Practical Order-Revealing Encryption with Limited Leakage Nathan Chenette, Kevin Lewi, Stephen A. Weis, and David J. Wu Fast Software Encryption March,

Slides:



Advertisements
Similar presentations
Quantum Software Copy-Protection Scott Aaronson (MIT) |
Advertisements

Simulation-sound NIZK Proofs for a Practical Language and Constant Size Group Signatures Jens Groth University of California Los Angeles Presenter: Eike.
Adaptively Attribute-Hiding ( Hierarchical ) Inner Product Encryption
Technische Universität Ilmenau CCSW 2013 Sander Wozniak
Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 1-7: Short Recap.
Probabilistic Public Key Encryption with Equality Test Duncan S. Wong Department of Computer Science City University of Hong Kong Joint work with Guomin.
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Foundations of Cryptography Lecture 11 Lecturer: Moni Naor.
Semi-Honest to Malicious Oblivious-Transfer The Black-box Way Iftach Haitner Weizmann Institute of Science.
CMSC 414 Computer (and Network) Security Lecture 4 Jonathan Katz.
11 Provable Security. 22 Given a ciphertext, find the corresponding plaintext.
CIS 5371 Cryptography 3b. Pseudorandomness.
Foundations of Cryptography Lecture 13 Lecturer: Moni Naor.
S EMANTICALLY - SECURE FUNCTIONAL ENCRYPTION : P OSSIBILITY RESULTS, IMPOSSIBILITY RESULTS AND THE QUEST FOR A GENERAL DEFINITION Adam O’Neill, Georgetown.
Foundations of Cryptography Lecture 12 Lecturer: Moni Naor.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
CMSC 414 Computer and Network Security Lecture 4 Jonathan Katz.
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
1 Constructing Pseudo-Random Permutations with a Prescribed Structure Moni Naor Weizmann Institute Omer Reingold AT&T Research.
CS555Spring 2012/Topic 41 Cryptography CS 555 Topic 4: Computational Approach to Cryptography.
Foundations of Cryptography Lecture 10: Pseudo-Random Permutations and the Security of Encryption Schemes Lecturer: Moni Naor Announce home )deadline.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Computer Security CS 426 Lecture 3
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
Toward a Statistical Framework for Source Anonymity in Sensor Networks.
Cryptography Lecture 8 Stefan Dziembowski
Jim McLeod MyDBA  SQL Server Performance Tuning Consultant with MyDBA  Microsoft Certified Trainer with SQLskills Australia 
1 CIS 5371 Cryptography 3. Private-Key Encryption and Pseudorandomness B ased on: Jonathan Katz and Yehuda Lindel Introduction to Modern Cryptography.
Mohammad Ahmadian COP-6087 University of Central Florida.
Chapter 20 Symmetric Encryption and Message Confidentiality.
A Linear Lower Bound on the Communication Complexity of Single-Server PIR Weizmann Institute of Science Israel Iftach HaitnerJonathan HochGil Segev.
CSCI 5857: Encoding and Encryption
CS555Spring 2012/Topic 111 Cryptography CS 555 Topic 11: Encryption Modes and CCA Security.
Cryptography Lecture 2 Arpita Patra. Summary of Last Class  Introduction  Secure Communication in Symmetric Key setting >> SKE is the required primitive.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Confidentiality Confidentiality is maintained so long as private keys are secure. Authenticity is possible via public-key encryption by encrypting messages.
On the Communication Complexity of SFE with Long Output Daniel Wichs (Northeastern) joint work with Pavel Hubáček.
1 Message authentication codes, modes of operation, and indifferentiability Kan Yasuda (NTT, Japan) ASK 2011 Aug. 31, Singapore.
© copyright NTT Information Sharing Platform Laboratories Cryptographic Approach to “Privacy-Friendly” Tags Miyako Ohkubo, Koutarou Suzuki, and Shingo.
CS555Spring 2012/Topic 31 Cryptography CS 555 Topic 3: One-time Pad and Perfect Secrecy.
Introduction to Obfuscation Mohammad Mahmoody University of Virginia *some slides borrowed from abhi shelat.
A New Paradigm of Hybrid Encryption Scheme Kaoru Kurosawa, Ibaraki Univ. Yvo Desmedt, UCL and FSU.
CS555Spring 2012/Topic 81 Cryptography CS 555 Topic 8: Pseudorandom Functions and CPA Security.
Cryptography Lecture 10 Arpita Patra © Arpita Patra.
All Your Queries are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou University.
@Yuan Xue CS 285 Network Security Block Cipher Principle Fall 2012 Yuan Xue.
SSE-2 Step1: keygen(1 k ):s {0,1} k,output K=s Step2:Buildindex(K,D): 建立 table T, p=word bit+max bit R 假設 w 1 出現在 D 1,D 3 T[π s (w 1 ||1)]=D 1 T[π s (w.
A plausible approach to computer-aided cryptographic proofs (a collection of thoughts) Shai Halevi – May 2005.
Cryptography Lecture 5 Arpita Patra © Arpita Patra.
iO with Exponential Efficiency
Authenticated encryption
Modern symmetric-key Encryption
Secrecy of (fixed-length) stream ciphers
Introduction to modern cryptology
Cryptographic Hash Functions Part I
Semantic Security and Indistinguishability in the Quantum World
Cryptography Lecture 12.
Verifiable Oblivious Storage
Topic 5: Constructing Secure Encryption Schemes
CMSC 414 Computer and Network Security Lecture 3
Cryptography Lecture 6.
Cryptographic Hash Functions Part I
Cryptography Lecture 4.
Cryptography Lecture 5.
Cryptography Lecture 12.
Cryptography Lecture 7.
Cryptography Lecture 11.
Presentation transcript:

Practical Order-Revealing Encryption with Limited Leakage Nathan Chenette, Kevin Lewi, Stephen A. Weis, and David J. Wu Fast Software Encryption March, 2016

Order-Revealing Encryption [BRLSZZ15] Client Server secret-key encryption scheme

Order-Revealing Encryption [BRLSZZ15] Server Application: range queries / binary search on encrypted data

Order-Revealing Encryption [BRLSZZ15] given any two ciphertexts there is a publically evaluatable function that evaluates the comparison function

Defining Security Starting point: semantic security (IND-CPA) [GM84] challenger adversary

Best-Possible Security [BCLO09] must impose restriction on messages: otherwise trivial to break semantic security using comparison operator

Best-Possible Security [BCLO09]

order of “left” set of messages same as order of “right” set of messages

Existing Approaches

Multilinear-map-based Solution [BRLSZZ15] Much more efficient than general purpose indistinguishability obfuscation Achieves best-possible security Security of multilinear maps not well-understood Still quite inefficient (e.g., ciphertexts on the order of GB)

Existing Approaches

Order-preserving encryption (OPE) [BCLO09, BCO11]: No “best-possible” security, so instead, compare with random order-preserving function (ROPF) encryption function implements a random order-preserving function domainrange

Existing Approaches Properties of a random order-preserving function [BCO’11]: Each ciphertext roughly leaks half of the most significant bits Each pair of ciphertexts roughly leaks half of the most significant bits of their difference No semantic security for even a single message!

Existing Approaches Security Efficiency General-purpose MIFE from iO Direct construction from multilinear maps OPE Something in between? Not drawn to scale

A New Security Notion Two existing security notions: IND-OCPA: strong security, but hard to achieve efficiently ROPF-CCA: efficiently constructible, but lots of leakage, and difficult to precisely quantify the leakage

A New Security Notion: SIM-ORE ??? Real WorldIdeal World

A New Security Notion: SIM-ORE

Our Construction

100101

empty prefix

Our Construction

100101

same prefix = same ciphertext block different prefix = value computationally hidden first block that differs

Our Construction: Efficiency

Our Construction: Security Security follows directly from security of the PRF Proof sketch. Simulator responds to encryption queries using random strings. Maintains consistency using leakage information (first bit that differs).

OPE Conversion In database applications, OPE preferred over ORE since it does not require changes to the DBMS (e.g., supporting custom comparator)

OPE Conversion

Note: unlike most existing OPE schemes, this OPE scheme is not a ROPF, and does not suffer from many of the security limitations of ROPFs

Comparison to Previous OPE Schemes

message space ciphertext space guess interval Window one-wayness: Much weaker than semantic security!

Comparison to Previous OPE Schemes

Composing OPE with ORE Possible to compose OPE with ORE to achieve more secure OPE scheme: Resulting construction strictly stronger than inner OPE scheme, but may not be more secure than directly applying ORE to plaintext

General-purpose MIFE from iO Direct construction from multilinear maps The Landscape of OPE/ORE Security Efficiency OPE Our construction Not drawn to scale

General-purpose MIFE from iO Direct construction from multilinear maps Directions for Future Research Security Efficiency OPE Our construction Shorter ciphertexts? New leakage functions? Best-possible ORE from standard assumptions? Not drawn to scale

Sample Implementation: Project Website:

Questions?