Verifiable Threshold Secret Sharing and Full Fair Secure Two-party Computation YE Jian-wei March 7, 2009.

Slides:



Advertisements
Similar presentations
Mix and Match: A Simple Approach to General Secure Multiparty Computation + Markus Jakobsson Bell Laboratories Ari Juels RSA Laboratories.
Advertisements

Revisiting the efficiency of malicious two party computation David Woodruff MIT.
Cryptography and Game Theory: Designing Protocols for Exchanging Information Gillat Kol and Moni Naor.
Secure Evaluation of Multivariate Polynomials
Secure Multiparty Computations on Bitcoin
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Efficient Zero-Knowledge Proof Systems Jens Groth University College London.
Efficient Two-party and Multiparty Computation against Covert Adversaries Vipul Goyal Payman Mohassel Adam Smith Penn Sate UCLAUC Davis.
Rational Oblivious Transfer KARTIK NAYAK, XIONG FAN.
CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation.
Gillat Kol joint work with Ran Raz Competing Provers Protocols for Circuit Evaluation.
Introduction to Modern Cryptography, Lecture 12 Secure Multi-Party Computation.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Yan Huang, Jonathan Katz, David Evans University of Maryland, University of Virginia Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
CS426Fall 2010/Lecture 351 Computer Security CS 426 Lecture 35 Commitment & Zero Knowledge Proofs.
Certificateless encryption and its infrastructures Dr. Alexander W. Dent Information Security Group Royal Holloway, University of London.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
Oblivious Transfer based on the McEliece Assumptions
10/25/20061 Threshold Paillier Encryption Web Service A Master’s Project Proposal by Brett Wilson.

Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
Efficient fault-tolerant scheme based on the RSA system Author: N.-Y. Lee and W.-L. Tsai IEE Proceedings Presented by 詹益誌 2004/03/02.
Jointly Restraining Big Brother: Using cryptography to reconcile privacy with data aggregation Ran Canetti IBM Research.
1 Introduction to Secure Computation Benny Pinkas HP Labs, Princeton.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Optimistic Synchronous Multi-Party Contract Signing N. Asokan, Baum-Waidner, M. Schunter, M. Waidner Presented By Uday Nayak Advisor: Chris Lynch.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Slide 1 Vitaly Shmatikov CS 380S Oblivious Transfer and Secure Multi-Party Computation With Malicious Parties.
1 Cross-Domain Secure Computation Chongwon Cho (HRL Laboratories) Sanjam Garg (IBM T.J. Watson) Rafail Ostrovsky (UCLA)
CS573 Data Privacy and Security
Efficient and Robust Private Set Intersection and multiparty multivariate polynomials Dana Dachman-Soled 1, Tal Malkin 1, Mariana Raykova 1, Moti Yung.
Oblivious Signature-Based Envelope Ninghui Li, Stanford University Wenliang (Kevin) Du, Syracuse University Dan Boneh, Stanford University.
Andrew Lindell Aladdin Knowledge Systems and Bar-Ilan University 04/09/08 CRYP-202 Legally-Enforceable Fairness in Secure Two-Party Computation.
On the Practical Feasibility of Secure Distributed Computing A Case Study Gregory Neven, Frank Piessens, Bart De Decker Dept. of Computer Science, K.U.Leuven.
13. Oktober 2010 | Dr.Marc Fischlin | Kryptosicherheit | 1 Rate-Limited Secure Function Evaluation 21. Public Key Cryptography, March 1 st, 2013 Özgür.
Identity-Based Secure Distributed Data Storage Schemes.
Slide 1 Vitaly Shmatikov CS 380S Yao’s Protocol. slide Yao’s Protocol uCompute any function securely … in the semi-honest model uFirst, convert.
Page 1 Efficient Two-Party Secure Computation on Committed Inputs Stanislaw Jarecki, UC Irvine Vitaly Shmatikov, UT Austin.
Secure two-party computation: a visual way by Paolo D’Arco and Roberto De Prisco.
TOWARDS PRACTICAL (GENERIC) ZERO-KNOWLEDGE Claudio Orlandi – Aarhus University.
Slide 1 Yao’s Protocol. slide Yao’s Protocol uCompute any function securely … in the semi-honest model uFirst, convert the function into a boolean.
Introduction to Modern Cryptography Sharif University Spring 2015 Data and Network Security Lab Sharif University of Technology Department of Computer.
1 Cryptography NOTES. 2 Secret Key Cryptography Single key used to encrypt and decrypt. Key must be known by both parties. Assuming we live in a hostile.
On the Communication Complexity of SFE with Long Output Daniel Wichs (Northeastern) joint work with Pavel Hubáček.
1 Secure Multi-party Computation Minimizing Online Rounds Seung Geol Choi Columbia University Joint work with Ariel Elbaz(Columbia University) Tal Malkin(Columbia.
Succinct Functional Encryption: d Reusable Garbled Circuits and Beyond
Digital Signatures, Message Digest and Authentication Week-9.
The Paillier Cryptosystem
Non-Interactive Verifiable Computing August 5, 2009 Bryan Parno Carnegie Mellon University Rosario Gennaro, Craig Gentry IBM Research.
Secure Computation Lecture Arpita Patra. Recap >> Improving the complexity of GMW > Step I: Offline: O(n 2 c AND ) OTs; Online: i.t., no crypto.
Multi-Party Proofs and Computation Based in part on materials from Cornell class CS 4830.
Secure Computation Lecture Arpita Patra. Recap > Shamir Secret-sharing > BGW Protocol based on secret-sharing > Offline/Online phase > Creating.
Efficient Private Matching and Set Intersection Mike Freedman, NYU Kobbi Nissim, MSR Benny Pinkas, HP Labs EUROCRYPT 2004.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Second Price Auctions A Case Study of Secure Distributed Computing Bart De Decker Gregory Neven Frank Piessens Erik Van Hoeymissen.
 5.1 Zero-Knowledge Proofs  5.2 Zero-Knowledge Proofs of Identity  5.3 Identity-Based Public-Key Cryptography  5.4 Oblivious Transfer  5.5 Oblivious.
Verifiable Distributed Oblivious Transfer and Mobile-agent Security Speaker: Sheng Zhong (joint work with Yang Richard Yang) Yale University.
Cryptographic methods. Outline  Preliminary Assumptions Public-key encryption  Oblivious Transfer (OT)  Random share based methods  Homomorphic Encryption.
Multi-Party Computation r n parties: P 1,…,P n  P i has input s i  Parties want to compute f(s 1,…,s n ) together  P i doesn’t want any information.
Security Outline Encryption Algorithms Authentication Protocols
Advanced Computer Networks
Course Business I am traveling April 25-May 3rd
Cryptography CS 555 Lecture 22
Cryptography for Quantum Computers
Cryptography CS 555 Digital Signatures Continued
Helen: Maliciously Secure Coopetitive Learning for Linear Models
Oblivious Transfer.
Presentation transcript:

Verifiable Threshold Secret Sharing and Full Fair Secure Two-party Computation YE Jian-wei March 7, 2009

outline Full fair secure two-party computation – Problem – Existing methods Our method – Overview – Advantages – Cryptography foundation – New Full Fair Secure Two-party Computation Protocol

Full fair secure two-party computation ——problem two parties A with input x and B with input y jointly compute a two output function f(x,y)=(f A (x,y), f B (x,y)) Secure: A learn only x and f A (x,y) B learn only y and f B (x,y) Fair: A learns f A (x,y) iff B learns f B (x,y)

For security – Garbled circuit computation For fairness – gradual release technique – Methods employing trusted third party Full fair secure two-party computation ——existing methods

gradual release technique Without third parties at the cost of many rounds of interaction impossible to get full fairness Full fair secure two-party computation ——existing methods

Methods employing trusted third party full fairness the trusted third party must be neutral (doesn’t collude with A or B) single point of failure the performance bottleneck Full fair secure two-party computation ——existing methods

Our method——overview full fairness employ Yao’s garbled circuit computation for security employ a group of servers as the third party for full fairness

Our method——advantages 1. Weakening the trust assumption. Our method doesn’t require all third-party servers are trusted, but just require more than two-third of them are honest. 2. Protection against collusion. Our method can keep the fairness when less than one-third of the servers are dishonest (or malicious) and collude with the any party.

Our method——advantages 3. Fault-tolerance. In our method, not all servers must be always available. More precisely, when the count of the dishonest servers is m, only 3m+1 servers are needed simultaneously.

Our method——Cryptography foundation 1. Garbled circuit computation 2. Verifiable encryption scheme of Jarecki and Shmatikov (sCS encryption scheme) 3. zero-knowledge proof (ZKP) protocols of Jarecki and Shmatikov 4. Verifiable threshold secret sharing (VTSS) scheme of Pedersen

Garbled circuit computation 1. A constructs a boolean circuit, C, computing f(x,y) 2. A garbles C to GC 3. A sends GC, the garbled x and the cleartext interpretation of f B (x,y) to B 4. B gets the garbled y form A 5. B computes GC and gets its output, garbled f A (x,y) and garbled f B (x,y) 6. B ungarbles the garbled f B (x,y) to get f B (x,y) by the cleartext interpretation of f B (x,y) 7. B sends the garbled f A (x,y) to A 8. A ungarbles the garbled f A (x,y) to get f A (x,y)

sCS encryption scheme a simplification of the verifiable encryption scheme of Camenisch and Shoup semantically secure in CRS model under DCR assumption and safe RSA moduli. a very strong unambiguous encryption. a ciphertext that passes a certain proof system cannot decrypt to two different plaintexts under two different private keys. Moreover, no two distinct decryption keys can decrypt a ciphertext even to the same plaintext.

sCS encryption scheme CRS.

sCS encryption scheme sCS encryption.

sCS encryption scheme sCS decryption.

ZKP protocols of Jarecki and Shmatikov Relying on the Unambiguity of sCS encryption scheme, Jarecki and Shmatikov proposed the sCS commitment scheme and a group of efficient concurrently secure ZKP protocols. sCS commitment scheme

ZKP protocols of Jarecki and Shmatikov ZKP protoclos – ZKDL( ɡ, X) is used to prove that there exists a x s.t. X 2 = ɡ 2x. – ZKNotEq(C a, C b ) is used to prove that C a, C b are sCS commitments to different values. – ZKPlainEq((u, e),C k, C m ) is used to prove that (u, e) is a sCS encryption of cleartext m committed (sCS commitment) in C m under the key k committed in C k.

VTSS scheme of Pedersen Pedersen gave a semantically secure commitment scheme based on the difficulty of discrete logarithm problem, and proposed a VTSS scheme in the CRS model by it. CRS

VTSS scheme of Pedersen Pedersen’s commitment scheme

VTSS scheme of Pedersen Sharing and Verifying process

New Full Fair Secure Two-party Computation Protocol New ZKP protocol ZKEq( C K D,C K D ) prove that the sCS commitment C K D commits the same value as the Pedersen’s commitment C K D

New Full Fair Secure Two-party Computation Protocol——overview In usual garbled circuit computation A send the cleartext interpretation of f B (x,y) to B, therefore the circuit evaluator B may not send garbled f A (x,y) to A after get his output f B (x,y). In our protocol A commits all output wire keys corresponding f B (x,y) in GC A shares a private key K D ∈ [0,2 k′′ ] among a group of third- party servers by VTSS scheme of Pedersen A provides B an encrypted cleartext interpretation of f B (x,y), CI B

New Full Fair Secure Two-party Computation Protocol——overview By correctly performing all ZKP protocols involved in following formula with A and verifying process of Pedersen’s VTSS scheme, B is convinced that CI B is correctly constructed and able to be decrypted with the key (i.e. K D ) shared in the servers, and he can retrieve the key to decrypt CI B as long as sending correct output keys corresponding to f A (x,y) to the servers.

New Full Fair Secure Two-party Computation Protocol——overview

After sending correct output wire keys corresponding to f A (x,y) to the servers, B gets enough shares of K D to retrieve it and compute his output f B (x,y). Henceforth, A can compute his output f A (x,y) even if B sends him wrong output wire keys by obtaining correct these from the servers.

New Full Fair Secure Two-party Computation Protocol——protocol

New Full Fair Secure Two-party Computation Protocol——analyse Fairness When the amount of dishonest servers m is less than s/3 , our protocol is able to guarantee that A learns f A (x,y) iff B learns f B (x,y). Complexity Computational complexity is O(S+s 2 ) Communication complexity is O(S+s) only two additional interaction rounds for full fair where S is the size of the circuit and s is the amount of employed servers.

END! THANKS!