Skip to main content

Digital Signatures from the Middle-Product LWE

  • Conference paper
  • First Online:
Provable Security (ProvSec 2018)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11192))

Included in the following conference series:

  • 944 Accesses

Abstract

We construct digital signatures secure in the quantum random oracle model (QROM) under the middle-product learning with errors problem, which is recently proposed by Roşca et al. (CRYPTO 2017) and shown by Roşca et al. (EUROCRYPT 2018) that it can be reduced from the worst-case hardness of ideal lattice problems for a large class of polynomial rings. The previous signatures secure under the lattice problems not specified in a certain ring is based on the short integer solution (SIS) problems for bounded-degree polynomials (Lyubashevsky, ASIACRYPT 2016). The standard path to construct efficient signatures secure in the QROM (Kiltz et al., EUROCRYPT 2018) requires hardness of a decision problem, but the SIS problems for polynomial rings are not known to have search-to-decision reductions. Our signatures are the first efficient signatures secure in the QROM under the worst-case hardness of ideal lattice problems for many rings.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Abdalla, M., Fouque, P.-A., Lyubashevsky, V., Tibouchi, M.: Tightly-secure signatures from lossy identification schemes. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 572–590. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-29011-4_34

    Chapter  Google Scholar 

  2. Ajtai, M.: Generating hard instances of lattice problems. In: STOC, pp. 99–108 (1996)

    Google Scholar 

  3. Albrecht, M.R., Deo, A.: Large modulus ring-LWE \(\ge \) Module-LWE. In: Takagi, T., Peyrin, T. (eds.) ASIACRYPT 2017. LNCS, vol. 10624, pp. 267–296. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-70694-8_10

    Chapter  Google Scholar 

  4. Alkim, E., Ducas, L., Pöppelmann, T., Schwabe, P.: Post-quantum key exchange - a new hope. In: USENIX, pp. 327–343 (2016)

    Google Scholar 

  5. Bai, S., Galbraith, S.D.: An improved compression technique for signatures based on learning with errors. In: Benaloh, J. (ed.) CT-RSA 2014. LNCS, vol. 8366, pp. 28–47. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-04852-9_2

    Chapter  Google Scholar 

  6. Bos, J.W., et al.: CRYSTALS - Kyber: a CCA-secure module-lattice-based KEM. In: EURO S&P (2018). https://eprint.iacr.org/2017/634

  7. Groot Bruinderink, L., Hülsing, A., Lange, T., Yarom, Y.: Flush, gauss, and reload – a cache attack on the BLISS lattice-based signature scheme. In: Gierlichs, B., Poschmann, A.Y. (eds.) CHES 2016. LNCS, vol. 9813, pp. 323–345. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-53140-2_16

    Chapter  Google Scholar 

  8. Campbell, P., Groves, M., Shepherd, D.: SOLILOQUY: a cautionary tale. In: ETSI 2nd Quantum-Safe Crypto Workshop, pp. 1–9 (2014)

    Google Scholar 

  9. Cramer, R., Ducas, L., Peikert, C., Regev, O.: Recovering short generators of principal ideals in cyclotomic rings. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9666, pp. 559–585. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-49896-5_20

    Chapter  MATH  Google Scholar 

  10. Cramer, R., Ducas, L., Wesolowski, B.: Short stickelberger class relations and application to ideal-SVP. In: Coron, J.-S., Nielsen, J.B. (eds.) EUROCRYPT 2017. LNCS, vol. 10210, pp. 324–348. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-56620-7_12

    Chapter  Google Scholar 

  11. Ducas, L., et al.: CRYSTALS - dilithium: a lattice-based digital signature scheme. In: CHES, pp. 238–268 (2018)

    Google Scholar 

  12. Espitau, T., Fouque, P.A., Gérard, B., Tibouchi, M.: Side-channel attacks on bliss lattice-based signatures - exploiting branch tracing against strong swan and electromagnetic emanations in microcontrollers. In: CCS, pp. 1857–1874 (2017)

    Google Scholar 

  13. Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186–194. Springer, Heidelberg (1987). https://doi.org/10.1007/3-540-47721-7_12

    Chapter  Google Scholar 

  14. Hanrot, G., Quercia, M., Zimmermann, P.: The middle product algorithm I. Appl. Algebra Eng. Commun. Comput. 14(6), 415–438 (2004)

    Article  MathSciNet  Google Scholar 

  15. Katz, J., Wang, N.: Efficiency improvements for signature schemes with tight security reductions. In: CCS, pp. 155–164 (2003)

    Google Scholar 

  16. Kiltz, E., Lyubashevsky, V., Schaffner, C.: A concrete treatment of fiat-shamir signatures in the quantum random-oracle model. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10822, pp. 552–586. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-78372-7_18

    Chapter  MATH  Google Scholar 

  17. Langlois, A., Stehlé, D.: Worst-case to average-case reductions for module lattices. Des. Codes Cryptogr. 75, 565–599 (2015)

    Article  MathSciNet  Google Scholar 

  18. Lyubashevsky, V.: Fiat-shamir with aborts: applications to lattice and factoring-based signatures. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 598–616. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-10366-7_35

    Chapter  Google Scholar 

  19. Lyubashevsky, V.: Digital signatures based on the hardness of ideal lattice problems in all rings. In: Cheon, J.H., Takagi, T. (eds.) ASIACRYPT 2016. LNCS, vol. 10032, pp. 196–214. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-53890-6_7

    Chapter  MATH  Google Scholar 

  20. Lyubashevsky, V., Peikert, C., Regev, O.: On ideal lattices and learning with errors over rings. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 1–23. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13190-5_1

    Chapter  Google Scholar 

  21. Peikert, C., Regev, O., Stephens-Davidowitz, N.: Pseudorandomness of Ring-LWE for any ring and modulus. In: STOC, pp. 461–473 (2017)

    Google Scholar 

  22. Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: STOC, pp. 84–93 (2005)

    Google Scholar 

  23. Roşca, M., Sakzad, A., Stehlé, D., Steinfeld, R.: Middle-product learning with errors. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10403, pp. 283–297. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-63697-9_10

    Chapter  Google Scholar 

  24. Rosca, M., Stehlé, D., Wallet, A.: On the ring-LWE and polynomial-LWE problems. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10820, pp. 146–173. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-78381-9_6

    Chapter  Google Scholar 

  25. Shoup, V.: Efficient computation of minimal polynomials in algebraic extensions of finite fields. In: ISSAC, pp. 53–58 (1999)

    Google Scholar 

  26. Steinfeld, R., Sakzad, A., Zhao, R.K.: Titanium: post-quantum public-key encryption and KEM algorithms. Technical report, National Institution of Standards and Technology (2017). http://users.monash.edu.au/~rste/Titanium_NISTSub.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ryo Hiromasa .

Editor information

Editors and Affiliations

A Digital Signatures from the MPLWE

A Digital Signatures from the MPLWE

1.1 A.1 Digital Signatures

We first introduce the definition of digital signatures and pseudorandom functions.

Definition 13

A digital signature scheme consists of a triple of polynomial-time algorithms \(\Sigma :=\{\mathsf {Keygen}, \mathsf {Sign}, \mathsf {Verify}\}\) with the following syntax:

  • \(\mathsf {KeyGen}(1^{\lambda })\): given a security parameter \(\lambda \), outputs secret and public keys \((\mathsf {sk}, \mathsf {pk})\).

  • \(\mathsf {Sign}_{\mathsf {sk}}(\mu \in \{0,1\}^{*})\): given a secret key \(\mathsf {sk}\) and message \(\mu \), outputs a signature \(\sigma \).

  • \(\mathsf {Verify}_{\mathsf {pk}}(\mu , \sigma )\): given a public key \(\mathsf {pk}\), message \(\mu \), and signature \(\sigma \), outputs 1 if \(\sigma \) is a valid signature of \(\mu \), and 0 otherwise.

The signature scheme has correctness error \(\gamma \) if for all \((\mathsf {pk}, \mathsf {sk})\in \mathsf {KeyGen}(1^{\lambda })\) and all message \(\mu \in \{0,1\}^{*}\), it holds that \(\Pr [\mathsf {Verify}_{\mathsf {pk}}(\mu , \mathsf {Sign}_{\mathsf {sk}}(\mu ))=0]\le \gamma \).

Let \(\mathcal {O}^{\mathsf {Sign}}\) be an oracle that outputs a signature for a queried message, and \(\mathcal {M}\) be the set of queried messages to \(\mathcal {O}^{\mathsf {Sign}}\). The advantage of an algorithm \(\mathcal {F}\) is defined as

$$ \mathsf {Adv}_{\Sigma , \mathcal {F}}^{\mathsf {EUF}\text {-}\mathsf {CMA}}(\lambda ) :=\Pr \left[ \begin{aligned}&\mathsf {Verify}_{\mathsf {pk}}(\mu ^{*}, \sigma ^{*})=1\\&\wedge \mu ^{*}\not \in \mathcal {M} \end{aligned} : \begin{aligned}&(\mathsf {pk}, \mathsf {sk});\\&(\mu ^{*}, \sigma ^{*})\\ \end{aligned} \right] . $$

The signature scheme \(\Sigma \) is called \(\mathsf {EUF}\text {-}\mathsf {CMA}\) secure if \(\mathsf {Adv}_{\Sigma , \mathcal {F}}^{\mathsf {EUF}\text {-}\mathsf {CMA}}(\lambda )=\mathsf {negl}(\lambda )\) for any PPT adversary \(\mathcal {F}\).

Definition 14

(Pseudorandom Function). For a security parameter \(\lambda \), let \(n=n(\lambda )\) and \(k=k(\lambda )\) be integers, and \(\mathcal {K}\) be a finite key space. The advantage of a map \(\mathsf {PRF}: \mathcal {K}\times \{0,1\}^{n}\rightarrow \{0,1\}^{k}\) for an adversary \(\mathcal {D}\) is defined as

$$ \mathsf {Adv}^{\mathsf {PR}}_{\mathsf {PRF}, \mathcal {D}}(\lambda ):= \left| \Pr [\mathcal {D}^{\mathsf {PRF}_{K}(\cdot )}(1^{\lambda })\rightarrow 1;K] -\Pr [\mathcal {D}^{\mathsf {RF}(\cdot )}(1^{\lambda })\rightarrow 1] \right| , $$

where \(\mathsf {RF}:\{0,1\}^{n}\rightarrow \{0,1\}^{k}\) be a random function. The map \(\mathsf {PRF}\) is called a pseudorandom function if \(\mathsf {Adv}^{\mathsf {PR}}_{\mathsf {PRF}, \mathcal {D}}(\lambda )=\mathsf {negl}(\lambda )\).

The following signatures \(\Sigma _{\mathsf {DFS}}\), obtained from the deterministic variant of Fiat-Shamir transformation for the (canonical) identification, is a triple of key generation, signing, and verification algorithm, but we omit the description of the key generation, since it is the same as the instance generation algorithm of the underlying identification. Let \(H: \{0,1\}^{*}\rightarrow R^{<k+1}\) be a hash function implemented by the random oracle, \(\mathsf {PRF}_{K}(\cdot )\) be a pseudorandom function with key K, and \(\kappa _{m}\) be a positive integer.

  • \(\mathsf {Sign}_{\mathsf {sk}, K}(\mu \in \{0,1\}^{*})\): Set \(\kappa :=0\). Repeat the followings while \(z=\bot \) and \(\kappa \le \kappa _{m}\): set \(\kappa :=\kappa +1\); compute \((w, \mathsf {st}):=\mathsf {P}_{1}(\mathsf {sk}; \mathsf {PRF}_{K}(0\parallel \mu \parallel \kappa ))\); set \(c:=H(w\Vert \mu )\); compute \(z:=\mathsf {P}_{2}(\mathsf {sk}, w, c, \mathsf {st}; \mathsf {PRF}_{K}(1\Vert \mu \Vert \kappa ))\). If \(z=\bot \) then return \(\sigma :=\bot \), else return \(\sigma :=(w, z)\).

  • \(\mathsf {Verify}_{\mathsf {pk}}(\mu , \sigma )\): Parse \(\sigma =(w,z)\), and return \(\mathsf {V}(\mathsf {pk}, w, c, z)\in \{0,1\}\) for \(c:=H(w\Vert \mu )\).

In [16], Kiltz et al. showed quantum security of the signatures obtained from the (deterministic) Fiat-Shamir transformation for a lossy identification scheme.

Theorem 2

(Adapted from Theorem 3.1 of [16]). Assume the identification scheme \(\mathsf {ID}\) is lossy key indistinguishable, \(\epsilon _{\mathsf {ls}}\)-lossy sound, \(\epsilon _{\mathsf {ZK}}\)-perfect \(\mathsf {naHVZK}\), and has an \(\alpha \)-bits of min entropy. For any quantum \(\mathsf {EUF}\text {-}\mathsf {CMA}\) adversary \(\mathcal {F}\) that issues at most \(q_{\mathsf {H}}\) queries to the quantum random oracle \(|H\rangle \), and \(q_{\mathsf {S}}\) classical queries to the signing oracle, there exists a quantum adversary \(\mathcal {A}\) against \(\mathsf {ID}\) and a quantum adversary \(\mathcal {D}\) against \(\mathsf {PRF}\) such that

$$ \mathsf {Adv}_{\Sigma _{\mathsf {DFS}}, \mathcal {F}}^{\mathsf {EUF}\text {-}\mathsf {CMA}}(\lambda ) \!\le \!\mathsf {Adv}_{\mathsf {ID}, \mathcal {A}}^{\mathsf {LOSSY}-\mathsf {IND}}(\lambda )+8(q_{\mathsf {H}}+1)^{2}\cdot \epsilon _{\mathsf {ls}} +\mathsf {Adv}_{\mathsf {PRF}, \mathcal {D}}^{\mathsf {PR}}(\lambda )+2^{-\alpha +1}+\kappa _{m}q_{\mathsf {S}}\epsilon _{\mathsf {ZK}}. $$

1.2 A.2 Fiat-Shamir Transformed Signatures from \(\mathsf {ID}_{\mathsf {MPLWE}}\)

We here give a construction of the signatures from our identification scheme \(\mathsf {ID}_{\mathsf {MPLWE}}\) described in Sect. 3.2. The signatures are obtained by applying the transformation of [16] to \(\mathsf {ID}_{\mathsf {MPLWE}}\). The resulting signature scheme can be seen as an \(\mathsf {MPLWE}\) variant of Dilithium-QROM [16].

The (deterministic) Fiat-Shamir transformed signature scheme \(\Sigma _{\mathsf {MPLWE}}\) consists of the following three algorithms:

  • \(\mathsf {KeyGen}(1^{\lambda })\): Generate \((\mathsf {pk}, \mathsf {sk})(1^{\lambda })\).

  • \(\mathsf {Sign}_{\mathsf {sk}, K}(\mu \in \{0,1\}^{*})\): Parse \(\mathsf {sk}=(\rho , s_{1}, s_{2}, t_{0})\), set \(\kappa :=0\), and recover \(a:=\mathsf {Sam}(\rho )\). Repeat the followings while \((z, h)=(\bot , \bot )\) and \(\kappa \le \kappa _{m}\): set \(\kappa :=\kappa +1\); compute \(y:=\mathsf {PRF}_{K}(\mu \parallel \kappa )\); compute \(w:=a\odot _{d}y\in R^{<d}_{q}\) and \(w_{1}:=\mathsf {HighBits}_{q}(w, 2\beta ')\); set \(c:=H(w_{1}\parallel \mu )\); compute \(z:=c\odot _{n+d-1}s_{1}+y\in R^{<n+d-1}\); if \(\Vert z\Vert _{\infty }\ge \gamma \) or \(\Vert \mathsf {LowBits}_{q}(w-c\odot _{d}s_{2}, 2\beta ')\Vert _{\infty }\ge \gamma '\) then set \((z, h):=(\bot , \bot )\), else set \(h:=\mathsf {MakeHint}_{q}(-c\odot _{d}t_{0}, w-c\odot _{d}s_{2}+c\odot _{d}t_{0}, 2\beta ')\). Output \(\sigma :=(h, z, c)\).

  • \(\mathsf {Verify}_{\mathsf {pk}}(\mu , \sigma )\): Parse \(\sigma = (h, z, c)\). Generate \(a=\mathsf {Sam}(\rho )\) and compute \(w_{1}':=\mathsf {UseHint}_{q}(h, a\odot _{d}z-c\odot _{d}t_{1}\cdot 2^{\delta }, 2\beta ')\). Output 1 if \(\Vert z\Vert _{\infty }<\gamma \) and \(c = H(w_{1}'\parallel \mu )\) holds, 0 otherwise.

From Theorem 2 and the lemmas proven in Sect. 3, the Fiat-Shamir Transformed signatures from our identification scheme \(\mathsf {ID}_{\mathsf {MPLWE}}\) is \(\mathsf {EUF}\text {-}\mathsf {CMA}\) secure in the QROM.

Corollary 3

If the decision \(\mathsf {MPLWE}\) assumption holds, and the function \(\mathsf {PRF}\) is pseudorandom against quantum adversaries, then the signature scheme \(\Sigma _{\mathsf {MPLWE}}\) is \(\mathsf {EUF}\text {-}\mathsf {CMA}\) secure in the QROM. In particular, for any quantum adversary \(\mathcal {F}\) against \(\mathsf {EUF}\text {-}\mathsf {CMA}\) security for the signature scheme \(\Sigma _{\mathsf {MPLWE}}\) that issues at most \(q_{\mathsf {H}}\) queries to the quantum random oracle \(|H\rangle \), and \(q_{\mathsf {S}}\) classical queries to the signing oracle, there exists a quantum adversary \(\mathcal {A}\) of \(\mathsf {MPLWE}\) assumption and a quantum adversary \(\mathcal {D}\) against \(\mathsf {PRF}\) such that

$$ \mathsf {Adv}_{\Sigma _{\mathsf {MPLWE}}, \mathcal {F}}^{\mathsf {EUF}\text {-}\mathsf {CMA}}(\lambda )\le \mathsf {Adv}^{\mathsf {MPLWE}}_{\mathcal {A}}(\lambda ) +8(q_{\mathsf {H}}+1)^{2}\cdot \epsilon _{\mathsf {ls}}+\mathsf {Adv}_{\mathsf {PRF}, \mathcal {D}}^{\mathsf {PR}}(\lambda )+2^{-\alpha +1}. $$

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hiromasa, R. (2018). Digital Signatures from the Middle-Product LWE. In: Baek, J., Susilo, W., Kim, J. (eds) Provable Security. ProvSec 2018. Lecture Notes in Computer Science(), vol 11192. Springer, Cham. https://doi.org/10.1007/978-3-030-01446-9_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-01446-9_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-01445-2

  • Online ISBN: 978-3-030-01446-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics