Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives

被引:165
作者
Chase, Melissa [1 ]
Derler, David [2 ]
Goldfeder, Steven [3 ]
Orlandi, Claudio [4 ]
Ramacher, Sebastian [2 ]
Rechberger, Christian [2 ,5 ]
Slamanig, Daniel [6 ]
Zaverucha, Greg [1 ]
机构
[1] Microsoft Res, Redmond, WA USA
[2] Graz Univ Technol, Graz, Austria
[3] Princeton Univ, Princeton, NJ 08544 USA
[4] Aarhus Univ, Aarhus, Denmark
[5] Denmark Tech Univ, Lyngby, Denmark
[6] AIT Austrian Inst Technol, Seibersdorf, Austria
来源
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2017年
基金
欧盟地平线“2020”;
关键词
Post-quantum cryptography; zero-knowledge; signatures; block cipher; Fiat-Shamir; Unruh; implementation;
D O I
10.1145/3133956.3133997
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a new class of post-quantum digital signature schemes that: (a) derive their security entirely from the security of symmetric -key primitives, believed to be quantum-secure, and (b) have extremely small keypairs, and, (c) are highly parameterizable. In our signature constructions, the public key is an image y = f (x) of a one-way function f and secret key x. A signature is a non-interactive zero-knowledge proof of x, that incorporates a message to be signed. For this proof, we leverage recent progress of Giacomelli et al. (USENIX' 16) in constructing an efficient-protocol for statements over general circuits. We improve this X-protocol to reduce proof sizes by a factor of two, at no additional computational cost. While this is of independent interest as it yields more compact proofs for any circuit, it also decreases our signature sizes. We consider two possibilities to make the proof non-interactive: the Fiat-Shamir transform and Unruh's transform (EUROCRYPT'12, '15,'16). The former has smaller signatures, while the latter has a security analysis in the quantum-accessible random oracle model. By customizing Unruh's transform to our application, the overhead is reduced to 1.6x when compared to the Fiat-Shamir transform, which does not have a rigorous post-quantum security analysis. We implement and benchmark both approaches and explore the possible choice of f, taking advantage of the recent trend to strive for practical symmetric ciphers with a particularly low number of multiplications and end up using LowMC (EUROCRYPT'15).
引用
收藏
页码:1825 / 1842
页数:18
相关论文
共 86 条
  • [1] Abdalla M., 2012, EUROCRYPT
  • [2] Abdalla M., 2002, EUROCRYPT
  • [3] Akleylek S., 2016, AFRICACRYPT
  • [4] Albrecht M.R., 2016, Paper 2016/687
  • [5] MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
    Albrecht, Martin
    Grassi, Lorenzo
    Rechberger, Christian
    Roy, Arnab
    Tiessen, Tyge
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 191 - 219
  • [6] Albrecht Martin R., 2015, EUROCRYPT
  • [7] Alkim E., 2015, 2015755 CRYPT EPRINT
  • [8] Revisiting TESLA in the Quantum Random Oracle Model
    Alkim, Erdem
    Bindel, Nina
    Buchmann, Johannes
    Dagdelen, Oezguer
    Eaton, Edward
    Gutoski, Gus
    Kraemer, Juliane
    Pawlega, Filip
    [J]. POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2017, 2017, 10346 : 143 - 162
  • [9] Ames S., 2017, P 2017 ACM SIGSAC C
  • [10] [Anonymous], 1994, CRYPTO