Recent work on pairing inversion

A few days ago (April 10, 2019) Takakazu Satoh posted on eprint the paper Miller Inversion is Easy for the Reduced Tate Pairing on Trace Zero Supersingular Curves on eprint. I was delighted to hear from Takakazu Satoh, as I know him well but I had not heard from him for several years. Satoh’s papers have a distinctive look, since he uses his own typesetting package that he wrote in the 1980s before TeX was widely available.

Takakazu Satoh has been interested in pairing inversion for quite a while, and has published several papers on the topic, including “On Degrees of Polynomial Interpolations Related to Elliptic Curve Cryptography” (WCC 2005), “On Pairing Inversion Problems” (Pairing 2007), and “Closed formulae for the Weil pairing inversion” (Finite Fields and Their Applications 2008).

To recall basic definitions: Let E be an ellptic curve over a field \mathbb{F}_q. Let \ell be a large prime such that \ell \mid \#E( \mathbb{F}_q ). The embedding degree is the smallest integer k such that \ell \mid (q^k  - 1). A pairing-friendly elliptic curve is one whose embedding degree is small, e.g., 2 \le k \le 30.

The (reduced) Tate-Lichtenbaum pairing takes two points P, Q \in E[ \ell ] and gives a value e_\ell( P, Q ) \in \mathbb{F}_{q^k}. A lot of researchers, including me and many of my friends, worked between 2000 and 2010 trying to compute pairings faster. The computation of the reduced Tate-Lichtenbaum pairing has two stages. First one computes a Miller function f_{\ell, P}(Q). The function f_{\ell, P} has divisor
\ell(P) - (\ell P ) - (\ell -1)(\infty).
Then one computes the final exponentiation, which is an exponentiation to the power (q^k - 1)/\ell.

It was discovered that, for many pairing-friendly curves, there was a more efficient way to compute the Miller function. Essentially instead of computing f_{\ell, P} one can compute values like f_{q, P}(Q), which is a simpler computation when \ell > q, which is usually the case. This observation was first made in a special case in a paper of Duursma and Lee from ASIACRYPT 2003. Further special cases were noted by Kwon (ACISP 2005) and Barreto, Galbraith, O hEigeartaigh and Scott (Designs, Codes and Cryptography, 2007). The situation was finally clarified by Granger, Hess, Oyono, Thériault and Vercauteren (“Ate Pairing on Hyperelliptic Curves”, EUROCRYPT 2007). The key idea is to work with Frobenius eigenspaces and change the pairing to f_{q,Q}(P). I call this paper GHOTV below. Subsequently, Hess (“Pairing Lattices”, Pairing 2008) and Vercauteren (“Optimal pairings”, IEEE Trans. Information Theory 2010) showed how to use this idea most effectively in general pairing implementations.

One particular feature of the ate pairing introduced in GHOTV, is that the pairing computation only needs the first stage (Miller’s algorithm) and does not require a final exponentiation. This makes it a lot faster to compute. The ate pairing is not the exact same function as the reduced Tate-Lichtenbaum pairing, so one cannot use them interchangeably. But they are both bilinear maps and so a system can be implemented using the ate pairing and it all works fine.

In those days, we thought pairings would be useful for identity-based crypto and short signatures, and we were mostly trying to work with large embedding degrees like k = 12. So the case k = 2 was considered of relatively minor interest and was not studied much.

The computational assumptions underlying pairing-based crypto all required pairing inversion to be hard. Typically pairing inversion means: Given z \in \mathbb{F}_{q^k} and a point P \in E[\ell] to find Q \in E[ \ell ] such that e_\ell(P, Q) = z.

It was quickly realised that there are two obstacles to pairing inversion: First it is necessary to invert the final exponentiation. Second one needs to invert the Miller function. It turned out that sometimes one or the other of these problems could be easy, but I know no situation for prime order groups where both are easy at the same time. For example, since the ate pairing does not require a final exponentiation, pairing inversion for the ate pairing is equivalent to Miller inversion (which seems to be hard in this case). In short, pairing inversion remains a hard computational problem, which is good news for pairing-based crypto. A good reference for these ideas is Galbraith, Hess, Vercauteren (“Aspects of Pairing Inversion”, IEEE Trans. Information Theory 2008).

Satoh’s recent paper explores the case k = 2. Work on discrete logs in finite fields (e.g., see these blog posts has caused some pairing researchers to become very conservative and reconsider choices such as k = 2. When k = 2 we essentially have \ell = q+1 and the final exponentiation is to the power (q^2-1)/(q+1) = q-1. The reduced Tate-Lichtenbaum pairing is
f_{q+1, Q}(P)^{q-1}.
Satoh uses Lemma 2 of GHOTV, that f_{q, Q}(P) \in \mathbb{F}_{q^2} already has order q+1. This is the fact that the ate pairing does not require a final exponentiation. Let v = f_{q+1, Q}(P) be the value computed by Miller’s algorithm, so that v^{q-1} is the pairing value. Suppose one has the value v (this is not normally the case, normally the attacker has v^{q-1}, from which there are q-1 possible values for v). Since f_{q+1, Q}(P) = (x(P) - x(Q)) f_{q,Q}(P) (I am using different notation to Satoh here) it means that an attacker can get their hands on P by raising v to the power q+1, remembering that exponentiation to the power q is linear, and hence solving a square-root to get x(P). Hence, Satoh has shown that Miller inversion is easy in this case, but pairing inversion is still hard.

In fact, when k = 2 it would be quite natural to instead use the ate pairing for any crypto application. Now there is no final exponentiation. However Satoh’s attack does not work since his approach is precisely to kill off the “ate pairing” contribution to the Tate-Lichtenbaum pairing.

In short, there are two pairings one can use in embedding degree 2 and both seem to be hard to invert: the ate pairing has trivial final exponentiation but the Miller function seems hard to invert; the Tate-Lichtenbaum pairing has easy Miller inversion (as Satoh has just shown) but it seems hard to invert the final exponentiation.

I end with a comment about applications of pairings. As I mentioned, 15 years ago we thought that the “killer applications” for pairings were identity-based crypto and short signatures. Nowadays it seems pairings are most useful for short zero knowledge proofs. For example, Jens Groth’s pairing-based zk-SNARK (zero-knowledge succinct non-interactive argument of knowledge) is a key component of Zcash. As far as I can tell, the implementation in Zcash uses curves with embedding degree k=12 and does use the ate pairing.

— Steven Galbraith

Advertisements
Posted in Uncategorized | Leave a comment

AMS Sectional Meeting Special Session on The Mathematics of Cryptography

The American Mathematical Society Spring Central and Western Joint Sectional
Meeting was held at the University of Hawaii at Manoa, in Honolulu during March 22-24, 2019.

There was a Special Session on The Mathematics of Cryptography organised by Shahed Sharif and Alice Silverberg. Slides of (some of) the talks are available here.

Among the talks I attended, I mention these:

  • Isogeny cryptography: strengths, weaknesses and challenges, by Steven Galbraith.

    I talked about CSIDH and SeaSign, and then said a little bit about some work of my PhD student Yan Bo Ti on hash functions from dimension 2 supersingular abelian varieties. The slides online also cover some other topics that I did not mention (Kuperberg’s algorithm and quaternion algebras).

  • Identity-Based Encryption from the Diffie-Hellman Assumption by Sanjam Garg.

    This was a really nice talk that described a “hash encryption” scheme based on the (decisional) Diffie-Hellman problem and explained how this enables identity-based encryption from the Diffie-Hellman problem (no pairings needed). This is joint work with Nico Döttling. The schemes are not practical.

  • Ramanujan Graphs In Cryptography by Kristin Lauter.

    Kristin reported joint work with Anamaria Costache, Brooke Feigon, Maike Massierer and Anna Puskas about some computational problems in isogeny graphs. A paper on this work is eprint 2018/593.

  • Numerical Method for Comparison on Homomorphically Encrypted Numbers by Jung Hee Cheon.

    Jung Hee talked about some basic mathematical functions (such as max and min) that are useful for practical computations on encrypted data. He explained some iterated processes (in his words “nowadays I am working in numerical analysis”) that give low-depth circuits to compute approximations to these functions.

  • Multiparty Non-Interactive Key Exchange From Isogenies on Elliptic Curves by Shahed Sharif.

    Shahed talked (on the blackboard — there are no slides) about his paper eprint 2018/665 with Dan Boneh, Darren Glass, Daniel Krashen, Kristin Lauter, Alice Silverberg, Mehdi Tibouchi and Mark Zhandry. The scheme is still incomplete as no suitable efficiently computable isomorphism invariant of abelian varieties has been found. Shahed discussed attempts to find such invariant, and I learned some interesting facts about polarizations on abelian surfaces.

  • The Hidden Quadratic Form Problem by Joseph Silverman.

    Joe presented joint work with Jeff Hoffstein and others on a new candidate number-theoretical problem that might be interesting for new signature schemes. This is a work-in-progress and is not published yet.

  • Isolated Curves and Cryptography by Travis Scholl.

    Travis presented his papers eprint 2017/383, eprint 2018/307 and some newer work on “isolated curves”.

  • Fun with the hidden number problem by Nadia Heninger.

    Nadia surveyed her joint work with Breitner, published as “Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies”. Her talk also included an overview of lattice algorithms for the hidden number problem, and a very clear sketch of Bleichenbacher’s approach using Fourier analysis to the hidden number problem.

  • Short digital signatures via isomorphisms between modular lattices based on finite field isomorphisms by Jeffrey Hoffstein.

    Jeff presented very new joint work with Joe Silverman on yet another number-theoretical problem that might be interesting for new signature schemes. This is related to their previous work on isomorphisms of finite fields, but with new ideas and applications. I was not able to follow the details of the talk. There is no preprint yet on this work.

  • Computing isogenies and endomorphism rings of supersingular elliptic curves by Travis Morrison.

    Travis gave an overview of his EUROCRYPT 2018 paper with Eisentraeger, Hallgren, Lauter and Petit.

  • Lower bounds for Hilbert class polynomials by Reinier Broker.

    Much work on algorithms to compute Hilbert class polynomials requires proving good upper bounds on the size (e.g., bitlength) of these polynomials. Reinier spoke about his current work-in-progress trying to prove lower bounds on the size of these polynomials.

There was also a Special Session on Emerging Connections with Number Theory organised by Kate Stange and Renate Scheidler, plus a lot of other sessions, that included talks of some interest to readers of this blog. However, I stayed in the Mathematics of Cryptography room.

— Steven Galbraith

Posted in Uncategorized | Leave a comment

Accepted papers to Eurocrypt, PQ Crypto and PKC 2019

The Eurocrypt 2019 program features a lot of interesting papers. There are two papers relevant to isogeny crypto:

  • Daniel J. Bernstein, Tanja Lange, Chloe Martindale and Lorenz Panny. Quantum Circuits for the CSIDH: Optimizing Quantum Evaluation of Isogenies.
  • Luca De Feo and Steven Galbraith. SeaSign: Compact Isogeny Signatures from Class Group Actions.

The PQ Crypto 2019 program features three papers on isogeny crypto:

  • Thomas Decru, Lorenz Panny and Frederik Vercauteren. Faster SeaSign signatures through improved rejection sampling.
  • E.V. Flynn and Yan Bo Ti. Genus Two Isogeny Cryptography.
  • Michael Meyer, Fabio Campos and Steffen Reith. On Lions and Elligators: An efficient constant-time implementation of CSIDH.

The PKC 2019 program includes the paper:

  • Steven D. Galbraith, Jake Massimo and Kenneth G. Paterson. Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation.

    This paper shows how to construct elliptic curves whose group order is a composite that passes some primality tests with moderate probability. The paper explains why this has implications in some Diffie-Hellman settings.

(Apologies for the self-promotion.)

— Steven Galbraith

Posted in Uncategorized | Leave a comment

Blog post on CSIDH and video of talk

Wouter Castryck has written a blog post to explain CSIDH: Post-quantum key exchange using isogeny-based group actions.

You can watch the Habilitation thesis talk by Luca de Feo on Exploring isogeny graphs.

— Steven Galbraith

Posted in Uncategorized | Leave a comment

Asiacrypt 2018

Asiacrypt 2018 was held at QUT in Brisbane, Australia on December 2-6, 2018. It was wonderfully organised by Josef Pieprzyk.

The three plenary invited speakers were:

  • Mitsuru Matsui (Mitsubishi) “25 Years of linear cryptanalysis – Early History and Path Search Algorithm”

    Professor Matsui was the 2018 IACR Distinguished Lecturer. The talk reviewed the history and development of linear cryptanalysis.

  • Melissa Chase (Microsoft) “Picnic: Postquantum signatures from zero-knowledge proofs”

    Melissa gave an overview of the Picnic signature scheme, which beautifully combines ideas from multiparty computation and zero knowledge proofs, together with block ciphers and hash functions with low circuit complexity.

  • Vanessa Teague (Melbourne) “Democracy, security and evidence: Let’s have all three”

    Vanessa gave an overview of online voting schemes, including a detailed discussion of some real-world examples. The main focus of her talk was the problem of verifiable electronic voting.

The most relevant session for this blog was the session on isogeny crypto on the final morning. There were three talks:

  • Jean Kieffer “Towards practical key exchange from ordinary isogeny graphs” (joint work with Luca De Feo and Benjamin Smith)

    The talk presented an implementation of Couveignes’ hard homogeneous spaces concept with ordinary elliptic curves.

  • Lorenz Panny “CSIDH: An efficient post-quantum commutative group action” (joint work with Wouter Castryck, Tanja Lange, Chloe Martindale and Joost Renes)

    Building on work in the previous talk, the talk explained an implementation of Couveignes’ hard homogeneous spaces concept with supersingular elliptic curves. Using supersingular curves gives a massive performance improvement over the previous talk. Group actions like these have some advantages over SIDH, but are still slower.

  • Craig Costello “Computing supersingular isogenies on Kummer surfaces”

    The talk explained how to compute (chains of) 2-isogenies on an elliptic curve efficiently by converting them to (chains of) (2,2)-isogenies on the Kummer surface of the Weil restriction of the the elliptic curve.

There were also a number of accepted papers that used pairing-based crypto. To mention two of them: “Compact Multi-Signatures for Smaller Blockchains” by Dan Boneh, Manu Drijvers and Gregory Neven; “Unbounded Inner Product Functional Encryption from Bilinear Maps” by Junichi Tomida and Katsuyuki Takashima.

The Rump Session was superbly and irreverently chaired by Craig Costello, Leo Ducas and Pierre Karpman. One of the interventions perpetrated on the unsuspecting speakers was the introduction of humourous comments on their slides. But the major highlight of the rump session was the launch of the game “Cards against Cryptography”. It is a version of the famous card game “Cards against Humanity”, and has been designed by three anonymous cryptographers (not the rump session chairs). You can find out more by following @CrdsAgnstCrypto on twitter. A copy of this highly collectible and desirable game was awarded to each of the five best rump session talks. To buy extra time, speakers were invited to eat a spoonful of vegemite, or drink a beer. Another highlight of the rump session included the song “Gotta Break Em All” (about the NIST PQ Crypto competition) written by Leo Ducas and his partner Jessica, and performed by Peter Schwabe (on guitar), Chloe Martindale, Lejla Batina, Marcel Keller, Leo and Jessica.

Serious rump session talks included: Bart Preneel on how to steal a Tesla car; Suhri Kim on curve equations for isogenies; Daniel Bernstein on quantum circuits for class group actions (relevant for the analysis of Kuperberg’s algorithm as an attack on CSIDH); Chloe Martindale on choosing appropriate pairings for current security levels; Lorenz Panny on speeding up SeaSign isogeny signatures.

A small group of Asiacrypt attendees then flew to Adelaide for Kangacrypt. The workshop was mostly about cryptanalysis, especially fault attacks and side-channel attacks. But I did give (naturally enough) a talk about Kangaroos (ie., the Pollard kangaroo method for discrete logs and why it doesn’t work for isogenies).

— Steven Galbraith

Posted in Uncategorized | Leave a comment

ECC 2018, Osaka, Japan

As announced earlier on this blog, the 22nd Workshop on Elliptic Curve Cryptography took place at Osaka University, Japan, from November 19 to 21. This edition featured invited talks across a broad range of topics, from quantum information theory to homomorphic encryption to blockchains. As for elliptic curves specifically, the highlight was clearly isogeny-based crypto, explored in four different talks:

* David Jao discussed a number of techniques (from various authors) to achieve faster embedded implementations of SIDH, both in software using either vector instructions (like ARM NEON) or dedicated coprocessors, and on reconfigurable hardware. The talk was presented as a response to a recent paper by Koppermann et al. which had rather pessimistic conclusions regarding the usability of SIDH on smaller devices, mentioning 18 seconds as its headline timing for key exchange on 32-bit microcontrollers. David Jao argued that suitably optimized implementations could in fact do much better.

* Travis Morrison discussed some of his recent results (joint work with Eisenträger, Hallgren, Lauter and Petit) regarding the relationship between two computational problems connected to supersingular elliptic curves, namely pathfinding in the \ell-isogeny graph of supersingular elliptic curves over some \mathbb{F}_{p^2} (with \ell = O(\log p)) and the problem of computing the endomorphism ring of a supersingular elliptic curve. The main takeaway is that, assuming some heuristics, the two problems are polynomial-time equivalent.

* Chloe Martindale gave an excellent introduction to CSIDH (joint work with Wouter Castryck, Tanja Lange, Lorenz Panny and Joost Renes), which is a new instantiation of Couveignes-style hard homogeneous spaces using isogenies of supersingular elliptic curves over \mathbb{F}_p (as opposed to \mathbb{F}_{p^2}), which satisfy that the ring of rational endomorphisms is commutative. This provides a nice group action similar to the case of ordinary curves, but makes it possible to choose parameters in such a way that \ell-isogenies for many small primes \ell can be computed efficiently. This leads to a variant of the Couveignes-Rostovtsev-Stolbunov key exchange protocol that outperforms the original one by many orders of magnitude, achieving performance on the order of a few dozen milliseconds per key exchange.

* Finally, Katsuyuki Takashima discussed new isogeny-based authenticated key exchange protocols (joint work with Atsushi Fujioka and Kazuki Yoneyama). He showed how to obtain a one-round authenticated key exchange protocol using commutative group actions on isogeny graph. Assuming the existence of n-way cryptographic invariant maps, as suggested by Boneh et al., the protocol can be instantiated for an arbitrary number of parties. Unfortunately, it is not yet known how to construct such invariant maps (and as one of the culprits, I have to admit that the prospects of constructing them look rather remote). However, the two-party case only relies on Couveignes’s hard homogeneous spaces, and can thus be obtained from CRS or CSIDH.

There were many other excellent talks at the workshop, but some of them were not closely related to elliptic curves and so we don’t discuss them on this blog. Of particular notice besides isogenies was Pierrick Gaudry’s presentation on point counting in higher genus (joint work with Simon Abelard and Pierre-Jean Spaenlehauer). He showed how to compute the zeta function of a hyperelliptic curve of genus g over \mathbb{F}_q in time O_g((\log q)^{O(g)}), greatly improving upon the previous complexity, with an exponent quasi-quadratic in g. He also discussed concrete results for g=3, establishing that the correct complexity was (\log q)^{14} for general hyperelliptic curves, and (\log q)^{6} for Jacobians with real mutiplication. In the latter case, the complexity becomes tractable even for cryptographic sizes, and Pierrick was able to show us the whole zeta function for a curve over \mathbb{F}_p with p=2^{64} - 59.

— Mehdi Tibouchi

Posted in Uncategorized | Leave a comment

Mathematics of Public Key Cryptography textbook free

I have made available for free a corrected version of my book “Mathematics of Public Key Cryptography”. You can access it here. I have fixed all the typos and errors that I was aware of (most of them documented in the errata list), plus I have added two or three new examples and exercises. I thank everyone who found errors or gave feedback on the original version.

Sadly, the book is not updated to discuss new research since 2011. I don’t have time to do that.

— Steven Galbraith

Posted in Uncategorized | Leave a comment