Skip to main content

2024 | OriginalPaper | Buchkapitel

Cutting the GRASS: Threshold GRoup Action Signature Schemes

verfasst von : Michele Battagliola, Giacomo Borin, Alessio Meneghetti, Edoardo Persichetti

Erschienen in: Topics in Cryptology – CT-RSA 2024

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Group actions are fundamental mathematical tools, with a long history of use in cryptography. Indeed, the action of finite groups at the basis of the discrete logarithm problem is behind a very large portion of modern cryptographic systems. With the advent of post-quantum cryptography, however, other group actions, such as isogeny-based ones, received interest from the cryptographic community, attracted by the possibility of translating old discrete logarithm-based functionalities.
Usually, research focuses on abelian group actions; however in this work we show that isomorphism problems which stem from non-abelian cryptographic group actions can be viable building blocks for threshold signature schemes. In particular, we construct a full N-out-of-N threshold signature scheme, and discuss the efficiency issues arising from extending it to the generic T-out-of-N case. To give a practical outlook on our constructions, we instantiate them with two different flavors of code-based cryptographic group actions, respectively at the basis of the LESS and MEDS signature schemes, two of NIST’s candidates in the recent call for post-quantum standardization.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
This is a generic signature scheme that is simply an abstraction, but has appeared in literature when instantiated in various works, such as LESS [8] and MEDS [29].
 
2
Unfortunately, while standard linear secret sharing would be more efficient, it is difficult to use in a non-abelian setting.
 
3
i.e. the probability of guessing the commitment is negligible.
 
Literatur
1.
Zurück zum Zitat Abdalla, M., An, J.H., Bellare, M., Namprempre, C.: From identification to signatures via the Fiat-Shamir transform: minimizing assumptions for security and forward-security. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 418–433. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-46035-7_28CrossRef Abdalla, M., An, J.H., Bellare, M., Namprempre, C.: From identification to signatures via the Fiat-Shamir transform: minimizing assumptions for security and forward-security. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 418–433. Springer, Heidelberg (2002). https://​doi.​org/​10.​1007/​3-540-46035-7_​28CrossRef
2.
Zurück zum Zitat Aguilar Melchor, C., et al.: HQC. NIST PQC Submission (2020) Aguilar Melchor, C., et al.: HQC. NIST PQC Submission (2020)
4.
Zurück zum Zitat Albrecht, M.R., et al.: Classic McEliece. NIST PQC Submission (2020) Albrecht, M.R., et al.: Classic McEliece. NIST PQC Submission (2020)
5.
Zurück zum Zitat Aragon, N., et al.: BIKE. NIST PQC Submission (2020) Aragon, N., et al.: BIKE. NIST PQC Submission (2020)
7.
9.
Zurück zum Zitat Barenghi, A., Biasse, J.-F., Persichetti, E., Santini, P.: On the computational hardness of the code equivalence problem in cryptography. Adv. Math. Commun. 17(1), 23–55 (2023)MathSciNetCrossRef Barenghi, A., Biasse, J.-F., Persichetti, E., Santini, P.: On the computational hardness of the code equivalence problem in cryptography. Adv. Math. Commun. 17(1), 23–55 (2023)MathSciNetCrossRef
11.
Zurück zum Zitat Battagliola, M., Galli, A., Longo, R., Meneghetti, A.: A provably-unforgeable threshold schnorr signature with an offline recovery party. In: DLT2022 at Itasec 2022, CEUR Workshop Proceedings (2022) Battagliola, M., Galli, A., Longo, R., Meneghetti, A.: A provably-unforgeable threshold schnorr signature with an offline recovery party. In: DLT2022 at Itasec 2022, CEUR Workshop Proceedings (2022)
14.
Zurück zum Zitat Battagliola, M., Longo, R., Meneghetti, A., Sala, M.: Threshold ECDSA with an offline recovery party. Mediterr. J. Math. 19(4) (2022) Battagliola, M., Longo, R., Meneghetti, A., Sala, M.: Threshold ECDSA with an offline recovery party. Mediterr. J. Math. 19(4) (2022)
15.
Zurück zum Zitat Bellare, M., Neven, G.: Multi-signatures in the plain public-key model and a general forking lemma. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, pp. 390–399. Association for Computing Machinery, New York (2006) Bellare, M., Neven, G.: Multi-signatures in the plain public-key model and a general forking lemma. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, pp. 390–399. Association for Computing Machinery, New York (2006)
20.
Zurück zum Zitat Bläser, M., et al.: On digital signatures based on isomorphism problems: qrom security, ring signatures, and applications. Cryptology ePrint Archive (2022) Bläser, M., et al.: On digital signatures based on isomorphism problems: qrom security, ring signatures, and applications. Cryptology ePrint Archive (2022)
22.
Zurück zum Zitat Bonte, C., Smart, N.P., Tanguy, T.: Thresholdizing hasheddsa: MPC to the rescue. Int. J. Inf. Secur. 20, 879–894 (2021)CrossRef Bonte, C., Smart, N.P., Tanguy, T.: Thresholdizing hasheddsa: MPC to the rescue. Int. J. Inf. Secur. 20, 879–894 (2021)CrossRef
23.
Zurück zum Zitat Brandão, L.T.A.N., Davidson, M.: Notes on threshold eddsa/schnorr signatures. Accessed 01 May 2023 Brandão, L.T.A.N., Davidson, M.: Notes on threshold eddsa/schnorr signatures. Accessed 01 May 2023
24.
Zurück zum Zitat Brandão, L.T.A.N., Davidson, M., Vassilev, A.: NIST roadmap toward criteria for threshold schemes for cryptographic primitives. Accessed 27 Aug 2020 Brandão, L.T.A.N., Davidson, M., Vassilev, A.: NIST roadmap toward criteria for threshold schemes for cryptographic primitives. Accessed 27 Aug 2020
27.
Zurück zum Zitat Chailloux, A.: On the (in) security of optimized stern-like signature schemes. In: WCC (2022) Chailloux, A.: On the (in) security of optimized stern-like signature schemes. In: WCC (2022)
29.
Zurück zum Zitat Chou, T., Niederhagen, R., Persichetti, E., Randrianarisoa, T.H., Reijnders, K., Samardjiska, S., Trimoska, M.: Take your meds: digital signatures from matrix code equivalence. In: El Mrabet, N., De Feo, L., Duquesne, S. (eds.) AFRICACRYPT 2023. LNCS, vol. 14064, pp. 28–52. Springer, Cham (2023). https://doi.org/10.1007/978-3-031-37679-5_2CrossRef Chou, T., Niederhagen, R., Persichetti, E., Randrianarisoa, T.H., Reijnders, K., Samardjiska, S., Trimoska, M.: Take your meds: digital signatures from matrix code equivalence. In: El Mrabet, N., De Feo, L., Duquesne, S. (eds.) AFRICACRYPT 2023. LNCS, vol. 14064, pp. 28–52. Springer, Cham (2023). https://​doi.​org/​10.​1007/​978-3-031-37679-5_​2CrossRef
33.
Zurück zum Zitat D’Alconzo, G., Scala, A.J.D.: Representations of group actions and their applications in cryptography. Cryptology ePrint Archive, Paper 2023/1247 (2023) D’Alconzo, G., Scala, A.J.D.: Representations of group actions and their applications in cryptography. Cryptology ePrint Archive, Paper 2023/1247 (2023)
36.
Zurück zum Zitat Doerner, J., Kondi, Y., Lee, E., Shelat, A.: Secure two-party threshold ECDSA from ECDSA assumptions. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 980–997. IEEE (2018) Doerner, J., Kondi, Y., Lee, E., Shelat, A.: Secure two-party threshold ECDSA from ECDSA assumptions. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 980–997. IEEE (2018)
37.
Zurück zum Zitat Doerner, J., Kondi, Y., Lee, E., Shelat, A.: Threshold ECDSA from ECDSA assumptions: the multiparty case. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 1051–1066. IEEE (2019) Doerner, J., Kondi, Y., Lee, E., Shelat, A.: Threshold ECDSA from ECDSA assumptions: the multiparty case. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 1051–1066. IEEE (2019)
40.
Zurück zum Zitat Feneuil, T., Joux, A., Rivain, M.: Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature. Des. Codes Crypt. 91(2), 563–608 (2023)MathSciNetCrossRef Feneuil, T., Joux, A., Rivain, M.: Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature. Des. Codes Crypt. 91(2), 563–608 (2023)MathSciNetCrossRef
42.
Zurück zum Zitat Gennaro, R., Goldfeder, S.: Fast multiparty threshold ECDSA with fast trustless setup. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1179–1194 (2018) Gennaro, R., Goldfeder, S.: Fast multiparty threshold ECDSA with fast trustless setup. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1179–1194 (2018)
46.
Zurück zum Zitat Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure distributed key generation for discrete-log based cryptosystems. J. Cryptol. 20, 51–83 (2007)MathSciNetCrossRef Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure distributed key generation for discrete-log based cryptosystems. J. Cryptol. 20, 51–83 (2007)MathSciNetCrossRef
48.
Zurück zum Zitat Gueron, S., Persichetti, E., Santini, P.: Designing a practical code-based signature scheme from zero-knowledge proofs with trusted setup. Cryptography 6(1), 5 (2022)CrossRef Gueron, S., Persichetti, E., Santini, P.: Designing a practical code-based signature scheme from zero-knowledge proofs with trusted setup. Cryptography 6(1), 5 (2022)CrossRef
49.
Zurück zum Zitat Ito, M., Saito, A., Nishizeki, T.: Secret sharing scheme realizing general access structure. Electron. Commun. Japan 72(9), 56–64 (1989)MathSciNetCrossRef Ito, M., Saito, A., Nishizeki, T.: Secret sharing scheme realizing general access structure. Electron. Commun. Japan 72(9), 56–64 (1989)MathSciNetCrossRef
50.
Zurück zum Zitat Kuperberg, G.: Another subexponential-time quantum algorithm for the dihedral hidden subgroup problem. In: Severini, S., Brandão, F.G.S.L. (eds.) TQC 2013. LIPIcs, vol. 22. Schloss Dagstuhl (2013) Kuperberg, G.: Another subexponential-time quantum algorithm for the dihedral hidden subgroup problem. In: Severini, S., Brandão, F.G.S.L. (eds.) TQC 2013. LIPIcs, vol. 22. Schloss Dagstuhl (2013)
54.
Zurück zum Zitat MacKenzie, P., Reiter, M.K.: Two-party generation of DSA signatures. Int. J. Inf. Secur. (2004) MacKenzie, P., Reiter, M.K.: Two-party generation of DSA signatures. Int. J. Inf. Secur. (2004)
57.
Zurück zum Zitat Persichetti, E., Santini, P.: A new formulation of the linear equivalence problem and shorter less signatures. Cryptology ePrint Archive (2023) Persichetti, E., Santini, P.: A new formulation of the linear equivalence problem and shorter less signatures. Cryptology ePrint Archive (2023)
58.
Zurück zum Zitat Schwabe, P., et al.: CRYSTALS-KYBER. NIST PQC Submission (2020) Schwabe, P., et al.: CRYSTALS-KYBER. NIST PQC Submission (2020)
Metadaten
Titel
Cutting the GRASS: Threshold GRoup Action Signature Schemes
verfasst von
Michele Battagliola
Giacomo Borin
Alessio Meneghetti
Edoardo Persichetti
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-58868-6_18

Premium Partner