2012 CTRSA Plaintext CheckableEncryption

Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

Plaintext-Checkable Encryption

Sébastien Canard1 , Georg Fuchsbauer2 ,


Aline Gouget3 , and Fabien Laguillaumie4
1
Orange Labs, Applied Crypto Group, Caen, France
2
University of Bristol, Dept. Computer Science, UK
3
Gemalto, Security Lab, Meudon, France
4
UCBN and CNRS/ENSL/INRIA/UCBL LIP, Lyon, France

Abstract. We study the problem of searching on encrypted data, where


the search is performed using a plaintext message or a keyword, rather
than a message-specific trapdoor as done by state-of-the-art schemes.
The use cases include delegation of key-word search e.g. to a cloud data
storage provider or to an email server, using a plaintext message. We de-
fine a new cryptographic primitive called plaintext-checkable encryption
(PCE), which extends public-key encryption by the following functional-
ity: given a plaintext, a ciphertext and a public key, it is universally possi-
ble to check whether the ciphertext encrypts the plaintext under the key.
We provide efficient generic random-oracle constructions for PCE based
on any probabilistic or deterministic encryption scheme; we also give a
practical construction in the standard model. As another application we
show how PCE can be used to improve the efficiency in group signatures
with verifier-local revocation (VLR) and backward unlinkability. These
group signatures provide efficient revocation of group members, which is
a key issue in practical applications.

Keywords: Deterministic/probabilistic encryption, unlinkability, group


signature with VLR and backward unlinkability.

1 Introduction
The problem of searching on data that is encrypted has been studied intensively
and in many different scenarios. For instance, the problem of delegation of key-
word search on private databases to a data storage provider concerns users who
upload their data to a provider they do not fully trust. When the user wants
to delegate keyword search on his own encrypted data to the provider, he usu-
ally has to transmit a corresponding message-dependent trapdoor (or encrypted
keyword) which enables the provider to perform the search. When the databases
are public, the user wishes to delegate the search on public data to a cloud data
storage provider without revealing the plaintext content of the search. Another
setting is the delegation of search to an email gateway [9], where data collected
by the mail server is from third parties (contrary to the private-key setting as
above) and the database is not public.
Most of the constructions proposed in the literature are based either on
symmetric-key cryptography to encrypt the plaintext message or keyword, or

O. Dunkelman (Ed.): CT-RSA 2012, LNCS 7178, pp. 332–348, 2012.



c Springer-Verlag Berlin Heidelberg 2012
Plaintext-Checkable Encryption 333

on searchable encryption without the ability to decrypt the message as done


in [22]. The security of the search process in the state of the art of public-key
encryption constructions has always been studied assuming that the search pro-
cess uses a secret trapdoor and not a plaintext message. In this work we focus
on this latter case, which is naturally related to public-key cryptography. This
case can in practice be very useful when the database contains relations between
different words (a name and a status for example) and it is these relations that
have to be kept secret rather than the words themselves. Thus, when searching
e.g. the number of persons having the status “important illness”, the keyword
“important illness” is not secret and can be directly used to perform the search.
Many functionalities extending the basic setting of public-key encryption have
been considered, in particular related to data search. For example, decryptable
searchable encryption [13] allows someone having a trapdoor corresponding to
a message, to test whether a given ciphertext encrypts this message. Another
example is encryption with equality test, proposed in [23]. Using the equality
test, one can check whether two ciphertexts encrypt the same plaintext.
In this paper we propose and study a new cryptographic primitive we call
plaintext-checkable encryption (PCE). A plaintext-checkable encryption scheme
is a probabilistic public-key encryption scheme with the additional functionality
that anyone can test whether a ciphertext c is the encryption of a given plain-
text message m under a public encryption key pk. Despite this functionality,
we demand that the ciphertext leak as little information as possible about the
plaintext. Of course, a PCE scheme cannot achieve the standard notion of in-
distinguishability under chosen-plaintext attack, as an adversary choosing two
messages and receiving the encryption of one of them can simply test which
message was encrypted. The same holds when the encryption algorithm is deter-
ministic: an adversary can just re-encrypt candidate messages and thus break
classical indistinguishability.
As was done in the case of deterministic encryption [3], we assume that the
plaintexts are drawn from a space of large min-entropy; indistinguishability
means thus the impossibility of distinguishing ciphertexts of messages drawn
from different high min-entropy spaces. We show however that we can achieve
a strictly stronger security notion than indistinguishability for deterministic en-
cryption [3,4]: an adversary is not able to distinguish two encryptions of the same
message from encryptions of different messages. This notion cannot be achieved
by deterministic encryption, since there is only one possible ciphertext per mes-
sage, and encryption with equality check cannot achieve it either. We say that an
encryption scheme satisfies unlinkability if no polynomial-time adversary can win
the following game: a challenger draws two messages from a high min-entropy
space of the adversary’s choice and gives the adversary either encryptions of
the two messages or two encryptions of one message, and the adversary has to
decide which is the case. We relate this notion to the different types of indistin-
guishability, showing e.g. that it is strictly stronger than the indistinguishability
notion for deterministic encryption, and we argue that our notion is sufficient
for our applications. We provide efficient generic constructions of PCE schemes
334 S. Canard et al.

satisfying unlinkability based either on probabilistic or deterministic encryption


with a security proof in the random-oracle model (ROM).1 We also build a prac-
tical construction based on ElGamal encryption, secure in the standard model.
Apart from its immediate applications to searching on encrypted data, PCE
lends itself naturally to improve the efficiency of group signatures with verifier-
local revocation (VLR). Group signatures allow members of a group to sign on
behalf of the group without revealing their individual identity. Group signatures
with VLR were introduced by Boneh and Shacham [10] and allow efficient revo-
cation of group members, which is a key issue in practical applications. In VLR
group signatures the revocation messages only have to be sent to signature veri-
fiers, as opposed to both signers and verifiers in previous schemes. We note that
unlinkability of ciphertexts is precisely the property required by the encryptions
contained in group signatures [8,11]. We show that PCE can be used to encrypt
a user-specific revocation token, like a certificate, which will be part of a group
signature. A group member can then be revoked by publishing the token, as
every verifier can apply the plaintext check to the encrypted token in order to
determine whether it corresponds to a revoked user. Since tokens will be drawn
from a high min-entropy space, two group signatures containing the same token
are unlinkable by the security of the PCE. Our VLR group signature scheme
achieves backward unlinkability and is proven secure in the standard model.
The paper is organized as follows. In Sect. 2 we formally define plaintext-
checkable encryption and we give security definitions and compare them to ex-
isting security notions for public-key encryption. In Sect. 3 we provide generic
constructions of PCE in the random-oracle model based on either deterministic
or probabilistic encryption, while Sect. 4 gives the description of our practi-
cal construction in the standard model. We finally show in Sect. 5 how PCE
can be used to design very practical group signatures with VLR. Due to space
limitations, proofs are omitted but are available in the full version.

2 Plaintext-Checkable Encryption
We define here the notion of plaintext-checkable encryption and its security.

2.1 Definition of Plaintext-Checkable Encryption


Let k ∈ N be a security parameter. A plaintext-checkable encryption scheme
(PCE for short) is composed of the following algorithms (of which the first 3
constitute a public-key encryption scheme).
– KeyGen is a probabilistic algorithm which takes as input 1k and outputs a
key pair (pk, sk) of public and secret key, respectively.
– Encrypt is a probabilistic algorithm which takes as inputs 1k , a public key
pk and a plaintext m ∈ {0, 1}∗ and outputs a ciphertext c.
1
It may be possible to design PCE schemes from any decryptable searchable encryp-
tion scheme by simply publishing trapdoors (one trapdoor per message or, in some
cases, the master trapdoor). However, our constructions are more efficient.
Plaintext-Checkable Encryption 335

– Decrypt is a deterministic algorithm which takes as inputs 1k , a ciphertext


c and a secret key sk and outputs either a plaintext m or ⊥.
– PCheck is a deterministic algorithm which takes as inputs 1k , a ciphertext c,
a public key pk and a putative message m. It outputs 1 if c is an encryption
of m, and 0 otherwise.

These algorithms must verify the following properties of correctness.


Correctness of decryption: ∀k ∈ N and m ∈ {0, 1}∗,
 $ $

Pr (pk, sk) ←
− KeyGen(1k ), c ←
− Encrypt(1k , pk, m) : Decrypt(1k , sk, c) = m = 1.
Correctness of plaintext check (perfect consistency): ∀k ∈ N and m ∈ {0, 1}∗,

$ $
Pr (pk, sk) ←
− KeyGen(1k ), c ←
− Encrypt(1k , pk, m) :

PCheck(1k , c, pk, m) = 1 = 1.

The property of perfect consistency is implied by the correctness of decryp-


tion and the two following properties, which guarantee that PCheck behaves
as expected. The following two notions state that if a ciphertext decrypts to a
plaintext then PCheck matches them (completeness) and if PCheck matches a
ciphertext to a plaintext then the former encrypts the latter (soundness).
Checking completeness: no adversary is able to output a ciphertext c which
decrypts to a message that is refused by PCheck on input c. Formally, for every
k ∈ N and every probabilistic polynomial-time (p.p.t.) algorithm A that, on
inputs 1k and a public key pk, outputs a ciphertext c, the following probability
should be negligible:

$ $
Pr (pk, sk) ←
− KeyGen(1k ), c ←
− A(1k , pk),

$
m←
− Decrypt(1k , c, sk) : PCheck(1k , pk, c, m) = 0 .

Checking soundness: this property states that no adversary should be able to


produce a plaintext and ciphertext such that the decryption and the check pro-
cedures do not agree on the plaintext related to c. More formally, for every k ∈ N
and every p.p.t. algorithm A that, on inputs 1k and a public key pk, outputs a
ciphertext c and a plaintext m̃, the following probability should be negligible:

$ $
Pr (pk, sk) ←
− KeyGen(1k ), (c, m̃) ←
− A(1k , pk),

$
m←
− Decrypt(1k , c, sk) : m = m̃ ∧ PCheck(1k , pk, c, m̃) = 1 .

2.2 A Taxonomy of Indistinguishability

The classical property of indistinguishability (for public-key encryption schemes)


cannot be achieved by a PCE due to the ability to check the plaintext messages
336 S. Canard et al.

Expind-cpa
Π,A (k)
Expunlink
Π,A (k) Expind-det
Π,A (k)
$
b←
$
− {0, 1} b← − {0, 1} b←
$
− {0, 1}
(pk, sk) ← G(1k ) (pk, sk) ← G(1k ) m ← Af (1k , b)
(m0 , m1 , st) ← Af (1k , pk) m0 ← Af (1k , pk) (pk, sk) ← G(1k )
c ← E (1k , pk, mb ) m1 ← Af (1k , pk) c ← E (1k , pk, m)
b ← Ag (1k , c, st) c0 ← E (1k , pk, mb ) b ← Ag (1k , pk, c)
Return (b = b) c1 ← E (1k , pk, m1 ) Return (b = b)
b ← Ag (1k , pk, c0 , c1 )
Return (b = b)

Fig. 1. Security experiments for indistinguishability of Π

(see below). We discuss in this section the properties of indistinguishability for


encryption schemes.
In the following, we denote by Π = (G, E, D) a secure encryption scheme.
Depending on the context, Π can be either probabilistic (denoted Πp ) or de-
terministic (denoted Πd ). We first remark that a PCE can also be represented
as an encryption scheme (G, E, D) = (KeyGen, Encrypt, Decrypt), in the notation
from Sect. 2.1.
An adversary A is defined by a pair of algorithms denoted by A = (Af , Ag ),
representing the find and guess stage of the experiment, respectively. The ad-
versary A is said to be polynomial if each constituent algorithm has a running
time polynomial in its input length. It is assumed that Af and Ag share neither
coins nor state. We study three security experiments for the indistinguishability
properties of an encryption scheme Π; the three security experiments, denoted
by Expind-cpa unlink ind-det
Π,A (k), ExpΠ,A (k) and ExpΠ,A (k), are described in Fig. 1. We first
define two classes of adversaries.
Definition 1 (High min-entropy). An adversary A = (Af , Ag ) is legitimate
if there exists a function (·) s.t. for all c and all m ∈ [Af (1k , c)] we have
|m| = (k) (where c can be a bit, as for ind-det adversaries, or a public key, as
for ind-cpa and unlink adversaries).
Moreover, we say that an adversary A = (Af , Ag ) has min-entropy μ if
 
∀k ∈ N ∀c ∀m : Pr m ← Af (1k , b) : m = m ≤ 2−μ(k) .
A is said to have high min-entropy if it has min-entropy μ with μ(k) ∈ ω(log k).
The first experiment Expind-cpa
Π,A (k) represents the standard indistinguishability
property for probabilistic encryption schemes.

Definition 2 (IND-CPA). Let k ∈ N, let Π = (G, E, D) be an encryption


scheme, let Expind-cpa be as defined in Fig. 1 and denote Advind-cpa
Π,A (k) := 2 ·
 ind-cpa
Π,A

Pr ExpΠ,A (k) → true − 1. We say that Π satisfies indistinguishability under
a chosen-plaintext attack if for every legitimate p.p.t. adversary A = (Af , Ag ),
the advantage Advind-det
Π,A (k) is negligible.
Plaintext-Checkable Encryption 337

The experiment Expind-det


Π,A (k) is a simplified definition of the indistinguishability
property for deterministic encryption introduced in [4], which has been shown
to be equivalent to the original definition considered in [3]. We simplify the orig-
inal definition by considering adversaries that produce distributions of messages
rather than distributions of message vectors2 .
Definition 3 (IND-DET [4]). Let k ∈ N, let Π = (G, E, D) be an encryp-
tion scheme, and let Expin-det ind-det
Π,A be as defined in Fig. 1. Let AdvΠ,A (k) :=
 
Π,A (k) → true − 1. We say Π satisfies ind-det if for every legitimate
2 · Pr Expind-det
p.p.t. adversary A = (Af , Ag ) with high min-entropy, Advind-det
Π,A (k) is negligible.

We define the third security experiment as the infeasibility of deciding whether


two ciphertexts encrypt the same message. The definition shares with ind-det
that the messages have to be chosen from a high min-entropy space: otherwise
the notion is not satisfiable by a plaintext-checkable scheme, since the adversary
could simply check all messages. As we will show all along this paper, this se-
curity definition is achievable by plaintext-checkable schemes and sufficient for
our applications.

Definition 4 (UNLINK). Let k ∈ N and Advunlink Π,A (k) →
(k) := 2·Pr Expunlink
 Π,A
true − 1, for an encryption scheme Π = (G, E, D) with ExpΠ,A as defined in
unlink

Fig. 1. We say Π has unlinkable encryptions (or “satisfies unlink”) if for every
legitimate p.p.t. adversary A with high min-entropy, Advunlink
Π,A (k) is negligible.

We now give a complete taxonomy of all these security notions and we prove
(see the full version) that the unlink notion falls strictly between ind-cpa of prob-
abilistic encryption, and ind-det of deterministic encryption. More precisely, we
show the following relation:

IND-CPA  UNLINK  IND-DET.

This means that every scheme that achieves ind-cpa is unlink and every scheme
that achieves unlink is ind-det. On the other hand, there are schemes that are
unlink but not ind-cpa, and others satisfying ind-det but not unlink.
It is obvious that a PCE scheme cannot be ind-cpa since the adversary could
forward m0 and m1 as st from Af to Ag , which could then apply PCheck to
the challenge c and for example m0 , and win the experiment with overwhelming
probability. As a consequence, the somewhat best we can hope for in the case
of PCE is unlinkability. We will thus show that our schemes satisfy this new
security notion.
Deterministic encryption schemes [3], though trivially plaintext-checkable,
cannot satisfy the property unlink since every two encryptions of a message are
equal, which allows a trivial check of plaintext equality. One may attempt to con-
struct plaintext-checkable encryption from an encryption scheme with equality
2
The original definition considers vectors of messages since (unlike for ind-cpa-secure
encryption) there is no reduction to the single-message case by a hybrid argument
for deterministic encryption.
338 S. Canard et al.

test as described in [23] by simply encrypting the message and then perform-
ing the test of equality. However, this scheme does not satisfy unlink either for
obvious reasons. Moreover, as noticed by the authors, their Test function only
works properly when the ciphertexts are two real encryptions of messages, as
this procedure does not check the validity of the ciphertexts.
It thus remains open to give a construction (practical or generic) with the
above features, namely providing a PCheck procedure, while maintaining un-
linkability. We give such constructions in the two following sections.

3 Generic Constructions for PCE in the ROM

We show how to obtain secure PCE schemes using a secure probabilistic or de-
terministic encryption scheme with security proofs in the random-oracle model.

3.1 A PCE Based on a Probabilistic Encryption Scheme

In this construction a message m is encrypted by first choosing a random string


r and computing a hash value ρ of the message and r. This value ρ is then
used as the random coins of the probabilistic encryption algorithm to encrypt
m, and r is added to the ciphertext. The algorithm PCheck consists essentially
in re-computing ρ and then re-encrypting the message with random coins ρ and
comparing it to the candidate ciphertext. Our solution is described in Fig. 2.
The triple Πp = (Gp , Ep , Dp ) denotes a probabilistic encryption scheme satisfying
indistinguishability under chosen-message attack, and H : {0, 1}∗ → {0, 1}(k)
denotes a hash function modeled as a random oracle.
The following theorem states the security of the construction of Fig. 2, i.e.
that it satisfies unlinkability. Essentially, the unlinkability of this construction

Algorithm KeyGen(1k ) Algorithm Encrypt(1k , pk, m)


$
(pk, sk) ←
− Πp .Gp (1k ) pk ← pk
$
pk ← pk r← − {0, 1}(k)
sk ← sk ρ ← H(mr)
return (pk, sk) c ← Πp .Ep (1k , pk, m; ρ)
C ← (c, r)
return C

Algorithm Decrypt(1k , sk, C) Algorithm PCheck(1k , pk, C, m)


(c, r) ← C (c, r) ← C
sk ← sk pk ← pk
m ← Πp .Dp (1k , sk, c) ρ ← H(mr)
return m c̃ ← Πp .Ep (1k , pk, m; ρ)
if c̃ = c then return 1
else return 0
Fig. 2. Unlinkable PCE from an ind-cpa encryption scheme Πp
Plaintext-Checkable Encryption 339

follows from the indistinguishability of the underlying encryption scheme. How-


ever, quite some care needs to be taken to ensure that the simulation in the
reduction is perfect, as the adversary against unlinkability may make queries to
the random oracle that the simulator cannot answer.

Theorem 1. If Πp satisfies ind-cpa then the PCE from Fig. 2 satisfies unlink.

Proof (sketch, see full version for the full proof ). We show that a successful
adversary A against unlink of our PCE scheme can be used to construct an
adversary B against ind-cpa of Πp . A natural construction of B is the following:
Bf runs Af twice and outputs the obtained messages m0 and m1 . The challenger
then gives Bg a Πp -encryption c of mb . Now Bg must use Ag to determine b.
Playing the unlinkability game, Ag expects two PCE ciphertexts; one of mb and
one of m1 . While the latter can be computed honestly, Bg could construct the
former as (c, r0 ), for some random r0 .
However, this implicitly defines H(mb , r0 ) to be the randomness B’s challenger
used in constructing c; B can thus not answer this random-oracle query and the
simulation might fail. In a series of lemmas, we show that under ind-cpa of Πp ,
the probability of Ag (who does not know m0 and m1 ) querying m0 or m1 to H
is negligible. We first show that this holds if B’s challenger’s bit b = 0:
Suppose in game unlink when b = 0, Ag queries (m0 r) (for some r) to the
random oracle H. Then we construct B  that breaks ind-cpa. It uses Af to sample
m0 and m1 , gets an encryption c of md from its challenger and then runs Ag on
(c, r0 ) (for some random r0 ) and a PCE encryption of an independent message
m . Since Ag does not have any information on m1−d (which was sampled from a
high min-entropy space), querying e.g. m0 must mean d = 0. Thus if Ag makes
a query to H containing md , Bg outputs d as its guess. Note that the issue
of correctly simulating the random oracle does not arise here, as Bg aborts as
soon as Ag makes a critical query. Analogously, we show that when b = 0, the
probability that Ag queries (m1 ·) is negligible.
It remains to prove that when b = 1 then Ag queries (m1 ·) with negligible
probability. Again, assuming Ag makes such a query, we construct B  breaking
ind-cpa. As before, B  uses Af to sample m0 and m1 and receives c. Now Bg picks
a random bit d and sends Ag the following: (c, r0 ), for some random r0 and a PCE
encryption of md . If Ag queries (md ·) then Bg outputs d. (Note that up to this
point, the simulation is perfect.) We show that B  wins the indistinguishability
game. If d equals B  ’s challenger’s bit then Ag gets two encryptions of the same
message; A is thus playing the unlink game with b = 1, for which we assumed
Ag queries the encrypted message to H with non-negligible probability, in which
case B  wins. On the other hand, if d is different from the challenger’s bit (in
which case B  loses) then A gets encryptions of two different messages and it
is thus playing unlink with b = 0. For this case however, the previous result for
b = 1 asserts that A will not query an encrypted message to the random oracle.
340 S. Canard et al.

Algorithm KeyGen(1k ) Algorithm Encrypt(1k , pk, m)


$
(pk, sk) ←
− Πd .Gd (1k ) pk ← pk
$
pk ← pk r← − {0, 1}(k)
sk ← sk ρ ← H1 (mr)
return (pk, sk) c1 ← Πd .Ed (1k , pk, ρ)
c2 ← m ⊕ H2 (ρ)
C ← (c1 , c2 , r)
return C

Algorithm Decrypt(1k , sk, C) Algorithm PCheck(1k , pk, C, m)


(c1 , c2 , r) ← C (c1 , c2 , r) ← C
sk ← sk pk ← pk
ρ ← Πd .Dd (1k , sk, c1 ) ρ ← H1 (mr)
m ← c2 ⊕ H2 (ρ) c̃ ← Πd .Ed (1k , pk, ρ)
if ρ = H1 (m||r) then return m if c̃ = c1 then return 1
else return 0
Fig. 3. Unlinkable PCE from a deterministic encryption scheme Πd

3.2 A PCE Based on a Deterministic Encryption Scheme


Let Πd = (Gd , Ed , Dd ) be a secure deterministic encryption scheme, meaning that
it satisfies the ind-det property as defined in [4] and recalled in Sect. 2.2. Let
H1 : {0, 1}∗ → {0, 1}(k) and H2 : {0, 1}∗ → {0, 1}(k) be two hash functions
modeled as random oracles.
The idea behind this construction is to encrypt with the deterministic encryp-
tion algorithm a hash value ρ of the message m together with a random element
r and then to compute a one-time pad of the message and the hash value of
ρ. We include r in the ciphertext, so knowing m and r, one can recompute the
(deterministic) ciphertext and thus perform the plaintext check.
Our random-oracle based construction is detailed in Fig. 3, and Corollary 1
states its security. As we will see, this theorem is a consequence of Theorem 1.
Corollary 1 (sketch, see full version for the full proof ). The PCE con-
struction given in Fig. 3 is unlinkable under the assumption that Πd is one-way,
in the random-oracle model.
Proof (sketch, see full version for the full proof ). This proof is a direct ap-
plication of Theorem 1 combined with the result from [5] which states that
the encryption scheme which consists in computing c1 ← Πd .E(1k , pk, r) and
$
c2 ← m ⊕ H2 (r), where r ← − {0, 1}(k) , is ind-cpa if the underlying deterministic
encryption scheme Πd is one-way.

4 Practical Constructions in the Standard Model


A construction of a secure plaintext-checkable encryption can be proved in the
standard model using the technique from [4] for deterministic encryption (see
Plaintext-Checkable Encryption 341

Fig. 3 of [4]): one replaces the random oracle by a pseudo-random genera-


tor [7,24,15] based on a family of trapdoor permutations. As for the previous
construction, the idea is to use a secure encryption scheme whose randomness
is generated using a secure pseudo-random generator with a seed depending on
the message and the random value used to check the plaintext. We here give
another practical construction based on the ElGamal encryption scheme [14],
which we will then use for our standard-model VLR group signature scheme
given in Sect. 5.

4.1 An ElGamal-Based Construction


Our construction lies in an asymmetric bilinear group (p, G1 , G2 , GT , e, g, h)
where p is a large prime, G1 , G2 and GT are cyclic groups of order p and
e : G1 × G2 → GT is a non-degenerate bilinear map. The elements g and h de-
note generators of G1 and G2 , respectively. In our scheme, the idea is to encrypt
a message m under a public key y using randomness r as c1 = my r , c2 = g r .
If we gave c3 = hr as well, then using the pairing we can perform plaintext
checks since e(c1 m−1 , g) = e(y, c3 ). However, this construction does not achieve
unlinkability, since we can check whether 2 ciphertexts encrypt the same mes-
sage by checking whether their quotient encrypts 1. To avoid this, instead of
using h as a base for the check element c3 , we use a random base ha . Since this
base is different for every ciphertext, no two ciphertexts can be combined. Our
construction is described in Fig. 4 and allows to encrypt messages m ∈ G1 .

Algorithm KeyGen(1k ) Algorithm Encrypt(1k , pk, m)


x← − Z∗p
$
y ← pk
− Z∗p
$
y ← gx r, a ←
(pk, sk) ← (y, x) C ← (my r , g r , ha , har )
return (pk, sk) return C

Algorithm Decrypt(1k , sk, C) Algorithm PCheck(1k , pk, C, m)


x ← sk y ← pk
(c1 , c2 , c3 , c4 ) ← C (c1 , c2 , c3 , c4 ) ← C
if e(g, c4 ) = e(c2 , c3 ) then return ⊥ if e(g, c4 ) = e(c2 , c3 ) then return 0
m ← c1 /cx2 if e(c1 /m, c3 ) = e(y, c4 ) then return 1
return m else return 0
Fig. 4. Unlinkable PCE in the standard model

4.2 Security Arguments


To prove unlinkability of the construction in Fig. 4, we introduce a new assump-
tion (whose security in the generic-group model is proved in the full version),
which combines features of the Decision Linear Assumption (DLIN) and the as-
sumption that DDH holds in both base groups of an asymmetric bilinear group
(known as “SXDH”).
342 S. Canard et al.

Assumption 1 Given an asymmetric bilinear group (p, G1 , G2 , GT , e) with gen-


erators g ∈ G1 and h ∈ G2 , and the tuple (g x , g rx , g sx , ha , har , hb , hbr , V ) for
random x, r, s, a, b ∈ Zp , it is hard to decide if V = g r+s or V is random in G1 .

Let us first analyze the G1 part of our assumption: (g x , g rx , g sx ) and g r+s . DLIN
states that given (g x , g y , g rx , g sy ) it is hard to distinguish g r+s from random.
The G1 components of our assumption can thus be seen as a DLIN instance
with y = x (note that whereas DLIN also holds in symmetric groups, this is
not the case when y = x). It is also immediate that this “partial” assumption
is a DDH instance where s = 0, and thus implied by DDH. However, since—as
opposed to DDH—we have two random combined exponents r and s for the
challenge, this allows us to add values depending on them in G2 , which cannot
be used to verify the structure of g r+s , since the bases ha and hb for r and s are
different.
The following theorem holds against adversaries A = (Af , Ag ) where Af
outputs the uniform distribution. This restriction is similar to the results by
Bellare et al. [3] for their practical construction of a deterministic encryption
scheme. In fact, in real life applications, the uniform distribution is most of time
enough and easily obtained. In particular, this notion also suffices when applying
the scheme to VLR group signatures.

Theorem 2. Under Assumption 1, the construction from Fig. 4 is a PCE scheme


which is unlink against adversaries outputting the uniform distribution.

5 Application to VLR Group Signature

In this section we use our new primitive as a building block for group signatures
with verifier-local revocation (VLR) [10]. This is a group signature scheme [2,8]
which allows an efficient revocation of group members.
Our aim in this section is twofold. First, we present plaintext-checkable en-
cryption as a new building block for group signatures with VLR; thus any im-
provement to PCE is likely to lead to more efficient group signatures with VLR.
Second, we design in the following, to the best of our knowledge, the most efficient
group signature scheme with VLR and backward unlinkability in the standard
model. We first recall the concept of group signatures with VLR, and eventually
describe our new construction.

5.1 Definitions for Group Signatures with VLR

Let k, n and T be integers. A group signature scheme with VLR (VLR-GS for
short) is composed of the following algorithms (following [19]).

– KeyGen takes as input a security parameter 1k , the number n of group mem-


bers and the number T of time periods. It produces the group public key gpk,
an n-element vector of user keys sk = (sk1 , . . . , skn ) and an (n × T )-element
vector of user revocation tokens grt = (grt[1][1], . . . , grt[n][T ]).
Plaintext-Checkable Encryption 343

– Sign takes as input the group public key gpk, the current time interval j, a
secret key ski for i ∈ [[1, n]] of a group member and a message m ∈ {0, 1}∗,
and outputs a signature σ.
– Verify takes as input the group public key gpk, the current time period j, the
public key of the revocation authority rpk, a set of revocation tokens RLj ,
and a purported signature σ on a message m. It returns either valid if the
signature σ is valid or invalid if σ is not a valid signature or if the user who
generated it has been revoked.
The security requirements are traceability and backward unlinkability (BU)
anonymity. The corresponding formal definitions can be found in [19]. We only
recall the BU-anonymity since adding the VLR functionality to a group signature
scheme only concerns this security notion, whereas traceability is inherited from
the original scheme. A VLR-GS with backward unlinkability is BU-anonymous
if no p.p.t. adversary A has non-negligible advantage in the following game.
$
1. The challenger C executes (gpk, sk, grt) ← − KeyGen(1k , n, T ) and the adver-
sary is given gpk.
2. For each period, C increments the counter j and during this period, A can
access the Sign(·, ·) oracle, which gives a group signature on a message m by
a user i during time period j, the Corrupt(·) oracle, which permits to corrupt
the user i and the Revoke(·) oracle, which revokes the member i.
3. At some period j ∗ ∈ [1, T ], A outputs (m∗ , i0 , i1 ) such that i0 and i1 are not
corrupted and have not been revoked during or before the time period j ∗ .
The challenger C flips a coin b and generates σ ∗ ← − Sign(gpk, j ∗ , skib , m∗ ),
$

which is sent to A.
4. A can again access the above oracles. A is not allowed to corrupt i0 nor i1
but it may revoke them after time period j ∗ .
5. Eventually, A outputs a bit b∗ and wins if b = b∗ .
The advantage of A in breaking this anonymity is defined as Advbu-a
VLR-GS,A (k) :=
| Pr[b = b∗ ] − 12 |.

5.2 Using PCE for Group Signatures with VLR

Starting with a Group Signature Scheme. For concreteness, we base our


instantiation on the group signature scheme by Fuchsbauer and Abe et al.
in [12,1], which is itself based on Groth’s scheme [16], which makes use of the
non-interactive zero-knowledge (NIZK) proofs from Groth and Sahai [17].
In a nutshell, each user creates a key pair for an automorphic signature
scheme3 [12,1]. The group public key is a signature verification key, whose cor-
responding signing key is used by the group manager to sign a user’s verification
3
A signature scheme defined over a bilinear group is automorphic if the verification
keys lie in the message space, and if the messages and the signatures consist of
group elements. The first property enables certification of keys, whereas the second
makes it possible to give efficient NIZK proofs of knowledge of valid signatures and
messages using Groth-Sahai proofs.
344 S. Canard et al.

key when he joins the group. To make a group signature, the user first signs the
message using his personal signing key; the group signature is then a Groth-Sahai
proof of knowledge of the following: the user’s verification key, a valid certificate
on it by the group manager, and a signature on the message that is valid under
his verification key. Since the registration protocol consists of only one round,
the scheme is concurrently secure. Moreover, since the group members create
their own signing keys, the scheme achieves non-frameability [6].

Adding the VLR Property. When adding verifier-local revocability, to achieve


backward unlinkability, we use the system due to Nakanishi and Funabiki [20].
This consists in defining time periods and constructing one key (called the revo-
cation token) per group member and time period. This token is to be used by
the group member when making a group signature. When a member is revoked,
all the revocation tokens related to the revoked group member and future time
periods are published. These public revocation tokens are then used by the ver-
ifier to check whether the received group signature has been produced with a
published value, and thus by a revoked group member.

Making Use of a PCE. The group signature cannot contain the revocation
token in the clear, as this would compromise the member’s anonymity. Our
approach is to include in the group signature a plaintext-checkable encryption of
the revocation token, together with a proof of well-formedness. When a revoked
group member’s token gets published, the verifier can use PCheck of the PCE
scheme to check whether the group signature comes from a revoked member
or not. For our concrete scheme, we use the standard-model PCE scheme from
Sect. 4.1, since it complies with the Groth-Sahai methodology.

5.3 Our Concrete Instantiation


We will use the group signature scheme on which we base our construction as
a black box and simply add one PCE encryption and a proof of consistency to
make it a VLR scheme. We require that the group signature is a Groth-Sahai
proof of knowledge in an asymmetric bilinear group (p, G1 , G2 , GT , e, g, h) and
that the user verification key contains a component hvi , where vi is the i-th
user’s signing key. (This is the case e.g. in the construction from [12,1]).
In the setup phase of scheme (when the common reference string for Groth-
Sahai proofs is created), we now also create a key pair (y = g x , x) ∈ G1 × Zp
for our PCE scheme from Sect. 4.1 and add y to the public parameters. As
in [20,19], we introduce a vector (P1 , . . . , PT ) of G1 elements, where T is the
maximum number of time periods. The revocation token for user i (holding
secret key vi ) for time interval j is defined as Pjvi .
When creating a group signature, the user must additionally encrypt his token
for the current time interval and prove that it is well-formed. The token is of
the form P v , so we need to prove that v is the same as in the user verification
key element w := hv (of which the group signature will prove knowledge). The
PCE encryption of the token is C = (C1 , C2 , C3 , C4 ) = (P v y r , g r , ha , har ). To
Plaintext-Checkable Encryption 345

prove well-formedness, we introduce an auxiliary variable z := hr , of which


we also prove knowledge in the group signature. Groth-Sahai proofs allow us to
prove knowledge of group elements that satisfy pairing-product equations (PPE).
Let v be such that P v is the plaintext of C. Then the following PPEs assert
that w = hv (the group elements of which we prove knowledge are underlined):
e(C1 , h) = e(P, w) e(y, z) and e(C2 , h) = e(g, z).
In addition to C, we include in the group signature a Groth-Sahai NIZK
proof that the above equations are satisfied. Our new verification procedure now
additionally checks this new proof component, and runs PCheck on C and the
elements of the revocation list to check if the user has been revoked.
We note that our techniques also work if the verification key contains g v rather
than hv : we can introduce a second encrypted auxiliary variable z  := hv and
add a proof of e(g v , h) = e(g, z  ). We have thus shown that adding to a Groth-
Sahai based group signature scheme (with user verification keys containing a
generator to the power of the signing key) a plaintext-checkable encryption of a
token, gives a group signature scheme with VLR and backward unlinkability.

5.4 Backward-Unlinkable Anonymity

We outline the proof that our scheme satisfies backward-unlinkable anonymity.


The proof proceeds by a series of games. The first game is the experiment defined
in Sect. 5.1. In the second game, instead of running KeyGen, we compute the com-
mon reference string for Groth-Sahai proofs in a way that will lead to perfectly
hiding proofs of knowledge, which can be simulated. By the zero-knowledge prop-
erty of Groth-Sahai proofs, the first two games are indistinguishable. In Game
3, the challenger picks 2 random users, hoping they will be the challenge users
i0 and i1 output by the adversary in Step 3 of the game. If the challenger did
not guess these users correctly, it aborts the game. This introduces a polynomial
loss in the security reduction.
In Game 4 the challenger simulates the NIZK proofs in the following signatures
it gives to the adversary: all signatures in signing queries for users i0 and i1
queried up to the challenge time period j ∗ ; and the challenge signature σ ∗ . It
follows from the zero-knowledge property of Groth-Sahai proofs that Game 4 is
indistinguishable from Game 3.
We can now play with the plaintext-checkable encryptions C of tokens which
are given to the adversary as part of the simulated group signature (either in
a signing query for users i0 and i1 in time j < j ∗ or the challenge signature).
Since the proof of consistency of these C’s is simulated, we can change the actual
values, which we will do in the following. Next, when computing the values Pj
during setup, the challenger sets them as Pj := g dj and stores dj . We now define a
v v
series of games, in which, one by one, we replace tokens P1 i0 , . . . , Pj ∗i0 and tokens
vi1 vi1
P1 , . . . , Pj ∗ by random values. This is reduced to the DDH assumption, which
implies that given values g d and g v , we can replace g dv by a random value. Note
that given a DDH challenge, the challenger can use the logarithms dj to compute
the values Pjvi it is not changing in that step.
346 S. Canard et al.

After this series of games, the only dependency of the challenge signature
on the bit b occurs when the adversary asks for a signature of user ib in time
interval j ∗ . Since the tokens are chosen uniformly at random, we can replace the
encryption of the token in the challenge signature by a random value. This is
implied by unlinkability of our PCE scheme (which states that two encryptions
of the same value are indistinguishable from two encryptions of two different
(random) values). After this final step the challenge signature is independent of
b and the adversary’s winning probability is thus exactly 12 .

5.5 Comparison with Related Work

Regarding related work on group signature schemes with VLR, there are typ-
ically 3 criteria to compare such schemes: random-oracle or standard model,
anonymity revocation or not and backward unlinkability or not. Table 1 com-
pares all existing solutions, to the best of our knowledge.

Table 1. Related work on group signatures with VLR

Papers Standard Anonymity Backward


model revocation unlinkability
[10] No No No
[20,21,25] No Yes Yes
[19] Yes (Yes) Yes
Ours Yes (Yes)4 Yes

Achieving CCA Security. An additional property not considered in the above


table is CCA-anonymity, meaning the scheme remains anonymous even if the
adversary has an oracle to open signatures of its choice, as considered e.g. in
the model by Bellare et al. [6]. This notion is achieved by variants of the group
signature schemes on which we base our VLR scheme, using one-time signatures
and a weakly CCA tag-based encryption scheme, as proposed by Groth in [16].
The tag-based encryption scheme used is Kiltz’s construction [18] is secure
under the DLIN assumption [8] and is defined over symmetric bilinear groups.
As DDH is easy in such groups, our PCE scheme would not be secure and can
thus not be added to these schemes. We believe however that starting from linear
encryption [8] rather than ElGamal, and adding elements enabling plaintext
checkability, one could define a PCE scheme over symmetric bilinear groups.
Efficiency Considerations. We can now compare the efficiency of standard
model group signatures with VLR and backward unlinkability, which amounts
to comparing us with the scheme by Libert and Vergnaud [19]. On one hand,
regarding [19], a group signature is composed of 46 elements in G and 1 element
in GT . The time complexity of a group-signature creation necessitates 2 mod-
ular exponentiations in G, 6 commitment generations, 2 quadratic GS proofs
and 4 linear GS proofs. The revocation checking requires the computation of
4
Not explicitly detailed but can be easily added by giving the trapdoor for the CRS
of Groth-Sahai proofs to the opener.
Plaintext-Checkable Encryption 347

one pairing per element in RLj . On the other hand, our signatures are com-
posed of 12 elements in G1 , 18 elements in G2 and no element in GT . The signer
must perform 6 modular exponentiations, 1 quadratic GS proofs and 5 linear
GS proofs. The revocation checking requires the computation of 2 pairings per
element in RLj . Considering moreover that in asymmetric groups, representa-
tions of group elements are shorter and computation of pairings are much more
efficient, our scheme is more efficient in terms of signature computation and size
but necessitates slightly more work during the revocation check.

6 Conclusion
We proposed a new promising public-key encryption scheme with a special fea-
ture: this primitive allows anyone to verify whether a given ciphertext (together
with the public key used to encrypt) actually encrypts any potential message.
However, if the messages come from a space with enough entropy, one cannot
decide whether two ciphertexts encrypt the same message. Plaintext-checkable
encryption with unlinkable ciphertexts is perfectly adapted to design group sig-
natures with verifier-local revocation and backward unlinkability. The efficiency
of the constructions also enables its use in a context of cloud storage services.
Acknowledgements. This work has been supported by the French Agence
Nationale de la Recherche under the PACE 07 TCOM Project, the European
Commission under Contract ICT-2007-216676 ECRYPT II and EPSRC Grant
EP/H043454/1. We are grateful to Jacques Traoré for his suggestions of im-
provement, and to the anonymous referees for their valuable comments.

References
1. Abe, M., Fuchsbauer, G., Groth, J., Haralambiev, K., Ohkubo, M.: Structure-
Preserving Signatures and Commitments to Group Elements. In: Rabin, T. (ed.)
CRYPTO 2010. LNCS, vol. 6223, pp. 209–236. Springer, Heidelberg (2010)
2. Ateniese, G., Camenisch, J., Joye, M., Tsudik, G.: A Practical and Provably Secure
Coalition-Resistant Group Signature Scheme. In: Bellare, M. (ed.) CRYPTO 2000.
LNCS, vol. 1880, pp. 255–270. Springer, Heidelberg (2000)
3. Bellare, M., Boldyreva, A., O’Neill, A.: Deterministic and Efficiently Searchable
Encryption. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 535–552.
Springer, Heidelberg (2007)
4. Bellare, M., Fischlin, M., O’Neill, A., Ristenpart, T.: Deterministic Encryption:
Definitional Equivalences and Constructions without Random Oracles. In: Wagner,
D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 360–378. Springer, Heidelberg (2008)
5. Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for design-
ing efficient protocols. In: ACM Conference on Computer and Communications
Security, pp. 62–73 (1993)
6. Bellare, M., Shi, H., Zhang, C.: Foundations of Group Signatures: The Case of
Dynamic Groups. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 136–
153. Springer, Heidelberg (2005)
7. Blum, M., Micali, S.: How to generate cryptographically strong sequences of
pseudo-random bits. SIAM J. Comput. 13(4), 850–864 (1984)
348 S. Canard et al.

8. Boneh, D., Boyen, X., Shacham, H.: Short Group Signatures. In: Cachin, C.,
Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56–73. Springer,
Heidelberg (2004)
9. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public Key Encryption
with Keyword Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004.
LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)
10. Boneh, D., Shacham, H.: Group signatures with verifier-local revocation. In: ACM
Conference on Computer and Communications Security, pp. 168–177. ACM (2004)
11. Camenisch, J., Groth, J.: Group Signatures: Better Efficiency and New Theoretical
Aspects. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 120–133.
Springer, Heidelberg (2005)
12. Fuchsbauer, G.: Automorphic signatures in bilinear groups and an application
to round-optimal blind signatures. Cryptology ePrint Archive, Report 2009/320
(2009), http://eprint.iacr.org/
13. Fuhr, T., Paillier, P.: Decryptable Searchable Encryption. In: Susilo, W., Liu, J.K.,
Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 228–236. Springer, Heidelberg
(2007)
14. El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete
logarithms. IEEE Transactions on Information Theory 31(4), 469–472 (1985)
15. Goldreich, O., Levin, L.A.: A hard-core predicate for all one-way functions. In:
Proc. of STOC 1989, pp. 25–32. ACM (1989)
16. Groth, J.: Fully Anonymous Group Signatures without Random Oracles. In: Kuro-
sawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 164–180. Springer, Hei-
delberg (2007)
17. Groth, J., Sahai, A.: Efficient Non-Interactive Proof Systems for Bilinear Groups.
In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415–432. Springer,
Heidelberg (2008)
18. Kiltz, E.: Chosen-Ciphertext Security from Tag-Based Encryption. In: Halevi, S.,
Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 581–600. Springer, Heidelberg
(2006)
19. Libert, B., Vergnaud, D.: Group Signatures with Verifier-Local Revocation and
Backward Unlinkability in the Standard Model. In: Garay, J.A., Miyaji, A., Otsuka,
A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 498–517. Springer, Heidelberg (2009)
20. Nakanishi, T., Funabiki, N.: Verifier-Local Revocation Group Signature Schemes
with Backward Unlinkability from Bilinear Maps. In: Roy, B. (ed.) ASIACRYPT
2005. LNCS, vol. 3788, pp. 533–548. Springer, Heidelberg (2005)
21. Nakanishi, T., Funabiki, N.: A Short Verifier-Local Revocation Group Signature
Scheme with Backward Unlinkability. In: Yoshiura, H., Sakurai, K., Rannenberg,
K., Murayama, Y., Kawamura, S.-i. (eds.) IWSEC 2006. LNCS, vol. 4266, pp.
17–32. Springer, Heidelberg (2006)
22. Ostrovsky, R., Skeith III, W.E.: Private searching on streaming data. J. Cryptol-
ogy 20(4), 397–430 (2007)
23. Yang, G., Tan, C.H., Huang, Q., Wong, D.S.: Probabilistic Public Key Encryption
with Equality Test. In: Pieprzyk, J. (ed.) CT-RSA 2010. LNCS, vol. 5985, pp.
119–131. Springer, Heidelberg (2010)
24. Yao, A.C.-C.: Theory and applications of trapdoor functions (extended abstract).
In: Proc. of FOCS 1982, pp. 80–91. IEEE (1982)
25. Zhou, S., Lin, D.: Shorter Verifier-Local Revocation Group Signatures from Bilinear
Maps. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, vol. 4301,
pp. 126–143. Springer, Heidelberg (2006)

You might also like