Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3548606.3560650acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Practical, Round-Optimal Lattice-Based Blind Signatures

Published: 07 November 2022 Publication History

Abstract

Blind signatures are a fundamental cryptographic primitive with numerous practical applications. While there exist many practical blind signatures from number-theoretic assumptions, the situation is far less satisfactory from post-quantum assumptions. In this work, we provide the first overall practical, lattice-based blind signature, supporting an unbounded number of signature queries and additionally enjoying optimal round complexity. We provide a detailed estimate of parameters achieved -- we obtain a signature of size slightly above 45KB, for a core-SVP hardness of 109 bits. The run-times of the signer, user and verifier are also very small.
Our scheme relies on the Gentry, Peikert and Vaikuntanathan signature [STOC'08] and non-interactive zero-knowledge proofs for linear relations with small unknowns, which are significantly more efficient than their general purpose counterparts. Its security stems from a new and arguably natural assumption which we introduce, called the one-more-ISIS assumption. This assumption can be seen as a lattice analogue of the one-more-RSA assumption by Bellare et al [JoC'03]. To gain confidence in our assumption, we provide a detailed analysis of diverse attack strategies.

Supplementary Material

MP4 File (CCS22-fpb484.mp4)
In this video we talk about our construction of the first overall practical, lattice based blind signature which supports unbounded number of signature queries and is also round-optimal. Our construction is based on digital signature scheme by Gentry, Peikert and Vaikuntanathan [STOC'08] and NIZK proof system for linear statements with small unknowns, which are significantly more efficient than their general-purpose counterparts. The security of our scheme is based on a new assumption that we introduce, called one-more-ISIS. This assumption can be seen as a lattice analogue of the one-more-RSA assumption by Bellare et al [JoC'03], that was introduced to construct efficient round-optimal blind signature in the number theoretic regime. We provide a detailed cryptanalysis of our assumption and an estimate of our parameters in the paper.

References

[1]
Masayuki Abe. 2001. A secure three-move blind signature scheme for polynomially many signatures. In EUROCRYPT.
[2]
Shweta Agrawal, Elena Kirshanova, Damien Stehle, and Anshu Yadav. 2021. Practical, Round-Optimal Lattice-Based Blind Signatures. Cryptology ePrint Archive, Paper 2021/1565.
[3]
Miklós Ajtai, Ravi Kumar, and Dandapani Sivakumar. 2001. A sieve algorithm for the shortest lattice vector problem. In STOC.
[4]
Nabil Alkeilani Alkadri, Rachid El Bansarkhani, and Johannes Buchmann. 2020a. BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications. In Financial Crypto.
[5]
Nabil Alkeilani Alkadri, Rachid El Bansarkhani, and Johannes Buchmann. 2020b. On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts. In ACISP.
[6]
E. Alkim, L. Ducas, T. Pö ppelmann, and P. Schwabe. 2016. Post-quantum Key Exchange - A New Hope. In USENIX Security.
[7]
Abdelrahaman Aly, Tomer Ashur, Eli Ben-Sasson, Siemen Dhooghe, and Alan Szepieniec. 2020. Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols. IACR Trans. Symmetric Cryptol. (2020).
[8]
Scott Ames, Carmit Hazay, Yuval Ishai, and Muthuramakrishnan Venkitasubramaniam. 2017. Ligero: Lightweight sublinear arguments without a trusted setup. In ACM SIGSAC.
[9]
Roberto Avanzi, Joppe Bos, Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Gregor Seiler, and Damien Stehlé. 2017. CRYSTALS-Kyber: Algorithm Specifications And Supporting Documentation. https://csrc.nist.gov/Projects/post-quantum-cryptography/post-quantum-cryptography-standardization/Round-1-Submissions.
[10]
László Babai. 1985. On Lovász' Lattice Reduction and the Nearest Lattice Point Problem (Shortened Version). In STACS.
[11]
Shi Bai and Steven D. Galbraith. 2014. An Improved Compression Technique for Signatures Based on Learning with Errors. In CT-RSA.
[12]
Anja Becker, Léo Ducas, Nicolas Gama, and Thijs Laarhoven. 2016. New Directions in Nearest Neighbor Searching with Applications to Lattice Sieving. In SODA.
[13]
Mihir Bellare, Chanathip Namprempre, David Pointcheval, and Michael Semanko. 2003. The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme. J. Cryptol. (2003).
[14]
Eli Ben-Sasson, Alessandro Chiesa, Michael Riabzev, Nicholas Spooner, Madars Virza, and Nicholas P. Ward. 2019. Aurora: Transparent Succinct Arguments for R1CS. In EUROCRYPT.
[15]
Fabrice Benhamouda, Tancrè de Lepoint, Julian Loss, Michele Orrù, and Mariana Raykova. 2021. On the (in)security of ROS. In EUROCRYPT.
[16]
Olivier Blazy, Philippe Gaborit, Julien Schrek, and Nicolas Sendrier. 2017. A code-based blind signature. In ISIT.
[17]
Alexandra Boldyreva. 2003. Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme. In PKC.
[18]
Dan Boneh and David Mandell Freeman. 2011. Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures. In PKC.
[19]
Dan Boneh, Ben Lynn, and Hovav Shacham. 2001. Short signatures from the Weil pairing. In ASIACRYPT.
[20]
Jonathan Bootle, Vadim Lyubashevsky, and Gregor Seiler. 2019. Algebraic Techniques for Short(er) Exact Lattice-Based Zero-Knowledge Proofs. In CRYPTO.
[21]
Samuel Bouaziz-Ermann, Sébastien Canard, Gautier Eberhart, Guillaume Kaim, Adeline Roux-Langlois, and Jacques Traoré. 2020. Lattice-based (Partially) Blind Signature without Restart. IACR Cryptol. ePrint Arch. (2020).
[22]
Zvika Brakerski, Craig Gentry, and Vinod Vaikuntanathan. 2012. (Leveled) fully homomorphic encryption without bootstrapping. In ITCS.
[23]
David Chaum. 1982. Blind Signatures for Untraceable Payments. In CRYPTO.
[24]
David Chaum and Torben Pryds Pedersen. 1992. Wallet databases with observers. In CRYPTO.
[25]
Nicolas T. Courtois, Matthieu Finiasz, and Nicolas Sendrier. 2001. How to Achieve a McEliece-Based Digital Signature Scheme. In ASIACRYPT.
[26]
Rafael del Pino and Shuichi Katsumata. 2022. A New Framework For More Efficient Round-Optimal Lattice-Based (Partially) Blind Signature via Trapdoor Sampling. In CRYPTO.
[27]
David Derler, Sebastian Ramacher, and Daniel Slamanig. 2018. Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives. In PQCrypto.
[28]
Emmanouil Doulgerakis, Thijs Laarhoven, and Benne de Weger. 2019. Finding Closest Lattice Vectors Using Approximate Voronoi Cells. In PQCrypto.
[29]
Lé o Ducas, Eike Kiltz, Tancrè de Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, and Damien Stehlé. 2018. CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme. IACR Trans. Cryptogr. Hardw. Embed. Syst. (2018).
[30]
Léo Ducas and Wessel van Woerden. 2021. NTRU Fatigue: How Stretched is Overstretched?. In ASIACRYPT.
[31]
Muhammed F. Esgin, Ngoc Khanh Nguyen, and Gregor Seiler. 2020. Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings. In ASIACRYPT.
[32]
Muhammed F. Esgin, Ron Steinfeld, Dongxi Liu, and Sushmita Ruj. 2022. Efficient Hybrid Exact/Relaxed Lattice Proofs and Applications to Rounding and VRFs. IACR Cryptol. ePrint Arch. (2022).
[33]
Muhammed F. Esgin, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, and Dongxi Liu. 2019. Short Lattice-Based One-out-of-Many Proofs and Applications to Ring Signatures. In ACNS.
[34]
Thomas Espitau, Mehdi Tibouchi, Alexandre Wallet, and Tang Yu. 2022. Shorter Hash-and-Sign Lattice-Based Signatures. In CRYPTO.
[35]
Marc Fischlin. 2006. Round-optimal composable blind signatures in the common reference string model. In CRYPTO.
[36]
Pierre-Alain Fouque, Jeffrey Hoffstein, Paul Kirchner, Vadim Lyubashevsky, Thomas Pornin, Thomas Prest, Thomas Ricosset, Gregor Seiler, William Whyte, and Zhenfei Zhang. 2017. Falcon: Fast-Fourier lattice-based compact signatures over NTRU. Technical Report. Specification available at https://falcon-sign.info/.
[37]
Georg Fuchsbauer, Antoine Plouviez, and Yannick Seurin. 2020. Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model. In EUROCRYPT.
[38]
Sanjam Garg and Divya Gupta. 2014. Efficient Round Optimal Blind Signatures. In EUROCRYPT.
[39]
Sanjam Garg, Vanishree Rao, Amit Sahai, Dominique Schröder, and Dominique Unruh. 2011. Round Optimal Blind Signatures. In CRYPTO.
[40]
Craig Gentry, Chris Peikert, and Vinod Vaikuntanathan. 2008. Trapdoors for hard lattices and new cryptographic constructions. In STOC.
[41]
Lorenzo Grassi, Dmitry Khovratovich, Christian Rechberger, Arnab Roy, and Markus Schofnegger. 2021. Poseidon: A New Hash Function for Zero-Knowledge Proof Systems. In USENIX Security.
[42]
Tim Gü neysu, Vadim Lyubashevsky, and Thomas Pö ppelmann. 2012. Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems. In CHES.
[43]
Guillaume Hanrot, Xavier Pujol, and Damien Stehlé. 2011. Analyzing Blockwise Lattice Algorithms Using Dynamical Systems. In CRYPTO.
[44]
Eduard Hauck, Eike Kiltz, and Julian Loss. 2019. A modular treatment of blind signatures from identification schemes. In EUROCRYPT.
[45]
Eduard Hauck, Eike Kiltz, Julian Loss, and Ngoc Khanh Nguyen. 2020. Lattice-Based Blind Signatures, Revisited. In CRYPTO.
[46]
Subariah Ibrahim, Maznah Kamat, Mazleena Salleh, and Sh.R. Abdul Aziz. 2003. Secure E-voting with blind signature. In NCTT.
[47]
Ari Juels, Michael Luby, and Rafail Ostrovsky. 1997. Security of Blind Digital Signatures (Extended Abstract). In CRYPTO.
[48]
Julia Kastner, Julian Loss, and Jiayu Xu. 2022. On pairing-free blind signature schemes in the algebraic group model. In PKC.
[49]
Philip N. Klein. 2000. Finding the closest lattice vector when it's unusually close. In SODA.
[50]
Adeline Langlois and Damien Stehlé. 2015. Worst-case to average-case reductions for module lattices. Des. Codes Cryptogr. (2015).
[51]
Huy Quoc Le, Willy Susilo, Thanh Xuan Khuc, Minh Kim Bui, and Dung Hoang Duong. 2019. A Blind Signature from Module Lattices. In DSC.
[52]
San Ling, Khoa Nguyen, Damien Stehlé, and Huaxiong Wang. 2013. Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications. In PKC.
[53]
Vadim Lyubashevsky. 2012. Lattice Signatures without Trapdoors. In EUROCRYPT.
[54]
Vadim Lyubashevsky, Ngoc Khanh Nguyen, and Maxime Planccon. 2022a. Efficient Lattice-Based Blind Signatures via Gaussian One-Time Signatures. In PKC.
[55]
Vadim Lyubashevsky, Ngoc Khanh Nguyen, and Maxime Planccon. 2022b. Lattice-Based Zero-Knowledge Proofs and Applications: Shorter, Simpler, and More General. In CRYPTO.
[56]
Vadim Lyubashevsky, Ngoc Khanh Nguyen, Maxime Planccon, and Gregor Seiler. 2021b. Shorter Lattice-Based Group Signatures via “Almost Free” Encryption and Other Optimizations. In ASIACRYPT.
[57]
Vadim Lyubashevsky, Ngoc Khanh Nguyen, and Gregor Seiler. 2021a. Shorter Lattice-Based Zero-Knowledge Proofs via One-Time Commitments. In PKC.
[58]
Vadim Lyubashevsky, Adriana Palacio, and Gil Segev. 2010a. Public-Key Cryptographic Primitives Provably as Secure as Subset Sum. In TCC.
[59]
Vadim Lyubashevsky, Chris Peikert, and Oded Regev. 2010b. On Ideal Lattices and Learning with Errors over Rings. In EUROCRYPT.
[60]
Daniele Micciancio and Shafi Goldwasser. 2002. Complexity of lattice problems - a cryptographic perspective. Springer.
[61]
Phong Q. Nguyên and Thomas Vidick. 2008. Sieve algorithms for the shortest vector problem are practical. Journal of Mathematical Cryptology (2008).
[62]
Miyako Ohkubo and Masayuki Abe. 2003. Security of Some Three-move Blind Signature Schemes Reconsidered. In SCIS.
[63]
Tatsuaki Okamoto. 1992. Provably secure and practical identification schemes and corresponding signature schemes. In CRYPTO.
[64]
Dimitrios Papachristoudis, Dimitrios Hristu-Varsakelis, Foteini Baldimtsi, and George Stephanides. 2019. Leakage-resilient lattice-based partially blind signatures. IET Information Security (2019).
[65]
Albrecht Petzoldt, Alan Szepieniec, and Mohamed Saied Emam Mohamed. 2017. A Practical Multivariate Blind Signature Scheme. In Financial Crypto.
[66]
David Pointcheval and Jacques Stern. 2000. Security Arguments for Digital Signatures and Blind Signatures. J. Cryptol. (2000).
[67]
Oded Regev. 2009. On lattices, learning with errors, random linear codes, and cryptography. Journal of the ACM (JACM) (2009).
[68]
Markus Rückert. 2010. Lattice-Based Blind Signatures. In ASIACRYPT.
[69]
C.-P. Schnorr and M. Euchner. 1994. Lattice Basis Reduction: Improved Practical Algorithms and Solving Subset Sum Problems. Math. Program. (1994).
[70]
Damien Stehlé, Ron Steinfeld, Keisuke Tanaka, and Keita Xagawa. 2009. Efficient Public Key Encryption Based on Ideal Lattices. In ASIACRYPT.
[71]
Jacques Stern. 1996. A new paradigm for public key identification. IEEE Trans. Inf. Theory (1996).
[72]
Stefano Tessaro and Chenzhi Zhu. 2022. Short Pairing-Free Blind Signatures with Exponential Security. IACR Cryptol. ePrint Arch. (2022).
[73]
Rupeng Yang, Man Ho Au, Zhenfei Zhang, Qiuliang Xu, Zuoxia Yu, and William Whyte. 2019. Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications. In CRYPTO.
[74]
Xun Yi and Kwok-Yan Lam. 2019. A new blind ECDSA scheme for bitcoin transaction anonymity. In Asia-CCS.

Cited By

View all
  • (2025)More Efficient Lattice-Based Electronic Voting from NTRUIACR Communications in Cryptology10.62056/a69qudhdj1:4Online publication date: 13-Jan-2025
  • (2025)Improved Universal Thresholdizer from Iterative Shamir Secret SharingJournal of Cryptology10.1007/s00145-024-09536-z38:1Online publication date: 13-Jan-2025
  • (2024)Neutrosophic Analysis of Rejection Sampling in Post Quantum Cryptography (PQC)Multi-Criteria Decision Making Models and Techniques10.4018/979-8-3693-2085-3.ch003(51-66)Online publication date: 27-Sep-2024
  • Show More Cited By

Index Terms

  1. Practical, Round-Optimal Lattice-Based Blind Signatures

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
    November 2022
    3598 pages
    ISBN:9781450394505
    DOI:10.1145/3548606
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 07 November 2022

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. blind signature
    2. lattice cryptography
    3. round optimal

    Qualifiers

    • Research-article

    Funding Sources

    • DST "Swarnajayanti" fellowship
    • IndoFrench CEFIPRA project
    • ANR AMIRAL project
    • Young Russian Mathematics scholarship
    • Russian Science Foundation grant
    • National Blockchain Project
    • European Union Horizon 2020 Research and Innovation Program
    • BPI-France in the context of the national project RISQ

    Conference

    CCS '22
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)170
    • Downloads (Last 6 weeks)22
    Reflects downloads up to 23 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)More Efficient Lattice-Based Electronic Voting from NTRUIACR Communications in Cryptology10.62056/a69qudhdj1:4Online publication date: 13-Jan-2025
    • (2025)Improved Universal Thresholdizer from Iterative Shamir Secret SharingJournal of Cryptology10.1007/s00145-024-09536-z38:1Online publication date: 13-Jan-2025
    • (2024)Neutrosophic Analysis of Rejection Sampling in Post Quantum Cryptography (PQC)Multi-Criteria Decision Making Models and Techniques10.4018/979-8-3693-2085-3.ch003(51-66)Online publication date: 27-Sep-2024
    • (2024)Towards Post-Quantum Verifiable CredentialsProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3669932(1-10)Online publication date: 30-Jul-2024
    • (2024)CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twistDesigns, Codes and Cryptography10.1007/s10623-024-01441-792:11(3587-3643)Online publication date: 1-Nov-2024
    • (2024)Lattice-Based Polynomial Commitments: Towards Asymptotic and Concrete EfficiencyJournal of Cryptology10.1007/s00145-024-09511-837:3Online publication date: 10-Jul-2024
    • (2024)Verifiable Oblivious Pseudorandom Functions from Lattices: Practical-Ish and ThresholdisableAdvances in Cryptology – ASIACRYPT 202410.1007/978-981-96-0894-2_7(205-237)Online publication date: 10-Dec-2024
    • (2024)Non-Interactive Blind Signatures: Post-Quantum and Stronger SecurityAdvances in Cryptology – ASIACRYPT 202410.1007/978-981-96-0888-1_3(70-104)Online publication date: 11-Dec-2024
    • (2024)Low Communication Threshold Fully Homomorphic EncryptionAdvances in Cryptology – ASIACRYPT 202410.1007/978-981-96-0875-1_10(297-329)Online publication date: 10-Dec-2024
    • (2024)Two-Round Threshold Signature from Algebraic One-More Learning with ErrorsAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68394-7_13(387-424)Online publication date: 18-Aug-2024
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media