Abstract
A bilinear map whose domain and target sets are identical is called a self-bilinear map. Original self-bilinear maps are defined over cyclic groups. Since the map itself reveals information about the underlying cyclic group, the Decisional Diffie–Hellman Problem (DDH) and the computational Diffie–Hellman (CDH) problem may be solved easily in some specific groups. This brings a lot of limitations to constructing secure self-bilinear schemes. As a compromise, a self-bilinear map with auxiliary information was proposed in CRYPTO’2014. In this paper, we construct this weak variant of a self-bilinear map from generic sets and indistinguishable obfuscation. These sets should own several properties. A new notion, One Way Encoding System (OWES), is proposed to summarize these properties. The new Encoding Division Problem (EDP) is defined to complete the security proof. The OWES can be built by making use of one level of graded encoding systems (GES). To construct a concrete self-bilinear map scheme, Garg, Gentry, and Halvei(GGH13) GES is adopted in our work. Even though the security of GGH13 was recently broken by Hu et al., their algorithm does not threaten our applications. At the end of this paper, some further considerations for the EDP for concrete construction are given to improve the confidence that EDP is indeed hard.
1. Introduction
The bilinear map is a very useful cryptographic primitive. It provides solutions for many cryptographic applications such as identity-based encryptions [1,2,3], non-interactive zero-knowledge proof systems [4,5,6,7,8,9], attribute-based encryptions [10] and short signatures [11,12,13,14,15], etc. A self-bilinear map is a special variant of bilinear maps whose domain and target groups are identical. Because of this exclusive property, a self-bilinear map may have more interesting potential. A straightforward application of a self-bilinear map is to construct multilinear maps.
A multilinear map is a generalization of the bilinear map. Not long after the bilinear map showed the convenience it brought to cryptography, Boneh and Silveberg [16] imaged applications of a multilinear map. But, they met serious obstacles, when they tried to construct such a good tool. From then on, constructing multilinear maps became a long-standing open problem. Until recently, three candidate multilinear maps were proposed, the GGH13 scheme [17] on ideal lattices, the CLT13 scheme [18] over the integer and the GGH15 [19] on lattices. a multilinear map is a basic component of various cryptographic primitives such as witness encryption [20,21], indistinguishability obfuscation and functional encryption [22], etc.
Recently, the current candidates for multilinear maps met extremely strong challenges. The CLT13 scheme was completely broken by the “zerozing algorithm” [23]. Two patches [24,25] were proposed very soon after the CLT13 was broken. But Coron et al. [26] stated that these two patches were still unsafe. Then, they described a new multilinear map over the integer [27], and this scheme was soon attacked by Cheon et al. [28]. Not long after the CLT scheme was completely broken; the GGH scheme was also under attack. Hu and Jia designed a modified encoding/decoding algorithm [29] to break the MDDH assumption which is the security basis of various applications. Moreover, Hu and Jia solve the MCDH problem in their further work [30]. As a substrate of the current program obfuscation, the secret encoding version of the GGH13 map was threatened by Miles et al.’s “Annihilation attacks”. This attack has broken the security of indistinguishability obfuscation that builds upon the GGH13 map, e.g., [31,32,33,34,35,36]. From this situation, we can see that constructing a secure and efficient multilinear map is still worthwhile work. This also highlights the study of finding a secure and efficient self-bilinear map.
The first candidate self-bilinear map was designed by Lee [37]. Cheon and Lee [38] remarked that Lee’s map is not essentially a self-bilinear. They also proved the impossibility that the secure self-bilinear map could not be constructed over the cyclic group of known prime order. The computational Diffie–Hellman (CDH) assumption collapses because the map itself reveals much information about the underlying group. To avoid this situation, Yamakawa et al. [39] adopted the signed quadratic residue group of where the order of this group is composite and kept secret. The security of their scheme is based on the factoring assumption and the property of indistinguishability obfuscation ().
Motivation
In this paper, we build a self-bilinear map with auxiliary information over generic sets instead of cyclic groups. A new concept OWES is defined to describe the generic sets that can be used to construct the weak variant of self-bilinear maps. Besides the one-way problem, we also define an encoding division problem (EDP) in the OWES. Then, we will prove that the Bilinear Computational Diffie–Hellman with Auxiliary Information (BCDHAI) assumption of a self-bilinear map with auxiliary information is held if the EDP in the underlying OWES is hard. The OWES can be initiated by using graded encoding systems (GES). Based on the GGH13 GES [17], a concrete weak variant of the self-bilinear map is proposed. We also analyze the security of the concrete scheme.
The remainder of this paper is organized as follows. In Section 2, we provide some backgrounds of the techniques we used in this paper, including the definition of , self-bilinear map with auxiliary information and problems required to be hard in a self-bilinear map with auxiliary information. Then we introduce the new notion of the One Way Encoding System (OWES) in Section 3. Our generic construction of a self-bilinear map from the OWES and is described in Section 4. By instantiating the OWES with GGH13 GES, we give a concrete self-bilinear map with auxiliary information in Section 5, and discuss whether the one-way problem and EDP are hard in GGH13 GES. Finally, we give our work a brief summary.
2. Preliminaries
In this section, we describe the notations that will be used in this paper. Then, we review the .
2.1. Notations
We use to denote the set of all integer numbers and to denote the rational number field. are polynomials with coefficients in . For a positive integer n, denotes the set . is the secure parameter. We denote the discrete Gaussian distribution on S with parameter as . For an alphabet x, define as . If is a residue class ring of a ring R, for an element , we use to denote the coset of I where a is one of the representatives. For a set S, denotes the cardinal of S. We say that a function in is negligible, written , if it vanishes faster than the reciprocal of any positive polynomial. For a polynomial r, its ith coefficient is named by . If M is a probabilistic polynomial time (PPT) algorithm (Turing machine), then by we refer to the result of running M on input x and random string r.
2.2. Indistinguishability Obfuscator
The following formulation of indistinguishability obfuscator is due to Garg et al. [22].
Definition 1 (Indistinguishability Obfuscator).
A uniform PPT machine is called an indistinguishability obfuscator for a circuit class {} if the following conditions are satisfied:
- For security parameters , all , and all inputs x, we have that
- For any (not necessarily uniform) PPT distinguisher D, and for all security parameters , and all pairs of circuits , we have that if for all inputs x, then
An indistinguishability obfuscator is an efficient randomized algorithm that makes circuits and computationally indistinguishable if they have the same functionality.
2.3. Self-Bilinear Map with Auxiliary Information
Before we formalize a self-bilinear map with auxiliary information, we recall the ideal notion of a self-bilinear map. An ideal self-bilinear map is a special kind of self-bilinear map whose domain and target groups are identical.
Definition 2 (Ideal Self-bilinear map [38]).
For a cyclic group G of order p, a map is self-bilinear, if it has the following properties.
- For all and the integer , it holds that
- The map e is non-degenerate so that generates G, if both and are generators of G.
It is well known that a k-multilinear map can be constructed inductively from a self-bilinear map (which is essentially a 2-multilinear map). If is a -multilinear map from self-bilinear map , a k-multilinear map can be generated by setting
The fact, that constructing a self-bilinear map is a candidate approach to building a multilinear map, highlights the study of self-bilinear maps.
A self-bilinear map with auxiliary information (described in [39]) is a weak notion of the ideal one, where map e is efficiently computable only if the auxiliary information is given. That is, when one computes , the auxiliary information for or for is required.
2.4. Efficient Procedures
Instead of constructing an ideal self-bilinear map, we construct the weak notion of a self-bilinear map [39] which can be formalized as a set of algorithms = (InstGen, Sample, Enc, Add, Neg, AlGen, Map, AlAdd) and a ring R. These procedures are described below.
Instance Generation.
The randomized InstGen takes as input the parameter , and outputs params, which are descriptions of the group G, the order of G and a self-bilinear map .
Element Encoding.
Given the instance params from above, and an element , the procedure (params,a) outputs an element in G which encode a. We require that for any , .
Group Operation.
Given , computes , and computes .
Auxiliary Information Generation.
The procedure , outputs corresponding auxiliary information , on input .
Self-Bilinear Map.
The procedure takes and as input, outputs .
Auxiliary Information Operation.
On input auxiliary information , ) outputs .
2.5. Hardness Assumptions of
For the ideal self-bilinear map to be cryptographically useful, at least the discrete logarithm (one-way problem) must be hard in the underlying group, and it usually also requires the bilinear-DDH problem to be hard. In the case of the self-bilinear map with auxiliary information, these hardness problems are defined in a slightly different way, since the auxiliary information may reveal extra information about a self-bilinear map and the underlying group. Here, we introduce the bilinear computational Diffie–Hellman with auxiliary information (BCDHAI) assumption and bilinear hashed Diffie–Hellman with auxiliary information (BHDHAI) assumption whose generalizations (if the multilinear level is 2, the BCDHAI (BHDHAI) is equivalent to the MCDHAI (resp., MHDHAI) defined in [39]) are both defined in [39].
Definition 3 (BCDHAI assumption).
We say that the BCDHAI assumption holds with respect to if for any efficient algorithm ,
where , g is the generator of G. , for .
The BCDHAI assumption is an analog of the classic bilinear computational Diffie–Hellman (BCDH) assumption and the following BHDHAI assumption is the analog of the bilinear hashed Diffie–Hellman assumption.
Definition 4 (BHDHAI assumption).
We say that the BHDHAI assumption holds with respect to and a family of hash functions if for any efficient algorithm D,
where , g is the generator of G, , , for all , and if , and otherwise .
Depending on the work of [39], if the MCDHAI assumption holds with respect to then the MHDHAI assumption holds with respect to and the Goldreich–Levin hardcore bit function [40].
3. One Way Encoding Systems
In this section, we will give the definition of the One Way Encoding System (OWES), and describe some problems which are required to be hard in the OWES.
One Way Encoding Systems
The notion of a One Way Encoding System (OWES) is generalized from graded encoding systems (GES) and cryptographic cyclic groups which formed the substrates of current candidate multilinear maps and bilinear maps, respectively. We are trying to refine all properties, which are necessary for building a self-bilinear map. We will first shape the frame of OWES by comparing it to the current GES, and then, show that the frame is also suitable for cryptographic cyclic groups or even more algebraic structures.
We begin by recalling the Modules.
Definition 5 (-modules).
Let R be a commutative ring with identity 1. An -module is an abelian group together with a map
satisfying the following properties:
- 1.
- ,
- 2.
- ,
- 3.
- ,
- 4.
for , .
Without loss of generality, we make the following further assumptions. Let be a finite commutative integral domain with identity ( is essentially a finite field) and is a residue class ring of modulo m (If is not a rigorous residue class ring, consider , where ). Let be an abelian group and assume similarly that is a quotient group , where H is a normal subgroup of (Regarding as if it is not, where is the subgroup of which only involves identity e). We make the above assumptions because of the observation of the current graded encoding system.
In practical terms, to manipulate elements in a residue class ring (e.g, , ) is instead achieved by doing the corresponding computation in the complete system of coset representatives of relative to (e.g., , ).
Definition 6 (Complete system of coset representatives of relative to ).
Let be an abelian group and be a subgroup of . From each coset of relative to we choose a coset representative, then the set so obtained, denoted by , is called a complete system of coset representatives of relative to .
The residing class ring and complete system are isomorphic. But at most times, the user can hardly choose a unique representative for each coset, if the generator of ideal is kept secret. For example, in GGH13 GES [17], the sampled level-0 encoding is a random (and short) representative of some ring element in . Since the is a secret system parameter, it is hard to fix representatives such that the complete system of coset representatives of R relative to I and are isomorphic. Thus, in this situation, the representative of a coset is a random variable of the form . In our paper, we will refer a representative of coset as the result of running a PPT Algorithm M, computing , on input a and random string k, where (A normal user will obtain a representative of the form , but he cannot obtain the system parameter a). We often omit to write for simplicity, if the context is clear. The above discussion is also suitable for group and its normal subgroup H. We assume that the complete system of coset representatives of relative to H is .
Definition 7 (The representative of elements in ).
For any element , the representative of is a random variable , where M is a PPT algorithm that computes the function on input , and a is a secret element in . The distribution of is dependent on the distribution of the random string k.
Now we proceed to discuss the notion of valid elements which are generalized from the notion of valid encodings in graded encoding scheme. For an algebraic structure to be cryptographically useful, at least the one-way problem (e.g., discrete logarithm problem) must be hard in it, and the notion of valid (level-0) encoding is crucial for GES to assure that. Informally speaking, if u is a level-1 encoding of , one can hardly compute such that efficiently and is a valid level-0 encoding. On our side, the level-0 encoding corresponds to a representative of a coset in . The valid representative in will be defined by limiting the support set of random string r.
Definition 8 (-valid representatives of ).
Let be a set of strings. For -modules , we say that a representative of , denoted by , is -valid, if the support of the random variable of strings , is . Moreover, the set of all -valid representatives in is
The discussions above will cause the problem of how can users without system parameters sample valid representatives at random. Thus, we need a -sampler, which is like the ring sampler in GGH13 GES, to solve this problem.
Definition 9 (-sampler).
The -sampler is a PPT algorithm , which on input security parameter λ and the description of , outputs a random representative such that
- for any , ,
- all representatives sampled by are in .
The definition shows that -sampler draws a random element b in a residue class relying on the random string . Furthermore, the corresponding residue class obeys the uniform distribution in .
After discussing the valid “level-0 encodings”, we proceed to describe the valid “level-1” encodings. A valid “level-0” encoding is a representative in group with some specific properties.
Definition 10 (-valid representatives of ).
For -modules , we say that a representative of , denoted by , is -valid, if the support of random variable of strings is . Moreover, the set of all -valid representatives in is
Since the presentative of the residue class in is a random variable, we require a zero testing predicate, which is similar to the functionality of the zero testing procedure in GGH13 GES.
Definition 11 (Zero testing predicate for -valid representative in ).
The Zero testing predicate for -valid representative in is a deterministic algorithm , which on input , where , outputs
Now we are ready to give the formal definition of OWES.
Definition 12 (-OWES).
Let , be the algebraic structure defined above, and be -modules. We say that a PPT Turing machine , which computes the map , is a -OWES if the following properties hold:
- 1.
- Valid encoding: For every -valid representative a and every -valid representative x, is -valid.
- 2.
- Valid manipulation: For all -valid and , the encoding is -valid.
- 3.
- Hard to invert: For every PPT algorithm and all sufficiently large λ,
If we set , , , and set ⊗ to be the power operation in G, and let be the set of bit strings with a polynomial size length, such a -OWES becomes a cryptographic cyclic group in which the “hard to invert” property is equivalent to the DLP assumption with respect to G. In another case, if we set , , ⊗ to be the GGH13 encoding procedure, and make to be a predicate to tell whether an element in a residue class is short, such an -OWES is exactly the GGH 13 graded encoding scheme.
For completing the security proof of a self-bilinear map, we have to define a new hard problem called EDP below.
Definition 13 (EDP).
For a -OWES with respect to the modules , the Encoding Division Problem is, on input the and , where is a unit of , to compute a representative such that .
The Encoding Division assumption says that there are no PPT algorithms solving the EDP with non-negligible probability.
The OWES can be constructed by making use of one level of graded encoding systems. To construct a concrete , the GGH13 is adopted in Section 5.
4. Generic Construction from OWES and
In this section, we construct the weak self-bilinear map scheme by using the OWES and .
4.1. Our Construction
In the scheme, circuits will act as the auxiliary information. We describe notations for circuits on OWES first.
Notation for Circuits on OWES.
For the -OWES with respect to the modules and , where , denotes the circuit that takes , where is the input and output an element that is equivalent to . For circuits , whose outputs can be parsed as the element in , respectively, denotes a circuit that computes the sum of outputs of and .
Now, we are ready to introduce the procedures of the generic constructing . The generic construction of a self-bilinear map is as follows.
Instance Generation:
- On inputting the security parameter , initiate -OWES with respect to modules .
- Choose a random representative , where and .
- Choose an invertible representative at random, where .
- Output as the system parameters.
After the InstGen procedure executed, a self-bilinear map e is defined as:
Encoding:
- On input params and , where , compute .
Auxiliary Information Generation:
- On input , where , generate the corresponding .
Adding encodings:
- It is easy to see that the encoding as above is additively homomorphic, in the sense that adding encodings yields an encoding of the sum.
Auxiliary Information Manipulation:
- On input, the auxiliary information and , compute .
Self-biliner Map:
.
- On input , run the obfuscated circuit to compute .
4.2. Security Analysis of
We prove that the BCDHAI assumption holds with respect to our generic construction if is an indistinguishability obfuscator for and the EDP in the corresponding OWES is hard.
The BCDHAI assumption holds with respect to if the EDP is hard in the underlying OWES and is an indistinguishability obfuscator for .
Proof.
Assume that the algorithm can solve the BCDHAI problem in . We consider the following games.
Game 1.
This game is the original BCDHAI problem game.
- Initiate the -OWES with respect to the modules . Choose a random representative , where and . Choose an invertible representative at random, where . Set the . params describe a .
- Run the -Sampler to obtain , so that , , and are distributed uniformly in .
- Compute and its corresponding auxiliary information for
- .
Game 2.
This game is the same as Game 1 except that are set differently.
- Initiate the -OWES with respect to the modules . Choose a random representative , where and . Choose an invertible representative at random, where . Compute . Output . params describe a .
- Choose , where are distributed uniformly.
- Let . Thus, , for .
- Generate the auxiliary information , for .
- .
We say that wins these games if . Let denote the probability that wins Game i, for . Next, we will prove that is negligible if is an indistinguishability obfuscator for . The hybrid games are considered. is the same as Game 2 except that the first i auxiliary information is generated as in Game 1. Therefore, is identical to Game 2 and is identical to Game 1. If is indistinguishable from , for , then Game 1 is indistinguishable from Game 2. Now, we assume that wins and with probability and , respectively, and is a non-negligible value, for . The newly designed Algorithm 1 works as follows.
Algorithm 1 The Games Distringuisher |
|
If , simulates for , otherwise it simulates . With the hypothesis, we have
which means breaks the security of with non-negligible probability, in contradiction to the assumption. Thus and are computationally indistinguishable; so are Game 1 and Game 2.
At the end of the proof, we give an Algorithm 2 which reduces the EDP to the BCDHAI Problem in Game 2.
Algorithm 2 The reduction of EDP to BCDHAI problem in Game 2 |
|
Correctness: If the output of Algorithm 2 is . Assume that ⊖ is the inverse operation of ⊕.
Time complexity:
We use to denote the time complexity. Besides the sub-routing , the number of manipulations in each step of is a constant. Assume that the sum of
these constants is t. The time complexity of each manipulation is a polynomial poly, since they are efficiently computable (addition in a ring, etc). Thus, the time complexity
of the Algorithm 2 is bounded by . Since is assumed to be an
efficient algorithm, is bounded by poly. So, which means is efficiently computable.
In summary, the Algorithm 2 is a polynomial reduction from EDP to the BCDHAI problem. Since EDP is hard, the algorithm that can solve the BCDHAI problem with respect to Game 2 does not exist. Since Game 2 and Game 1 are computationally indistinguishable, the BCDHAI assumption also holds in Game 1 (Game 1 is the original scheme). □
5. Concrete Construction from GGH and
The OWES can at least be constructed by making use of the graded encoding system (GES). To design a concrete scheme, the GGH13 GES [17] is adopted as an example.
5.1. Relationships between GGH13 and OWES
To construct a concrete OWES, only one level of the GGH13 is needed. Even though GGH13 does not completely satisfy the property of OWES, some relaxation could lead us to our destination. We introduce the relationship between GGH13 and OWES by first recalling the GGH13.
Depending on the security parameter , GGH13 consists of three sets , , and , where , , , encoded elements are the short representative of elements in . GGH13 outputs the public parameters , where are short. For a representative , it is encoded as at level 1. Note, that is a representative of the unique element in . A zero testing parameter is used to check whether u is the highest level encoding of I. Now we are ready to compare GGH13 to OWES.
Assume that we initiate a GGH13 GES with the multi-linearity level . We explain what parameters in GGH13 act as in OWES and how to define the hard problem in GGH13 as the OWES requires.
- Explanation for : Regard the as of OWES. Since R is a cyclotomic ring and I is a prime ideal of R, is an integral domain. Furthermore, consists of finite elements, so is actually a finite field. Level-0 encoding is a short representative of , where .
- Explanation for : Let be the of OWES. The Level-1 encoding is representative of , where .
- Explanation forf: The encoding algorithm is . But we cannot design this function without the representative. Thus, , where r is a random vector sampled from discrete Gaussian distribution. Note, that for a specified d, the output of is a random value in . f is not even a function (or map) from R to . But the output of is a unique value in , this may be the reason why the zero-testing procedure will work in GGH13.
- Explanation for hard problem: In GGH13, Given a level-1 encoding , it is not hard for adversaries to find a not short representative in . This contradicts the property of OWES. The same problem happens in EDP. So we make a relaxation to the one-way property and EDP for the concrete construction.
Definition 14 (A relaxation of One Way Property).
For the OWES constructed from GGH13 , we say that the one-way property holds if the following problem is hard. Given a level-1 encoding , it is hard to find a short .
Definition 15 (A relaxation of EDP).
For the OWES constructed from GGH13 , the EDP is, on input , to compute such that .
The modified one-way property is held in GGH13 since this problem is essentially the analog of a discrete logarithmic problem. We believe that the new EDP is also hard in GGH13, but we cannot reduce it to some classical hard problems. Some further consideration to EDP is given in Section 5.4.2 to improve the secure confidence.
5.2. Construction
The concrete construction is parameterized by the security parameter . Based on it, we generate an instance of the GGH13 with multi-linearity level . We will use the symbol to denote the level-1 encoding of for simplicity. The notation for the circuit on OWES is defined similarly as that in Section 4.1. The concrete scheme is disigned below.
Instance Generation:.
- Take as input the security parameter , and generate the 1-GES. It has the following parameters: ; re-randomization parameters , ; the zero testing parameter .
- Choose a random element .
- Choose a random element , and compute .
- Define and publish them.
Even though and are not published explicitly, GGH13 provides a sampling level-zero encoding procedure to sample an element in uniformly at random (choose d from , obey the uniform distribution in ). Since the encoding parameters are published explicitly, is also known by users. However, users may not know the particular representative of an element in (like a “short” representative). helps to check whether two elements in are identical. After the instance generation procedure is executed, a self-bilinear map e is defined as
Encode: .
- Compute , where .
- Generate the corresponding auxiliary information .
Addition: .
- Compute directly.
- Generate the auxiliary information as .
Self-bilinear Map: .
Run the circuit to compute .
We also need the additional procedure isZero to check whether a element is an encoding of .
.
Output 1 if , otherwise output 0.
5.3. Setting the Parameters
The setting of parameters should satisfy the basic requirements of GGH13.
- To sample the , set , should be larger than the smoothing parameter (). As a result, the size of g is bounded with .
- To sample and level-0 elements, set . Then, these elements are bounded by . GGH states that the numerator in y and the are bounded by .
- To sample , set . As a result, the numerator is bounded by .
- The value of the k-multilinear map of k encodings is essentially the product of one level-1 encoding and plaintext. Hence, the numerate of this final encoding is bounded by .
- To obtain -level security against lattice attacks, the dimension n should be roughly fixed so that , which means that .
- Finally, m should be larger than . is enough.
5.4. Security Analysis of the Concrete Construction
The proof of the hard assumption in the concrete construction directly follows that of the generic construction with minor differences, so we omitted it here. In this section, we discussed the algorithm proposed by Hu et al. which almost totally solves the k-MDDH problem in GGH13 GES. We state that Hu’s algorithm does not threaten our scheme. Then, we try to analyze the hardness of the concrete EDP in GGH13.
5.4.1. Modified Encoding/Decoding Attack
Hu et al. provided the modified encoding/decoding algorithm to solve the k-MDDHP [29] in the advanced multilinear map GGHLite [41]. If we use to denote the level-k encoding of , is an instance of the k-MDDHP, then the attack procedure works as follows.
- Use the weak-DL attack to generate the level-0 encoding of level-1 encoding . Note, that is not a short element.
- Multiply these level-0 encodings together to obtain the level-0 encoding .
- Use the modified encoding/decoding procedure to obtain the parameter that is functionally the same as .
- Compare the high order bits of T and . If they are the same, output 1, otherwise, output 0.
If T is computed from , this procedure will output 1 with overwhelming probability. Even though the algorithm of Hu et al. can solve the MDDH problem, it does not threaten our scheme.
The attacking algorithm requires some intermediate parameters. These parameters are called special decodings that are obtained as below.
where , . y=. The exponent of y brings a limitation to this procedure. If , or will be smaller than 0. On one hand, since some elements in the ring are not invertible, can not always be computed. On the other hand, if is invertible in , the invert operations cannot ensure that the coefficient of is smaller than q. The “mod q” operation couldn’t be omitted on the right sides of the equations above. So, the attacking procedure can only solve the k-MDDHP, for .
Our self-bilinear map scheme adopts the level-1 encoding of the GGH13. The parameter , which means “Modified Encoding/Decoding Attack” does not threaten our self-bilinear map.
5.4.2. Further Consideration for EDP
We discuss the hardness of EDP in the concrete OWES. An instance of EDP in the concrete OWES is denoted as . Assume that , , A, B are elements in . Every element in is invertible because is the prime ideal of R and is a finite set. Since is public, the adversary could try to solve EDP as follows.
- Divide by in R.
- Divide by in .
- Find short enough , and compute . is a valid level-1 encoding of B.
Case 1.
We cannot conduct the division in R directly, since the Euclidean algorithm is defined in . Elements in R can be regarded as polynomials with degree less than n. Thus, divide can be written as
is an element in I. It can be written as a polynomial , where . Since is a random polynomial, a degree smaller than n and generates a prime ideal for R, and in with high probability. Thus, is not an element in R and the first method cannot output the right answer for EDP.
Case 2.
Computing has a similar problem.
Case 3.
If the short is found, attack method 3 truly can solve EDP. We discuss the hardness of finding .
We use f to denote the polynomial for simplicity. The element in R can be written as , where . The element in can be written as , where . It can also be written as
where . Note, that (1) is a polynomial . This fact tells us, the element in can be written as , and is a representative of .
Thus, to find an element is equivalent to find polynomials such that
where f is a public parameter, g is a secret parameter, but GGH13 states that a not short representation could be recovered. Equation (2) has three variables, thus to find a random element is easy. But it is hard to output the with small coefficients.
Of cause adversaries can fix a short and find random s, t that satisfies Equation (1). But Equation (1) has solutions if and only if the fixed is a representative of . The probability and should be an exponential function of the secure parameter (otherwise, the analog of the discrete logarithmic problem is easy in GGH13). So, the probability of finding the short in case 3 is negligible.
As a result, the EDP seems difficult in the OWES constructed from GGH13.
6. Conclusions
We described a new notion called a One Way Encoding System (OWES). By making use of the indistinguishability obfuscation, we construct a self-bilinear map over the OWES. The EBCDHP is proved to be hard if the EDP is hard. We also discussed that a graded encoding system like GGH can be used to construct OWES. After that, a concrete construction from the GGH13 encoding system is proposed. To increase confidence in security, we give a simple analysis of EDP in the concrete OWES.
Author Contributions
Conceptualization, H.Z., T.H. and F.Z.; methodology, H.Z., F.Z., B.W. and Y.D; validation, T.H., F.Z. and B.W.; formal analysis, H.Z., T.H., F.Z. and Y.D.; writing—original draft preparation, H.Z., T.H., F.Z. and Y.D.; writing—review and editing, H.Z., T.H., F.Z., B.W. and Y.D.; supervision, F.Z., Y.D. and B.W. All authors have read and agreed to the published version of the manuscript.
Funding
This research was funded by “the Natural Science Foundation of Hunan Province grant number 2023JJ40054”, “the Guangdong Basic and Applied Basic Research Foundation grant number 2022A1515011512” and “the scholarship under the State Scholarship Fund of China Scholarship Council grant number 202208430100”.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
Data are contained within the article.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Boneh, D.; Franklin, M. Identity-based encryption from the Weil pairing. In Advances in Cryptology–CRYPTO 2001; Springer: Berlin/Heidelberg, Germany, 2001; pp. 213–229. [Google Scholar]
- Lee, K.; Park, J.H.; Lee, D.H. Anonymous HIBE with short ciphertexts: Full security in prime order groups. Des. Codes Cryptogr. 2015, 74, 395–425. [Google Scholar] [CrossRef]
- Clark, J.; van Oorschot, P.; Ruoti, S.; Seamons, K.; Zappala, D. SoK: Securing Email—A Stakeholder-Based Analysis. In Financial Cryptography and Data Security; Springer: Berlin/Heidelberg, Germany, 2021. [Google Scholar]
- Groth, J.; Ostrovsky, R.; Sahai, A. Perfect non-interactive zero knowledge for NP. In Advances in Cryptology–EUROCRYPT 2006; Springer: Berlin/Heidelberg, Germany, 2006; pp. 339–358. [Google Scholar]
- Mahapatra, S.; Wooldridge, T.; Wang, X. A Post-quantum Zero-Knowledge Proof System Using Quantum Information Theory. In Proceedings of the Seventh International Congress on Information and Communication Technology, London, UK, 21–24 February 2022; Springer: Berlin/Heidelberg, Germany, 2023. [Google Scholar]
- Eli, B.; Brent, W.; David, J. Batch Arguments to NIZKs from One-Way Functions. Technical Report, Cryptology ePrint Archive, Report 2023/1938, 2023. Available online: https://eprint.iacr.org/2023/1938 (accessed on 23 December 2023).
- Badrinarayanan, S.; Patranabis, S.; Sarkar, P. Statistical Security in Two-Party Computation Revisited. In Theory of Cryptography; Springer: Berlin/Heidelberg, Germany, 2022. [Google Scholar]
- Singh, N.; Dayama, P.; Pandit, V. Zero Knowledge Proofs Towards Verifiable Decentralized AI Pipelines. In Financial Cryptography and Data Security; Springer: Berlin/Heidelberg, Germany, 2022. [Google Scholar]
- Cascudo, I.; Giunta, E. On Interactive Oracle Proofs for Boolean R1CS Statements. In Financial Cryptography and Data Security; Springer: Berlin/Heidelberg, Germany, 2022. [Google Scholar]
- Sahai, A.; Waters, B. Fuzzy Identity-Based Encryption. In Advances in Cryptology–EUROCRYPT 2005; Springer: Berlin/Heidelberg, Germany, 2005; pp. 457–473. [Google Scholar]
- Boneh, D.; Lynn, B.; Shacham, H. Short signatures from the Weil pairing. In Advances in Cryptology ASIACRYPT 2001; Springer: Berlin/Heidelberg, Germany, 2001; pp. 514–532. [Google Scholar]
- Zhang, F.; Safavi-Naini, R.; Susilo, W. An efficient signature scheme from bilinear pairings and its applications. In Public Key Cryptography–PKC 2004; Springer: Berlin/Heidelberg, Germany, 2004; pp. 277–290. [Google Scholar]
- Chatzigiannis, P.; Baldimtsi, F.; Chalkias, K. SoK: Blockchain Light Clients. In Financial Cryptography and Data Security; Springer: Berlin/Heidelberg, Germany, 2022. [Google Scholar]
- Vesely, P.E.A. Plumo: An Ultralight Blockchain Client. In Financial Cryptography and Data Security; Springer: Berlin/Heidelberg, Germany, 2022. [Google Scholar]
- Abdelhaliem, B. A Signature Scheme from Full-Distance Syndrome Decoding. Technical Report, Cryptology ePrint Archive, Report 2023/1956, 2023. Available online: https://eprint.iacr.org/2023/1956 (accessed on 24 December 2023).
- Boneh, D.; Silverberg, A. Applications of multilinear forms to cryptography. Contemp. Math. 2003, 324, 71–90. [Google Scholar]
- Garg, S.; Gentry, C.; Halevi, S. Candidate Multilinear Maps from Ideal Lattices. In Advances in Cryptology–EUROCRYPT 2013; Springer: Berlin/Heidelberg, Germany, 2013; Volume 7881, pp. 1–17. [Google Scholar]
- Coron, J.S.; Lepoint, T.; Tibouchi, M. Practical multilinear maps over the integers. In Advances in Cryptology–CRYPTO 2013; Springer: Berlin/Heidelberg, Germany, 2013; pp. 476–493. [Google Scholar]
- Gentry, C.; Gorbunov, S.; Halevi, S. Graph-induced multilinear maps from lattices. In Theory of Cryptography; Springer: Berlin/Heidelberg, Germany, 2015; pp. 498–527. [Google Scholar]
- Garg, S.; Gentry, C.; Sahai, A.; Waters, B. Witness encryption and its applications. In Proceedings of the Forty-Fifth Annual ACM Symposium on Theory of Computing, Palo Alto, CA, USA, 2–4 June 2013; ACM: New York, NY, USA, 2013; pp. 467–476. [Google Scholar]
- Baghery, K.; Kohlweiss, M.; Siim, J.; Volkhov, M. Another Look at Extraction and Randomization of Groth’s zk-SNARK. In Financial Cryptography and Data Security; Springer: Berlin/Heidelberg, Germany, 2021. [Google Scholar]
- Garg, S.; Gentry, C.; Halevi, S.; Raykova, M.; Sahai, A.; Waters, B. Candidate indistinguishability obfuscation and functional encryption for all circuits. In Proceedings of the 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, Berkeley, CA, USA, 26–29 October 2019; IEEE: New York, NY, USA, 2013; pp. 40–49. [Google Scholar]
- Cheon, J.H.; Han, K.; Lee, C.; Ryu, H.; Stehlé, D. Cryptanalysis of the multilinear map over the integers. In Advances in Cryptology–EUROCRYPT 2015; Springer: Berlin/Heidelberg, Germany, 2015; pp. 3–12. [Google Scholar]
- Garg, S.; Gentry, C.; Halevi, S.; Zhandry, M. Fully Secure Functional Encryption without Obfuscation. Technical Report, Cryptology ePrint Archive, Report 2014/666. 2014. Available online: https://eprint.iacr.org/2014/666 (accessed on 28 August 2014).
- Boneh, D.; Wu, D.J.; Zimmerman, J. Immunizing Multilinear Maps Against Zeroizing Attacks. Technical Report, Cryptology ePrint Archive, Report 2014/930, 2014. Available online: https://eprint.iacr.org/2014/930 (accessed on 13 November 2014).
- Coron, J.S.; Lepoint, T.; Tibouchi, M. Cryptanalysis of two candidate fixes of multilinear maps over the integers. Technical Report, Cryptology ePrint Archive, Report 2014/975, 2014. Available online: https://eprint.iacr.org/2014/975 (accessed on 1 December 2014).
- Coron, J.S.; Lepoint, T.; Tibouchi, M. New Multilinear Maps over the Integers. In Proceedings of the Annual Cryptology Conference, Santa Barbara, CA, USA, 16–20 August 2015; Springer: Berlin/Heidelberg, Germany, 2015; pp. 267–286. [Google Scholar]
- Cheon, J.H.; Fouque, P.A.; Lee, C.; Minaud, B.; Ryu, H. Cryptanalysis of the new clt multilinear map over the integers. In Advances in Cryptology EUROCRYPT 2016; Springer: Berlin/Heidelberg, Germany, 2016; pp. 509–536. [Google Scholar]
- Hu, Y.; Jia, H. Cryptanalysis of GGH Map. In Advances in Cryptology–EUROCRYPT 2016; Springer: Berlin/Heidelberg, Germany, 2016. [Google Scholar]
- Jia, H.; Hu, Y. Cryptanalysis of multilinear maps from ideal lattices: Revisited. Des. Codes Cryptogr. 2016, 84, 311–324. [Google Scholar] [CrossRef]
- Brakerski, Z.; Rothblum, G.N. Virtual black-box obfuscation for all circuits via generic graded encoding. In Theory of Cryptography; Springer: Berlin/Heidelberg, Germany, 2014; pp. 1–25. [Google Scholar]
- Barak, B.; Garg, S.; Kalai, Y.T.; Paneth, O.; Sahai, A. Protecting obfuscation against algebraic attacks. In Advances in Cryptology–EUROCRYPT 2014; Springer: Berlin/Heidelberg, Germany, 2014; pp. 221–238. [Google Scholar]
- Pass, R.; Seth, K.; Telang, S. Indistinguishability obfuscation from semantically-secure multilinear encodings. In Advances in Cryptology–CRYPTO 2014; Springer: Berlin/Heidelberg, Germany, 2014; pp. 500–517. [Google Scholar]
- Ananth, P.; Gupta, D.; Ishai, Y.; Sahai, A. Optimizing Obfuscation: Avoiding Barrington’s Theorem. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, 3–7 November 2014; ACM: New York, NY, USA, 2014; pp. 646–658. [Google Scholar]
- Miles, E.; Sahai, A.; Weiss, M. Protecting obfuscation against arithmetic attacks. Technical Report, Cryptology ePrint Archive, Report 2014/878, 2014. Available online: https://eprint.iacr.org/2014/878 (accessed on 28 October 2014).
- Badrinarayanan, S.; Miles, E.; Sahai, A.; Zhandry, M. Post-Zeroizing Obfuscation: The case of Evasive Circuits. Technical Report, Cryptology ePrint Archive, Report 2015/167, 2015. Available online: https://eprint.iacr.org/2015/167 (accessed on 27 February 2015).
- Lee, H.S. A self-pairing map and its applications to cryptography. Appl. Math. Comput. 2004, 151, 671–678. [Google Scholar] [CrossRef]
- Cheon, J.H.; Lee, D.H. A note on self-bilinear maps. Korean Math. Soc. 2009, 46, 303–309. [Google Scholar] [CrossRef]
- Yamakawa, T.; Yamada, S.; Hanaoka, G.; Kunihiro, N. Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications. In Advances in Cryptology–CRYPTO 2014; Springer: Berlin/Heidelberg, Germany, 2014; Volume 8617, pp. 90–107. [Google Scholar]
- Goldreich, O.; Levin, L.A. A hard-core predicate for all one-way functions. In Proceedings of the Twenty-First Annual ACM Symposium on Theory of Computing, Seattle, WA, USA, 14–17 May 1989; ACM: New York, NY, USA, 1989; pp. 25–32. [Google Scholar]
- Langlois, A.; Stehlé, D.; Steinfeld, R. GGHLite: More efficient multilinear maps from ideal lattices. In Advances in Cryptology–EUROCRYPT 2014; Springer: Berlin/Heidelberg, Germany, 2014; pp. 239–256. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).