TRIFORS: LINKable Trilinear Forms Ring Signature
G. D'Alconzo - A. Gangemi
CrypTO Conference 2023�26 Maggio 2023
giuseppe.dalconzo@polito.it
OR Sigma Protocol
(Ring signatures)
Post-Quantum Assumptions
(Trilinear forms)
(Linkable) Trilinear Forms Ring Signature Scheme
TRIFORS and Link-TRIFORS!
Roadmap
Ring Signatures
R. Rivest, A. Shamir, and Y. Tauman, “How to leak a secret,” Asiacrypt 2001.
Introduced in 2001 by Rivest, Shamir and Tauman.
Linkability:
two signatures generated by the same user can be linked (keeping anonymity).
Applications:
The Quantum Menace
Cryptographic group actions
Group action of G on the set X:
for every g in G, there is a permutation of X.
The elements of G "mix" X.
x
1
x
2
x
3
x
4
x
5
x
6
x
0
x
7
Action of 4 on x
Trilinear Forms
G. Tang, D. H. Duong, A. Joux, T. Plantard, Y. Qiao, and W. Susilo, “Practical post-quantum signature schemes from isomorphism problems of trilinear forms,” Eurocrypt 2022.
Trilinear Forms Equivalence (TFE)
Given two trilinear forms
and
find the matrix A.
Alternating Tril. Forms Eq. (ATFE)
Given two alternating trilinear forms
and
find the matrix A.
The group of invertible matrices acts on the set of trilinear forms:
Group action
The set of trilinear forms is a vector space.
� coefficients needed.
IDEA. Alternating forms: zero whenever two inputs are equal. Small vector space:
coefficients.
(OR) Sigma Protocols
An user holding the key pair can authenticate itself with a server using a sigma protocol (or identification protocol).
Sigma protocol
(interactive)
OR Sigma protocol
Given a set of public keys
, an user holding the secret key can authenticate itself with a server hiding his identity!
Digital Signature
(non interactive)
Fiat-Shamir
Fiat-Shamir
Ring Signature
(non interactive)
OR Sigma Protocol da ATFE
W. Beullens, S. Katsumata, and F. Pintore, “Calamari and falafl: Logarithmic (linkable) ring signatures from isogenies and lattices,” Asiacrypt 2020.
L'utente I vuole firmare:
Parametro pubblico ,
tale che
2) Challenge e 3) Response
Ogni utente ha le chiavi pubbliche dell'anello e la sua chiave segreta.
Il server ha l'insieme delle chiavi pubbliche.
Response:
Response:
Commitment: root
root
OR Sigma Protocol from ATFE
W. Beullens, S. Katsumata, and F. Pintore, “Calamari and falafl: Logarithmic (linkable) ring signatures from isogenies and lattices,” Asiacrypt 2020.
User I wants to sign:
Public parameter , keys
such that
Each user has the public keys of the ring and his secret key.
The server knows the public keys of the ring.
Response:
Response:
Commitment: root
OR Sigma Protocol from ATFE
W. Beullens, S. Katsumata, and F. Pintore, “Calamari and falafl: Logarithmic (linkable) ring signatures from isogenies and lattices,” Asiacrypt 2020.
User I wants to sign:
Public parameter , keys
such that
Each user has the public keys of the ring and his secret key.
The server knows the public keys of the ring.
Response:
Response:
Commitment: root
!
Optimizations
Using Fiat-Shamir, we get a signature of bits.
Opt 2
If ch = 0, the response is very long.
Then, we want that
Using the combinatorial number system, the challenge becames about 128 bit, for every L.
We can fix the number of 1s (K) and 0s (L-K).
Opt 1
If ch=1, we send a seed for these values: 128 bits.
random
Opt 3
Through the repetitions, we generate L seeds and we send K of them in the response.
Seed tree: structure to send less seeds.
The length becomes about
Optimizations
Opt 1
If ch=1, we send a seed for these values: 128 bits.
Opt 3
If ch = 0, the response is very long.
Then, we want that .
Combinatorial number system: bijection between the strings of L bits with K ones and the set of integers enumerating them.
As a result, for every L the challenge has about 128 bits.
We can fix the number of 1s (K) and 0s (L-K).
Using Fiat-Shamir, we get a signature of bits.
Opt 2
Seed tree: structure to send less seeds.
The length becomes about
Ok, but concretely?
In November 2022, Beullens attacked the ATFE assumption.
New parameters to resist this attack.
W. Beullens, “Graph-theoretic algorithms for the alternating trilinear form equivalence problem,” Cryptology ePrint Archive, 2022.
q | n | L | K | R | ||||
2 | 8 | 64 | 4096 | 2^21 | ||||
4194301 | 10 | 512 | 23 | 9.1 | 10.6 | 12.8 | 17.2 | 23.8 |
4194301 | 12 | 512 | 23 | 11.9 | 13.4 | 15.6 | 20.0 | 26.6 |
Signature length in KB. R is the size of the ring.
In general, for the first parameters set, we have
8.4 + 0.7Log(R) KB.
More concretely?
Recap
Thank you!
Questions?