryptography and Network Security. 16th International Conference, ACNS 2018. Proceedings: LNCS 10892, P163, DOI 10.1007/978-3-319-93387-0_9
[13]  
Boschini Cecilia, 2017, 20171123 CRYPT EPRIN
[14]  
Boyen X, 2010, LECT NOTES COMPUT SC, V6056, P499
[15]  
Brakerski Zvika, 2014, ACM Transactions on Computation Theory, V6, DOI 10.1145/2633600
[16]  
Camenisch J, 2003, LECT NOTES COMPUT SC, V2576, P268
[17]  
Cohen H., 2000, COURSE COMPUTATIONAL
[18]   Fast Fourier Orthogonalization [J].
Ducas, Leo ;
Prest, Thomas .
PROCEEDINGS OF THE 2016 ACM INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND ALGEBRAIC COMPUTATION (ISSAC 2016), 2016, :191-198
[19]   FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second [J].
Ducas, Leo ;
Micciancio, Daniele .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, 2015, 9056 :617-640
[20]  
Ducas L, 2014, LECT NOTES COMPUT SC, V8874, P22, DOI 10.1007/978-3-662-45608-8_2