exchange/doc/paper/postquantum_melt.tex
Jeff Burdges a0756dc303 Initial post-quantum refresh proposal, but..
I do not really like it, so I'm going to change it lots.
2016-04-19 20:55:35 +02:00

307 lines
10 KiB
TeX

\documentclass{llncs}
%\usepackage[margin=1in,a4paper]{geometry}
\usepackage[T1]{fontenc}
\usepackage{palatino}
\usepackage{xspace}
\usepackage{microtype}
\usepackage{tikz,eurosym}
\usepackage{amsmath,amssymb}
\usepackage{enumitem}
\usetikzlibrary{shapes,arrows}
\usetikzlibrary{positioning}
\usetikzlibrary{calc}
% Relate to:
% http://fc14.ifca.ai/papers/fc14_submission_124.pdf
% Terminology:
% - SEPA-transfer -- avoid 'SEPA transaction' as we use
% 'transaction' already when we talk about taxable
% transfers of Taler coins and database 'transactions'.
% - wallet = coins at customer
% - reserve = currency entrusted to exchange waiting for withdrawal
% - deposit = SEPA to exchange
% - withdrawal = exchange to customer
% - spending = customer to merchant
% - redeeming = merchant to exchange (and then exchange SEPA to merchant)
% - refreshing = customer-exchange-customer
% - dirty coin = coin with exposed public key
% - fresh coin = coin that was refreshed or is new
% - coin signing key = exchange's online key used to (blindly) sign coin
% - message signing key = exchange's online key to sign exchange messages
% - exchange master key = exchange's key used to sign other exchange keys
% - owner = entity that knows coin private key
% - transaction = coin ownership transfer that should be taxed
% - sharing = coin copying that should not be taxed
\title{Post-quantum anonymity in Taler}
\begin{document}
\mainmatter
\author{Jeffrey Burdges}
\institute{Intria / GNUnet / Taler}
\maketitle
\begin{abstract}
David Chaum's original RSA blind sgnatures provide information theoretic
anonymity for customers' purchases. In practice, there are many schemes
that weaken this to provide properties. We describe a refresh protocol
for Taler that provides customers with post-quantum anonymity.
It replaces an elliptic curve Diffe-Hellman operation with a unique
hash-based encryption scheme for the proof-of-trust via key knoledge
property that Taler requires to distinguish untaxable operations from
taxable purchases.
\end{abstract}
\section{Introduction}
David Chaum's RSA blind sgnatures \cite{} can provide financial
security for the exchange, or traditionally mint,
assuming RSA-CTI \cite{,}.
A typical exchange deployment must record all spent coins to prevent
double spending. It would therefore rotate ``denomination'' signing
keys every few weeks or months to keep this database from expanding
indefinitely \cite{Taler??}. As a consequence, our exchange has
ample time to respond to advances in cryptgraphy by increasing their
key sizes, updating wallet software with new algorithms, or
even shutting down.
In particular, there is no chance that quantum computers will emerge
and become inexpensive within the lifetime of a demonination key.
Indeed, even a quantum computer that existed only in secret posses
little threat because the risk of exposing that secret probably exceeds
the exchange's value.
\smallskip
We cannot make the same bold pronouncement for the customers' anonymity
however. We must additionally ask if customers' transactions can be
deanonymized in the future by the nvention of quantum computes, or
mathematical advances.
David Chaum's original RSA blind sgnatures provide even information
theoretic anonymity for customers, giving the desired negative answer.
There are however many related schemes that add desirable properties
at the expense of customers' anonymity. In particular, any scheme
that supports offline merchants must add a deanonymization attack
when coins are double spent \cite{B??}.
Importantly, there are reasons why exchanges must replace coins that
do not involve actual financial transactons, like to reissue a coin
before the exchange rotates the denomination key that signed it, or
protect users' anonymity after a merchant recieves a coin, but fails
to process it or deliver good.
In Taler, coins can be partially spent by signing with the coin's key
for only a portion of the value determined by the coin's denomination
key. This allows precise payments but taints the coin with a
transaction, which frequently entail user data like a shipng address.
To correct this, a customer does a second transaction with the exchange
where they sign over the partially spent coin's risidual balance
in exchange for new freshly anonymized coins.
Taler employs this {\em refresh} or {\em melt protocol} for
both for coins tainted through partial spending or merchant failures,
as well as for coin replacement due to denomination key roration.
If this protocol were simply a second transaction, then customers
would retain information theoreticaly secure anonymity.
In Taler however, we require that the exchange learns acurate income
information for merchants. If we use a regular transaction, then
a customer could conspire to help the merchant hide their income
\cite[]{Taler??}.
To prevent this, the refresh protocol requires that a customer prove
that they could learn the private key of the resulting new coins.
At this point, Taler employs an elliptic curve Diffie-Hellman key
exchange between the coin's signing key and a new linking key
\cite[??]{Taler??}. As the public linking key is exposed,
an adversary with a quantum computer could trace any coins involved
in either partial spending operations or aborted transactions.
A refresh prompted by denomination key rotation incurs no anonymity
risks regardless.
\smallskip
We could add an existing post-quantum key exchange, but these all
incur significantly larger key sizes, requiring more badwidth and
storage space for the exchange, and take longer to run.
In addition, the established post-quantum key exchanges based on
Ring-LWE, like New Hope \cite{}, require that both keys be
ephemeral.
Super-singular isogenies \cite{,} would work ``out of the box'',
if it were already packeged in said box.
Instead, we observe that
In this paper, we describe a post-quantum
It replaces an elliptic curve Diffe-Hellman operation with a unique
hash-based encryption scheme for the proof-of-trust via key knoledge
property that Taler requires to distinguish untaxable operations from
taxable purchases.
...
\smallskip
We observe that several elliptic curve blind signature schemes provide
information theoreticly secure blinding as well, but
Schnorr sgnatures require an extra round trip \cite{??}, and
pairing based schemes offer no advnatages over RSA \cite{??}.
There are several schemes like Anonize \cite{} in Brave \cite{},
or Zcash \cite{} used in similar situations to blind signatures.
% https://github.com/brave/ledger/blob/master/documentation/Ledger-Principles.md
In these systems, anonymity is not post-quantum due to the zero-knowledge
proofs they employ.
\section{Background}
\section{Refresh}
Let $\kappa$ and $\theta$ denote
the exchange's security parameter and
the maximum number of coins returned by a refresh, respectively.
We define a Merkle tree/sequence function
$\mlink(m,i,j) = H(m || "YeyCoins!" || i || j)$
Actual linking key for jth cut of ith target coin
$\mhide(m,i,j) = H( \mlink(m,i,j) )$
Linking key hidden for Merkle
$\mcoin(m,i) = H( \mhide(m,i,1) || \ldots || \mhide(m,i,\kappa) )$
Merkle root for refresh into the ith coin
$\mroot(m) = M( \m_coin(m,1), \ldots, \mcoin(m,\theta) )$
Merkle root for refresh of the entire coin
$mpath(m,i)$ is the nodes adjacent to Merkle path to $\mcoin(m,i)$
If $\theta$ is small then $M(x[1],\ldots,x[\theta])$ could be simply be
the concatenate and hash function $H( x[1] || ... || x[\theta] )$ like
in $\mcoin$, giving $O(n)$ time. If $\theta$ is large, then $M$ should
be a hash tree to give $O(\log n)$ time. We could use $M$ in $\mcoin$
too if $\kappa$ were large, but concatenate and hash wins for $\kappa=3$.
All these hash functions should have a purpose string.
A coin now consists of
a Ed25519 public key $C = c G$,
a Merkle root $M = \mroot(m)$, and
an RSA signature $S = S_d(C || M)$ by a denomination key $d$.
There was a blinding factor $b$ used in the creation of the coin's signature $S$.
In addition, there was a value $s$ such that
$c = H(\textr{"Ed25519"} || s)$,
$m = H(\textr{"Merkle"} || s)$, and
$b = H(\textr{"Blind"} || s)$,
but we try not to retain $s$ if possible.
We have a tainted coin $(C,M,S)$ that we wish to
refresh into $n \le \theta$ untained coins.
For simplicity, we allow $x'$ to stand for the component
normally denoted $x$ of the $i$th new coin being created.
So $C' = c' G$, $M' = \mroot(m')$, and $b'$ must be derived from $s'$.
For $j=1\cdots\kappa$,
we allow $x^j$ to denote the $j$th cut of the $i$th coin.
So again
$C^j = c^j G$, $M^j = \mroot(m^j)$, and $b^j$ must be derived from $s^j$.
Wallet phase 1.
For $j=1 \cdots \kappa$:
Create random $s^j$ and $l^j$.
Compute $c^j$, $m^j$, and $b^j$ from $s^j$ as above.
Compute $C^j = c^j G$ and $L^j = l^j G$ too.
Compute $B^j = B_{b^j}(C^j || \mroot(m^j))$.
Set $k = H(\mlink(m,i,j) || l^j C)$
Encrypt $E^j = E_k(s^j,l^j)$.
Send commitment $S' = S_C( (L^j,E^1,B^1), \ldots, (E^\kappa,B^\kappa) )$
% Note : If $\mlink$ were a stream cypher then $E()$ could just be xor.
Exchange phase 1.
Pick random $\gamma \in \{1 \cdots \kappa\}$.
Mark $C$ as spent by saving $(C,gamma,S')$.
Send gamma and $S(C,gamma,...)$
Wallet phase 2.
Save ...
Set $\Beta_gamma = \mhide(m,i,gamma) = H( \mlink(m,i,gamma) )$ and
$\beta_i = \mlink(m,i,j)$ for $j=1\cdots\kappa$ not $\gamma$
Prepare a responce tuple $R^j$ consisting of
$Beta_gamma$, $(beta_j,l^j)$ for $j=1\cdots\kappa$ not $\gamma$,
and $\mpath(m,i)$, including $\mcoin(m,i)$,
Send $S_C(R^j)$.
Exchange phase 2.
Set $Beta_j = H(beta_j)$ for $j=1\ldots\kappa$ except $\gamma$,
keep $Beta_gamma$ untouched.
Verify $M$ with $\mpath(m,i)$ including $\mcoin(m,i)$.
Verify $\mcoin(m,i) = H( Beta_1 || .. || Beta_kappa )$.
For $j=1 \cdots \kappa$ except $\gamma$:
Decrypt $s^j$ from $E^i$ using $k = H(beta_j || l^j C)$
Compute $c^j$, $m^j$, and $b^j$ from $s^j$.
Compute $C^j = c^j G$ too.
Verify $B^i = B_{b^j}(C^j || \mroot(m^j))$.
If verifications pass then send $S_{d_i}(B^\gamma)$.
\section{Withdrawal}
\bibliographystyle{alpha}
\bibliography{taler,rfc}
% \newpage
% \appendix
% \section{}
\end{document}
$l$ denotes Merkle tree levels
yields $2^l$ leaves
costs $2^{l+1}$ hashing operations
$a$ denotes number of leaves used
yields $2^{a l}$ outcomes
commit H(h) and h l C and E_{l C)(..)
reveal h and l
x_n ... x_1 c G
waiting period of 10 min