Abstract
We construct digital signatures secure in the quantum random oracle model (QROM) under the middle-product learning with errors problem, which is recently proposed by Roşca et al. (CRYPTO 2017) and shown by Roşca et al. (EUROCRYPT 2018) that it can be reduced from the worst-case hardness of ideal lattice problems for a large class of polynomial rings. The previous signatures secure under the lattice problems not specified in a certain ring is based on the short integer solution (SIS) problems for bounded-degree polynomials (Lyubashevsky, ASIACRYPT 2016). The standard path to construct efficient signatures secure in the QROM (Kiltz et al., EUROCRYPT 2018) requires hardness of a decision problem, but the SIS problems for polynomial rings are not known to have search-to-decision reductions. Our signatures are the first efficient signatures secure in the QROM under the worst-case hardness of ideal lattice problems for many rings.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Abdalla, M., Fouque, P.-A., Lyubashevsky, V., Tibouchi, M.: Tightly-secure signatures from lossy identification schemes. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 572–590. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-29011-4_34
Ajtai, M.: Generating hard instances of lattice problems. In: STOC, pp. 99–108 (1996)
Albrecht, M.R., Deo, A.: Large modulus ring-LWE \(\ge \) Module-LWE. In: Takagi, T., Peyrin, T. (eds.) ASIACRYPT 2017. LNCS, vol. 10624, pp. 267–296. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-70694-8_10
Alkim, E., Ducas, L., Pöppelmann, T., Schwabe, P.: Post-quantum key exchange - a new hope. In: USENIX, pp. 327–343 (2016)
Bai, S., Galbraith, S.D.: An improved compression technique for signatures based on learning with errors. In: Benaloh, J. (ed.) CT-RSA 2014. LNCS, vol. 8366, pp. 28–47. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-04852-9_2
Bos, J.W., et al.: CRYSTALS - Kyber: a CCA-secure module-lattice-based KEM. In: EURO S&P (2018). https://eprint.iacr.org/2017/634
Groot Bruinderink, L., Hülsing, A., Lange, T., Yarom, Y.: Flush, gauss, and reload – a cache attack on the BLISS lattice-based signature scheme. In: Gierlichs, B., Poschmann, A.Y. (eds.) CHES 2016. LNCS, vol. 9813, pp. 323–345. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-53140-2_16
Campbell, P., Groves, M., Shepherd, D.: SOLILOQUY: a cautionary tale. In: ETSI 2nd Quantum-Safe Crypto Workshop, pp. 1–9 (2014)
Cramer, R., Ducas, L., Peikert, C., Regev, O.: Recovering short generators of principal ideals in cyclotomic rings. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9666, pp. 559–585. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-49896-5_20
Cramer, R., Ducas, L., Wesolowski, B.: Short stickelberger class relations and application to ideal-SVP. In: Coron, J.-S., Nielsen, J.B. (eds.) EUROCRYPT 2017. LNCS, vol. 10210, pp. 324–348. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-56620-7_12
Ducas, L., et al.: CRYSTALS - dilithium: a lattice-based digital signature scheme. In: CHES, pp. 238–268 (2018)
Espitau, T., Fouque, P.A., Gérard, B., Tibouchi, M.: Side-channel attacks on bliss lattice-based signatures - exploiting branch tracing against strong swan and electromagnetic emanations in microcontrollers. In: CCS, pp. 1857–1874 (2017)
Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186–194. Springer, Heidelberg (1987). https://doi.org/10.1007/3-540-47721-7_12
Hanrot, G., Quercia, M., Zimmermann, P.: The middle product algorithm I. Appl. Algebra Eng. Commun. Comput. 14(6), 415–438 (2004)
Katz, J., Wang, N.: Efficiency improvements for signature schemes with tight security reductions. In: CCS, pp. 155–164 (2003)
Kiltz, E., Lyubashevsky, V., Schaffner, C.: A concrete treatment of fiat-shamir signatures in the quantum random-oracle model. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10822, pp. 552–586. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-78372-7_18
Langlois, A., Stehlé, D.: Worst-case to average-case reductions for module lattices. Des. Codes Cryptogr. 75, 565–599 (2015)
Lyubashevsky, V.: Fiat-shamir with aborts: applications to lattice and factoring-based signatures. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 598–616. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-10366-7_35
Lyubashevsky, V.: Digital signatures based on the hardness of ideal lattice problems in all rings. In: Cheon, J.H., Takagi, T. (eds.) ASIACRYPT 2016. LNCS, vol. 10032, pp. 196–214. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-53890-6_7
Lyubashevsky, V., Peikert, C., Regev, O.: On ideal lattices and learning with errors over rings. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 1–23. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13190-5_1
Peikert, C., Regev, O., Stephens-Davidowitz, N.: Pseudorandomness of Ring-LWE for any ring and modulus. In: STOC, pp. 461–473 (2017)
Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: STOC, pp. 84–93 (2005)
Roşca, M., Sakzad, A., Stehlé, D., Steinfeld, R.: Middle-product learning with errors. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10403, pp. 283–297. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-63697-9_10
Rosca, M., Stehlé, D., Wallet, A.: On the ring-LWE and polynomial-LWE problems. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10820, pp. 146–173. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-78381-9_6
Shoup, V.: Efficient computation of minimal polynomials in algebraic extensions of finite fields. In: ISSAC, pp. 53–58 (1999)
Steinfeld, R., Sakzad, A., Zhao, R.K.: Titanium: post-quantum public-key encryption and KEM algorithms. Technical report, National Institution of Standards and Technology (2017). http://users.monash.edu.au/~rste/Titanium_NISTSub.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
A Digital Signatures from the MPLWE
A Digital Signatures from the MPLWE
1.1 A.1 Digital Signatures
We first introduce the definition of digital signatures and pseudorandom functions.
Definition 13
A digital signature scheme consists of a triple of polynomial-time algorithms \(\Sigma :=\{\mathsf {Keygen}, \mathsf {Sign}, \mathsf {Verify}\}\) with the following syntax:
-
\(\mathsf {KeyGen}(1^{\lambda })\): given a security parameter \(\lambda \), outputs secret and public keys \((\mathsf {sk}, \mathsf {pk})\).
-
\(\mathsf {Sign}_{\mathsf {sk}}(\mu \in \{0,1\}^{*})\): given a secret key \(\mathsf {sk}\) and message \(\mu \), outputs a signature \(\sigma \).
-
\(\mathsf {Verify}_{\mathsf {pk}}(\mu , \sigma )\): given a public key \(\mathsf {pk}\), message \(\mu \), and signature \(\sigma \), outputs 1 if \(\sigma \) is a valid signature of \(\mu \), and 0 otherwise.
The signature scheme has correctness error \(\gamma \) if for all \((\mathsf {pk}, \mathsf {sk})\in \mathsf {KeyGen}(1^{\lambda })\) and all message \(\mu \in \{0,1\}^{*}\), it holds that \(\Pr [\mathsf {Verify}_{\mathsf {pk}}(\mu , \mathsf {Sign}_{\mathsf {sk}}(\mu ))=0]\le \gamma \).
Let \(\mathcal {O}^{\mathsf {Sign}}\) be an oracle that outputs a signature for a queried message, and \(\mathcal {M}\) be the set of queried messages to \(\mathcal {O}^{\mathsf {Sign}}\). The advantage of an algorithm \(\mathcal {F}\) is defined as
The signature scheme \(\Sigma \) is called \(\mathsf {EUF}\text {-}\mathsf {CMA}\) secure if \(\mathsf {Adv}_{\Sigma , \mathcal {F}}^{\mathsf {EUF}\text {-}\mathsf {CMA}}(\lambda )=\mathsf {negl}(\lambda )\) for any PPT adversary \(\mathcal {F}\).
Definition 14
(Pseudorandom Function). For a security parameter \(\lambda \), let \(n=n(\lambda )\) and \(k=k(\lambda )\) be integers, and \(\mathcal {K}\) be a finite key space. The advantage of a map \(\mathsf {PRF}: \mathcal {K}\times \{0,1\}^{n}\rightarrow \{0,1\}^{k}\) for an adversary \(\mathcal {D}\) is defined as
where \(\mathsf {RF}:\{0,1\}^{n}\rightarrow \{0,1\}^{k}\) be a random function. The map \(\mathsf {PRF}\) is called a pseudorandom function if \(\mathsf {Adv}^{\mathsf {PR}}_{\mathsf {PRF}, \mathcal {D}}(\lambda )=\mathsf {negl}(\lambda )\).
The following signatures \(\Sigma _{\mathsf {DFS}}\), obtained from the deterministic variant of Fiat-Shamir transformation for the (canonical) identification, is a triple of key generation, signing, and verification algorithm, but we omit the description of the key generation, since it is the same as the instance generation algorithm of the underlying identification. Let \(H: \{0,1\}^{*}\rightarrow R^{<k+1}\) be a hash function implemented by the random oracle, \(\mathsf {PRF}_{K}(\cdot )\) be a pseudorandom function with key K, and \(\kappa _{m}\) be a positive integer.
-
\(\mathsf {Sign}_{\mathsf {sk}, K}(\mu \in \{0,1\}^{*})\): Set \(\kappa :=0\). Repeat the followings while \(z=\bot \) and \(\kappa \le \kappa _{m}\): set \(\kappa :=\kappa +1\); compute \((w, \mathsf {st}):=\mathsf {P}_{1}(\mathsf {sk}; \mathsf {PRF}_{K}(0\parallel \mu \parallel \kappa ))\); set \(c:=H(w\Vert \mu )\); compute \(z:=\mathsf {P}_{2}(\mathsf {sk}, w, c, \mathsf {st}; \mathsf {PRF}_{K}(1\Vert \mu \Vert \kappa ))\). If \(z=\bot \) then return \(\sigma :=\bot \), else return \(\sigma :=(w, z)\).
-
\(\mathsf {Verify}_{\mathsf {pk}}(\mu , \sigma )\): Parse \(\sigma =(w,z)\), and return \(\mathsf {V}(\mathsf {pk}, w, c, z)\in \{0,1\}\) for \(c:=H(w\Vert \mu )\).
In [16], Kiltz et al. showed quantum security of the signatures obtained from the (deterministic) Fiat-Shamir transformation for a lossy identification scheme.
Theorem 2
(Adapted from Theorem 3.1 of [16]). Assume the identification scheme \(\mathsf {ID}\) is lossy key indistinguishable, \(\epsilon _{\mathsf {ls}}\)-lossy sound, \(\epsilon _{\mathsf {ZK}}\)-perfect \(\mathsf {naHVZK}\), and has an \(\alpha \)-bits of min entropy. For any quantum \(\mathsf {EUF}\text {-}\mathsf {CMA}\) adversary \(\mathcal {F}\) that issues at most \(q_{\mathsf {H}}\) queries to the quantum random oracle \(|H\rangle \), and \(q_{\mathsf {S}}\) classical queries to the signing oracle, there exists a quantum adversary \(\mathcal {A}\) against \(\mathsf {ID}\) and a quantum adversary \(\mathcal {D}\) against \(\mathsf {PRF}\) such that
1.2 A.2 Fiat-Shamir Transformed Signatures from \(\mathsf {ID}_{\mathsf {MPLWE}}\)
We here give a construction of the signatures from our identification scheme \(\mathsf {ID}_{\mathsf {MPLWE}}\) described in Sect. 3.2. The signatures are obtained by applying the transformation of [16] to \(\mathsf {ID}_{\mathsf {MPLWE}}\). The resulting signature scheme can be seen as an \(\mathsf {MPLWE}\) variant of Dilithium-QROM [16].
The (deterministic) Fiat-Shamir transformed signature scheme \(\Sigma _{\mathsf {MPLWE}}\) consists of the following three algorithms:
-
\(\mathsf {KeyGen}(1^{\lambda })\): Generate \((\mathsf {pk}, \mathsf {sk})(1^{\lambda })\).
-
\(\mathsf {Sign}_{\mathsf {sk}, K}(\mu \in \{0,1\}^{*})\): Parse \(\mathsf {sk}=(\rho , s_{1}, s_{2}, t_{0})\), set \(\kappa :=0\), and recover \(a:=\mathsf {Sam}(\rho )\). Repeat the followings while \((z, h)=(\bot , \bot )\) and \(\kappa \le \kappa _{m}\): set \(\kappa :=\kappa +1\); compute \(y:=\mathsf {PRF}_{K}(\mu \parallel \kappa )\); compute \(w:=a\odot _{d}y\in R^{<d}_{q}\) and \(w_{1}:=\mathsf {HighBits}_{q}(w, 2\beta ')\); set \(c:=H(w_{1}\parallel \mu )\); compute \(z:=c\odot _{n+d-1}s_{1}+y\in R^{<n+d-1}\); if \(\Vert z\Vert _{\infty }\ge \gamma \) or \(\Vert \mathsf {LowBits}_{q}(w-c\odot _{d}s_{2}, 2\beta ')\Vert _{\infty }\ge \gamma '\) then set \((z, h):=(\bot , \bot )\), else set \(h:=\mathsf {MakeHint}_{q}(-c\odot _{d}t_{0}, w-c\odot _{d}s_{2}+c\odot _{d}t_{0}, 2\beta ')\). Output \(\sigma :=(h, z, c)\).
-
\(\mathsf {Verify}_{\mathsf {pk}}(\mu , \sigma )\): Parse \(\sigma = (h, z, c)\). Generate \(a=\mathsf {Sam}(\rho )\) and compute \(w_{1}':=\mathsf {UseHint}_{q}(h, a\odot _{d}z-c\odot _{d}t_{1}\cdot 2^{\delta }, 2\beta ')\). Output 1 if \(\Vert z\Vert _{\infty }<\gamma \) and \(c = H(w_{1}'\parallel \mu )\) holds, 0 otherwise.
From Theorem 2 and the lemmas proven in Sect. 3, the Fiat-Shamir Transformed signatures from our identification scheme \(\mathsf {ID}_{\mathsf {MPLWE}}\) is \(\mathsf {EUF}\text {-}\mathsf {CMA}\) secure in the QROM.
Corollary 3
If the decision \(\mathsf {MPLWE}\) assumption holds, and the function \(\mathsf {PRF}\) is pseudorandom against quantum adversaries, then the signature scheme \(\Sigma _{\mathsf {MPLWE}}\) is \(\mathsf {EUF}\text {-}\mathsf {CMA}\) secure in the QROM. In particular, for any quantum adversary \(\mathcal {F}\) against \(\mathsf {EUF}\text {-}\mathsf {CMA}\) security for the signature scheme \(\Sigma _{\mathsf {MPLWE}}\) that issues at most \(q_{\mathsf {H}}\) queries to the quantum random oracle \(|H\rangle \), and \(q_{\mathsf {S}}\) classical queries to the signing oracle, there exists a quantum adversary \(\mathcal {A}\) of \(\mathsf {MPLWE}\) assumption and a quantum adversary \(\mathcal {D}\) against \(\mathsf {PRF}\) such that
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Hiromasa, R. (2018). Digital Signatures from the Middle-Product LWE. In: Baek, J., Susilo, W., Kim, J. (eds) Provable Security. ProvSec 2018. Lecture Notes in Computer Science(), vol 11192. Springer, Cham. https://doi.org/10.1007/978-3-030-01446-9_14
Download citation
DOI: https://doi.org/10.1007/978-3-030-01446-9_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-01445-2
Online ISBN: 978-3-030-01446-9
eBook Packages: Computer ScienceComputer Science (R0)