Pairing-based identification protocols compatible with instant digital signature mode
In our previous post, we presented a modified Schnorr protocol compatible with the Instant Digital Signature (IDS) mode and also announced the design of other protocols with this feature. In this post we describe such protocols based on the pairing function.
Introduction
The following text is dedicated to the description of two digital signature (DS) schemes based on the pairing function (Appendix A). These schemes are then transformed into IDS-compatible identification protocols. We specified and investigated the problem of impersonation, that is, the substitution of one party involved in protocol, with another one. The achieved result consists in the design and analysis of a new IDS-compatible identification protocol, with impersonation presumably impossible for it.
We will use the abbreviation v.s.p. to denote a vanishingly small probability. This means that for some
When describing DS schemes and identification protocols, we will proceed from the assumption that there is a pair of linked keys
Let's call the functions of signing and verifying the digital signature as
Before use,
For the sake of simplicity, let's assume that different DS schemes and identification protocols use the same public key
It should be noted that most of the known DS schemes use simple equations. This is important, because this simplifies their understanding and analysis. We will be guided by the same
DS schemes based on pairing
Hereinafter let's call the one who sign the message
In the DS scheme [Zhang_Safavi-Naini_Susilo_2004] for a given message
Computes
Generates the signature
Let there be some signature
Computes
Checks the authenticity, integrity and relevance of
if the relevance is not confirmed or then it completes the verification of the DS. Computes
Checks
Then
It is clear that
Let's look at another DS scheme from [Boneh_Shacham_Lynn_2004]. There is a given hash function
Computes
Generates the signature
There is a message
Computes
Checks the authenticity, integrity and relevance of
if the relevance is not confirmed or then it completes the verification of the DS. Checks
If
Both above-mentioned DS schemes use the
IDS-compatible identification protocols based on pairing
According to the Fiat-Shamir heuristic [Fiat_Shamir_1987], each DS scheme has its own identification protocol. However, we will be interested in IDS-compatible versions of such protocols.
Below there is a description of the IDS-compatible identification protocol for the DS scheme from [Zhang_Safavi-Naini_Susilo_2004].
Protocol 1
Protocol messages.
Actions of the parties.
selects computes checks If then selects a new re-executes the necessary computations and checks. reads the current certificate and checks the DS of the trusted party If then the session ends. If then it chooses and computes If then it chooses a new and re-executes the necessary computations and checks. checks if it is true, it computes otherwise the session ends. computes Then it checks If equal, then the proof is accepted, and rejected otherwise.
Now let's see what IDS-compatible protocol can be proposed for the DS scheme from [Boneh_Shacham_Lynn_2004].
Protocol 2
Protocol messages.
Actions of the parties.
As in Protocol 1.
As in Protocol 1.
checks if it is true, it computes otherwise the session ends. computes Then it checks If equal, then the proof is accepted, and rejected otherwise.
For Protocols 1 and 2, in case of successful completion of the identification stage, the parties independently compute a shared session secret key in accordance with the following rules:
computes computes
Obviously,
Impersonation of the verifier
An active attack includes a set of measures taken to replace the information that the parties exchange with each other during the identification protocol. Protocol 1 and Protocol 2 are reliable provided that the probability of an active attack is negligible. For example, when data exchange between
If the parties interact through other insecure communication channels, including the Internet, then an active attack aimed at impersonating the verifier is possible. Let's call the bogus verifier as
Let's choose Protocol 2 as the object of attack. Using the interception and blocking technique, the attacker is able to impose
The above mentioned reasoning is equally valid for Protocol 1. In addition, the attack is also applicable to modified Schnorr protocol.
In the next section, we will demonstrate a protocol where impersonation is not presumably possible.
Protocol resistant to impersonation
Let's assume that, for
Let us consider an IDS-compatible and at the same time impersonation-resistant protocol.
Protocol 3
Protocol messages.
Actions of the parties.
reads the current certificate and verifies the DS of the trusted party If then the session ends. If then it selects computes checks If then it chooses a new and re-executes the necessary computations and checks. reads the current certificate and verifies the DS of the trusted party If then the session ends. If then it chooses and computes If then it chooses a new and re-executes the necessary computations and checks. checks if it is true, it computes otherwise the session ends. computes Then it checks If equal, then the proof is accepted, and rejected otherwise.
If
computes computes
It is clear that
Preliminary analysis
Let bogus verifier
We restrict ourselves to the analysis of Protocol 3, in which it is necessary to impose
Another strategy is to solve ECDLP/DLP given
The attacker has access to
It is easy to show that replacement of
If we assume that the attacker imposes
Note that
When computing
The amount of information transmitted
If compact representation is used, then one needs to transfer
In Protocol 3,
Other overheads are allowed. The amount of information transmitted satisfies the asymptotic estimate
Computational complexity
In addition to the scalar multiplication, whose computation features are described here, in the Protocol 3 parties
In this case,
Since
Let the affine points
Methods for multiplicative inversion in
For the software implementation of the considered protocols, it is advisable to use the primitives of the PBC library.
The problem of hardware implementation of pairings is comprehensively considered in a number of publications [Rodriguez-Henriquez_etc._2006, Beuchat_etc._Nov_2008, Beuchat_etc._2008, Kammler_etc._2009, Ghosh_etc._2010, Estibals_2010, Ghosh_etc._2011, Beuchat_etc._2011, Cheung_etc._2011, Adikari_etc._2012].
Summary
Protocol 1 and Protocol 2, as well as modified Schnorr protocol, have a limited scope due to the risk of impersonation.
Preliminary analysis shows that impersonation is presumably impossible in Protocol 3. Everyone can use the keys
In addition, only
Conclusion
IDS-compatible identification protocols based on the pairing function have been presented and studied. The problem of impersonification is formulated. A new impersonation-resistant IDS-compatible identification protocol has been designed.
The text of the article in pdf format can be downloaded here.
Bibliography
[Boneh_Shacham_Lynn_2004] Boneh, D., Shacham, H. and Lynn B. "Short Signatures from the Weil Pairing."
[Zhang_Safavi-Naini_Susilo_2004] Zhang, F., Safavi-Naini, R. and Susilo, W. "An efficient signature scheme from bilinear pairing and its applications.”
[Fiat_Shamir_1987] Fiat, A. and Shamir, "How to prove yourself: Practical solutions to identification and signature problems.”
[Cohen_etc._2006] Cohen, H., Frey, G., Roberto Avanzi, R., Doche C., Lange, T., Nguyen, K. and Vercauteren, F.
[Montgomery_1987] Montgomery, Peter L. "Speeding the Pollard and Elliptic Curve Methods of Factorization.”
[Bernstein_2008] Bernstein, Daniel J., Birkner, Peter, Joye, Marc, Lange, Tanja, Peters, Christiane. In Vaudenay, Serge (ed.). "Twisted Edwards Curves.”
[Rodriguez-Henriquez_etc._2006] Rodríguez-Henríquez, F., Díaz-Pérez, A., Saqib, N. A. and Koč, Č. K.
[Beuchat_etc._Nov_2008] Beuchat, J.-L., Brisebarre, N., Detrey, J., Okamoto, E., Shirase, M. and Takagi, T. "Algorithms and Arithmetic Operators for Computing the
[Beuchat_etc._2008] Beuchat, J.-L., Brisebarre, N., Detrey, J., Okamoto, E. and Rodriguez-Henriquez, F. "A Comparison Between Hardware Accelerators for the Modified Tate Pairing over
[Kammler_etc._2009] Kammler, D., Zhang, D., Schwabe, P., Scharwaechter, H., Langenberg, M., Auras, D., Ascheid, G. and Mathar, R. "Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves.”
[Ghosh_etc._2010] Ghosh, S., Mukhopadhyay, D. and Roychowdhury, D. "High Speed Flexible Pairing Cryptoprocessor on FPGA Platform.”
[Estibals_2010] Estibals, N. "Compact Hardware for Computing the Tate Pairing over 128-Bit Security Supersingular Curves.”
[Ghosh_etc._2011] Ghosh, S., Roychowdhury, D. and Das, A. "High Speed Cryptoprocessor for
[Beuchat_etc._2011] Beuchat, J.-L., Detrey, J., Estibals, N., Okamoto, E. and Rodriguez-Henriquez, F. "Fast Architectures for the
[Cheung_etc._2011] Cheung, R. C. C., Duquesne, S., Fan, J., Guillermin, N., Verbauwhede, I. and Yao, G. X. "FPGA Implementation of Pairings Using Residue Number System and Lazy Reduction.”
[Adikari_etc._2012] Adikari, J., Hasan, M. A. and Negre, C. "Towards Faster and Greener Cryptoprocessor for Eta Pairing on Supersingular Elliptic Curve over