CryptoDB
Eliana Carozza
Publications
Year
Venue
Title
2024
ASIACRYPT
Faster Signatures from MPC-in-the-Head
Abstract
We revisit the construction of signature schemes using the
MPC-in-the-head paradigm. We obtain two main contributions:
– We observe that previous signatures in the MPC-in-the-head paradigm
must rely on a salted version of the GGM puncturable pseudoran-
dom function (PPRF) to avoid collision attacks. We design a new
efficient PPRF construction that is provably secure in the multi-
instance setting. The security analysis of our PPRF, in the ideal
cipher model, is quite involved and forms a core technical contri-
bution of our work. While previous constructions had to rely on a
hash function, our construction uses only a fixed-key block cipher
and is considerably more efficient as a result: we observe a 12× to
55× speed improvement for a recent signature scheme (Joux and
Huth, Crypto’24). Our improved PPRF can be used to speed up
many MPC-in-the-head signatures.
– We introduce a new signature scheme from the regular syndrome
decoding assumption, based on a new protocol for the MPC-in-
the-head paradigm, which significantly reduces communication com-
pared to previous works. Our scheme is conceptually simple, though
its security analysis requires a delicate and nontrivial combinatorial
analysis.
2023
EUROCRYPT
Short Signatures from Regular Syndrome Decoding in the Head
Abstract
We introduce a new candidate post-quantum digital signature scheme from the regular syndrome decoding (RSD) assumption, an established variant of the syndrome decoding assumption which asserts that it is hard to find w-regular solutions to systems of linear equations over F_2 (a vector is regular if it is a concatenation of w unit vectors). Our signature is obtained by introducing and compiling a new 5-round zero-knowledge proof system constructed using the MPC-in-the-head paradigm. At the heart of our result is an efficient MPC protocol in the preprocessing model that checks correctness of a regular syndrome decoding instance by using a share ring-conversion mechanism.
The analysis of our construction is non-trivial and forms a core technical contribution of our work. It requires careful combinatorial analysis and combines several new ideas, such as analyzing soundness in a relaxed setting where a cheating prover is allowed to use any witness *sufficiently close* to a regular vector. We complement our analysis with an in-depth overview of existing attacks against RSD.
Our signatures are competitive with the best-known code-based signatures, ranging from 12.52 KB (fast setting, with signing time of the order of a few milliseconds on a single core of a standard laptop) to about 9 KB (short setting, with estimated signing time of the order of 15ms).
Coauthors
- Dung Bui (1)
- Eliana Carozza (2)
- Geoffroy Couteau (2)
- Dahmun Goudarzi (1)
- Antoine Joux (2)