Attestation Verification Optimization
In the ethresearch post Fast Verification of Multiple BLS Signatures, Vitalik describes a method for efficiently and securely aggregating multiple already aggregated BLS signatures where each aggregated signature can have a different message through randomization.
Randomization, or “blinding,” can be used to protect against rogue public key attacks, in which a specially crafted public key (the “rogue” key) is used to forge an aggregated signature. Vitalik suggests 64 bit random numbers be locally generated on the client side for scalar multiplication with each signature during aggregation. This creates a linear combination style computation of points that upholds the validity of the verification, due to the underlying bi-linear map properties of BLS signatures. The same locally generated random values are scalar multiplied with each of the messages that get aggregated prior to final verification, resulting in equality of pairings.
We note that there is also an expired IETF draft standard that is referenced by the BLST library, which suggests to use a modified hash-to-curve function to implement proof of ownership as a protection against rogue public key attacks.
The Tuyen Optimization
The Lodestar team, at ChainSafe, wants to use a similar local randomization technique to securely aggregate multiple attestations over the same message, and have proposed The Tuyen Optimization. Similar to Vitalik’s implementation, 64-bit random numbers are generated client side and scalar multiplied with each signature during signature aggregation, creating a linear combination of points. To uphold equality in the final aggregated verification, each 64-bit random value is scalar multiplied with its corresponding public key (prior to aggregation) instead of the messages as in Vitalik’s post. This is done to maintain a common message and avoid multiple aggregate verifications which is the heart of the optimization. It was found that aggregation and then single verification can be upwards of 4x faster due to the single pairing computation.
In this report we present a formal proof that the Tuyen Optimization is correct. We also explore the security aspects of applying randomness to the public keys instead of the messages as suggested by Vitalik.
Aggregation over Common Message
Here we discuss why a direct aggregation of BLS signatures over a common message works, and more importantly the potential vulnerability, for mitigation. First, we briefly cover some of the properties of bilinear pairings that are useful for proving validity of aggregated BLS signature verification adapted from Menezes.
Pairings
A pairing, or bilinear map, is a function
between three groups G_1,G_2, and G_T of prime order p, with generators g_1 = \langle G_1 \rangle, g_2 = \langle G_2 \rangle and g_T = \langle G_T \rangle, respectively.
When G_1 = G_2, the pairing is called symmetric, otherwise it is called asymmetric. In our case the BLS pairing is asymmetric.
A bilinear pairing on (G_1, G_2, G_T) is a map:
that satisfies the following conditions:
- Bilinearity: For all u \in G_1, v \in G_2, and a,b \in \mathbb{Z}_p,
- Non-degeneracy: e(g_1, g_2) \neq 1_{G_t}. (recall g_1, g_2 are generators of the G_1 and G_2)
BLS Signatures
For a message m \in \{0,1\}^*, a private key sk \in \mathbb{Z}_p, and a corresponding public key
the signature on m is
where H: \{0,1\}^* \rightarrow G_2 is a hash function mapping the message to G_2 and H is generally a hash to curve function.
Note: The \cdot operation denotes scalar multiplication.
Signature Verification
Given m, pk, and \sigma, the signature is valid if
Where,
Naive Aggregation over Common Message
Consider n signatures \sigma_1, \sigma_2, \dots, \sigma_n \in G_2 corresponding to a common message H(m) \in G_2, private keys sk_1, sk_2, \dots, sk_n \in \mathbb{Z}_p and public keys pk_1, pk_2, \dots, pk_n \in G_1.
Multiple signatures can be combined to only require one verification as follows:
Step 1: Aggregate Signature
The aggregated signature \sigma_{agg} is computed as:
Step 2: Aggregate Public Key
The corresponding aggregate public key is:
Step 3: Verification
The verification of the aggregate signature is done by checking:
The above proves that if the equality holds the aggregated signature is valid, implying all signatures that were aggregated are also valid.
Blinding With Tuyen Optimization
The Lodestar team has proposed the Tuyen Optimization for signature aggregation where random values r_i \in \mathbb{Z} are scalar multiplied with the public keys pk_i. This is in contrast to scalar multiplying the random values with the messages H(m_i) as suggested in the Ethereum Research blog post. From our research we believe, The Tuyen Optimization technique is novel within the Ethereum landscape and among client implementations. We pose this proof for public review/audit to formalize it validity before expanding its use within the ecosystem. If a more formal audit is deemed necessary that will also be accommodated.
In the following we show that applying blinding to the public key / signature pairs provides valid aggregated verification and adheres to security best-practices.
To verify the blinded, aggregated signature using The Tuyen Optimization, the verifier needs to check if
after applying scalar multiplications with a unique 64-bit random value r_i to each signature \sigma_i and public key pk_i pair (randomness is common to the pair) during aggregation. The proof that equality holds and therefor verification of the aggregate signatures is valid goes as follows:
\begin{aligned} e\left(g, \sum_{i=1}^{n} (r_i \cdot \sigma_i)\right) &\stackrel{3}{=} e\left(g, \sum_{i=1}^{n} (r_i sk_i \cdot H(m)) \right) & \\ &\stackrel{}{=} e\left(g, \left(\sum_{i=1}^{n} r_i sk_i\right) \cdot H(m) \right) &\\ &\stackrel{1}{=} e\left(\left( \sum_{i=1}^{n} r_i sk_i\right) \cdot g, H(m) \right) &\\ &\stackrel{}{=} e\left(\sum_{i=1}^{n} (r_i sk_i \cdot g), H(m) \right) & &\stackrel{2}{=} e\left(\sum_{i=1}^{n} (r_i \cdot pk_i), H(m)\right) \end{aligned}
The above proves that if the equality holds, the blinded, aggregated signature is valid.
Further Considerations
Eth Research Post
We note that Vitalik’s post has been “community audited” but not formally proven/audited/verified that we can find aside from here. In the comments section of the original comment, there is consideration of aggregating over public keys when the message is common. Vitalik mentions that it is well known to aggregate over public keys for common messages. We think they say this assuming over aggregated attestations because the verification of the individual signature pairs has already been done, so there is no chance to introduce a rogue key attack. In our case that aggregation is happening prior to verification which opens up the attack surface.
Security
When aggregating signatures in the naive way attackers can craft signature/message pairs that are not legitimate and cancel each other out (add to zero) within the linear combination that is computed during aggregation. Consequently, invalid signatures can be hidden and pass verification. Applying randomization to “blind” every signature in the aggregation is a technique used to help prevent these types of attacks.
There is a published security proof by Dan Boneh for aggregating securely with public keys. The above report outlines that what is done in the Tuyen Optimzation is commensurate with what is mentioned in the “Batch Verification” section. The paper addresses signing and verification, and could be used to support the security of Tuyen Optimization. It is in our opinion that the approaches put forth by Dan Boneh are more intricate than is necessary, or required, due to the imbued security considerations of the Ethereum protocol.
Rogue key attacks are also referenced in the BLS IETF draft and in the Ethereum Specification where proof-of-possession is considered necessary for mitigation when aggregating signatures. Specifically, the Beacon Node Specifications require that validator signatures be verified prior to being allowed to attest to chain state. That check is done in apply_deposits
It is our opinion, that between proof-of-possession and the blinding techniques involved in The Tuyen Optimization, rogue key attacks are mitigated and the solution meets security best-practices.
Acknowledgements
Special thanks to some amazing people who helped put this together:
- Tuyen Nguyen @twoeths
- Sebastian Lindner
- Cayman Nava @wemeetagain