iO with Exponential Efficiency

Slides:



Advertisements
Similar presentations
Quantum Software Copy-Protection Scott Aaronson (MIT) |
Advertisements

On the Complexity of Parallel Hardness Amplification for One-Way Functions Chi-Jen Lu Academia Sinica, Taiwan.
Ran Canetti, Yael Tauman Kalai, Mayank Varia, Daniel Wichs.
Foundations of Cryptography Lecture 11 Lecturer: Moni Naor.
CS555Topic 191 Cryptography CS 555 Topic 19: Formalization of Public Key Encrpytion.
Outsourcing Private RAM Computation Daniel Wichs Northeastern University with: Craig Gentry, Shai Halevi, Mariana Raykova.
New Advances in Garbling Circuits Based on joint works with Yuval Ishai Eyal Kushilevitz Brent Waters University of TexasTechnion Benny Applebaum Tel Aviv.
Lattice-Based Cryptography
Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung.
Nir Bitansky Ran Canetti Henry Cohn Shafi Goldwasser Yael Tauman-Kalai
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
Black-Box Garbled RAM Sanjam Garg UC Berkeley Based on join works with
Shai Halevi – IBM Research PKC 2014 Multilinear Maps and Obfuscation A Survey of Recent Results.
Zeev Dvir Weizmann Institute of Science Amir Shpilka Technion Locally decodable codes with 2 queries and polynomial identity testing for depth 3 circuits.
On the Communication Complexity of SFE with Long Output Daniel Wichs (Northeastern) joint work with Pavel Hubáček.
Succinct Functional Encryption: d Reusable Garbled Circuits and Beyond
Witness Encryption and Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption Craig Gentry IBM Allison Lewko Columbia Amit.
Obfuscation of Probabilistic Circuits Ran Canetti, Huijia Lin Stefano Tessaro, Vinod Vaikuntanathan.
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
Lower Bounds on Assumptions behind Indistinguishability Obfuscation
Introduction to Obfuscation Mohammad Mahmoody University of Virginia *some slides borrowed from abhi shelat.
NIR BITANSKY, OMER PANETH, ALON ROSEN ON THE CRYPTOGRAPHIC HARDNESS OF FINDING A NASH EQUILIBRIUM.
Pseudo-random generators Talk for Amnon ’ s seminar.
China Summer School on Lattices and Cryptography Craig Gentry and Shai Halevi June 3, 2014 Fully Homomorphic Encryption and Bootstrapping.
The Many Faces of Garbled Circuits MIT Vinod Vaikuntanathan.
Practical Order-Revealing Encryption with Limited Leakage Nathan Chenette, Kevin Lewi, Stephen A. Weis, and David J. Wu Fast Software Encryption March,
Bounded key-dependent message security
Lower Bounds on Assumptions behind Indistinguishability Obfuscation
Spring School on Lattice-Based Crypto, Oxford
On the Size of Pairing-based Non-interactive Arguments
Umans Complexity Theory Lectures
Laconic Oblivious Transfer and its Applications
Modern symmetric-key Encryption
Topic 24: Finding Prime Numbers, RSA
Cryptographic protocols 2014, Lecture 2 assumptions and reductions
Secrecy of (fixed-length) stream ciphers
Secret Sharing (or, more accurately, “Secret Splitting”)
The Learning With Errors Problem
B504/I538: Introduction to Cryptography
Pseudorandomness when the odds are against you
Background: Lattices and the Learning-with-Errors problem
Risky Traitor Tracing and New Differential Privacy Negative Results
Topic 5: Constructing Secure Encryption Schemes
Topic 30: El-Gamal Encryption
Applications of Blockchains - III
Four-Round Secure Computation without Setup
Cryptography Lecture 9 Arpita Patra © Arpita Patra.
Cryptography Lecture 6.
Constrained Bipartite Vertex Cover: The Easy Kernel is Essentially Tight Bart M. P. Jansen June 4th, WORKER 2015, Nordfjordeid, Norway.
Topic 7: Pseudorandom Functions and CPA-Security
B504/I538: Introduction to Cryptography
Cryptography Lecture 7.
Cryptography for Quantum Computers
Cryptography Lecture 11 Arpita Patra © Arpita Patra.
Cryptography Lecture 25.
Rishab Goyal Venkata Koppula Brent Waters
Cryptography Lecture 11.
Exponential Time Paradigms Through the Polynomial Time Lens
On the Efficiency of 2 Generic Cryptographic Constructions
Cryptography Lecture 5.
Cryptography Lecture 8.
Non-Trivial Witness Encryption and Null-
Impossibility of SNARGs
Cryptography Lecture 10.
Cryptography Lecture 6.
Cryptography Lecture 21.
Cryptography Lecture 18.
Identity Based Encryption from the Diffie-Hellman Assumption
Cryptography Lecture 24.
Presentation transcript:

iO with Exponential Efficiency Huijia Lin (USB), Rafael Pass (Cornell) Karn Seth (Cornell -> Google) Sid Telang (Cornell -> Google)

IO Plethora of Applications May plausibly exist For example: SW14, BCP14, BZ14, GGHR14, BGL+15, CHJV14, KLW14 May plausibly exist Candidates: GGH+13b, BR’13, BGK+13, PST14, GLSW14 Avoids impossibility results for stronger notions e.g., those of BGI+01, GK05, CKP15, PS15, MMN15, LPST15

IO However: All concrete constructions based on multilinear maps [GGH13a, CLT13, GGH15, CLT15] All MLM constructions have nontrivial attacks [CHL+15, MF15,…]

May plausibly exists unconditionally Can we identify qualitatively weaker notions that suffice for applications? E.g., Compact FE -> iO [AJ15,BV15] Today: XiO (iO with “exponential efficiency”) May plausibly exists unconditionally

Recap: IO C1 = C2

Recap: IO C1 iO = C2 iO

Recap: IO C1 iO(C1) iO = ≈ C2 iO(C2) iO

“Inefficient” iO C iO(C)

“Inefficient” iO n = input length iO(C) Time to obfuscate = poly(λ, |C|) * 2n Size of obfuscation = poly(λ, |C|) * 2n

“Inefficient” iO Trivial Time to obfuscate = poly(λ, |C|) * 2n x C(x) 000 11011 001 01010 010 11111 011 11000 100 00000 101 110 11100 111 00111 C Trivial Time to obfuscate = poly(λ, |C|) * 2n Size of obfuscation = poly(λ, |C|) * 2n

“Inefficient” iO slightly nontrivial iO(C) slightly nontrivial Time to obfuscate = poly(λ, |C|) * 2n Size of obfuscation = poly(λ, |C|) * 2n(1-ϵ) for ϵ < 1

“Inefficient” iO slightly nontrivial iO(C) slightly nontrivial Time to obfuscate = poly(λ, |C|, 2n) Size of obfuscation = poly(λ, |C|) * 2n(1-ϵ) for ϵ < 1

“Exponentially Efficient” iO (XiO) iO(C) slightly nontrivial Time to obfuscate = poly(λ, |C|, 2n) Size of obfuscation = poly(λ, |C|) * 2n(1-ϵ) for ϵ < 1

Can perfect/statistical XiO exist? Is XiO useful? Can perfect/statistical XiO exist? YES dunno..

Function Compression [Kabanets and Kolokolova’13] You get black-box access to a function {0,1}n->{0,1} You can run in time poly(2n) Need to output a description of length poly(C) * 2n(1-ϵ) XiO can be viewed as “Function compression with witness”

Then, there exists “standard iO” for circuits. Theorem: Assume the existence of XiO for circuits with “short inputs” and the hardness of LWE, both with subexponential security. Then, there exists “standard iO” for circuits.

XiO + LWE -> “short-cipertext FE” Proof Outline XiO + LWE -> “short-cipertext FE” “short-ciphertext FE” + LWE -> iO [LPST’15]

Functional Encryption x Enc(x): C skC: C(x) Dec(skC, Enc(x)):

Functional Encryption If C(m0) = C(m1) m0 m1 ≈ C C

“Non-Compact” m Enc time polynomial in circuit size C

Compact/Sublinear [AJ’15,BV’15] Enc time only polylog/subliner in circuit size m C Thm [AJ’15,BV’15]: SubExp Secure Sublinear FE -> iO

“Short” FE [LPST’15] Length of ciphertext sublinear in circuit size m Length of ciphertext sublinear in circuit size |Enc(m)| = poly(λ,|m|) * |C|1-ε for ε > 0 C Thm [LPST’15]: SubExp Secure Short FE + LWE -> iO

Thm [GKP+’14,GVW’13]: LWE -> Succinct FE Succinct [GKP+14] Depends only polylogarithmically on circuit size m C (But only works for circuits with 1-bit output) Thm [GKP+’14,GVW’13]: LWE -> Succinct FE

Goal m m XiO C C Succinct FE Short FE

Idea m, i Encrypt pairs (m,i) C

Change to C’ such that C’(m, i) = yi, the ith output bit of C(m) Idea m, i Encrypt pairs (m,i) Change to C’ such that C’(m, i) = yi, the ith output bit of C(m) C’

Now, to encrypt m, instead encrypt all pairs (m,i) for 1 ≤ i ≤ t Idea m, 1 m, t Now, to encrypt m, instead encrypt all pairs (m,i) for 1 ≤ i ≤ t … C’

Idea Now, to encrypt m, instead encrypt all pairs (m,i) for 1 ≤ i ≤ t m, t Now, to encrypt m, instead encrypt all pairs (m,i) for 1 ≤ i ≤ t To decrypt, apply skC’ to each, and combine results … C’ y0 y1 yt … y =

Problem m, 1 m, t … Not sublinear C’ y0 y1 yt … y =

Ciphertext grows linearly with t, the Problem m, 1 m, t … Not sublinear Ciphertext grows linearly with t, the number of output bits of C, which is not sublinear in |C|. C’ y0 y1 yt … y =

Need to compress ciphertext Problem m, 1 m, t … Not sublinear Ciphertext grows linearly with t, the number of output bits of C, which is not sublinear in |C|. C’ Need to compress ciphertext y0 y1 yt … y =

Solution i Instead of a ciphertext, release a circuit G[K,m] that, on input i, generates Enc(m,i) G[K,m] m, i

Use PRF(K,i) as encryption randomness. Solution i Instead of a ciphertext, release a circuit G[K,m] that, on input i, generates Enc(m,i) Use PRF(K,i) as encryption randomness. G[K,m] m, i

Solution i As a ciphertext: release a circuit G[K,m] that, on input i, generates Enc(m,i). Use PRF(K,i) as encryption randomness. Obfuscate the circuit using XiO to hide K and m. G[K,m] m, i

Sublinear |XiO(G[k,m])| = poly(λ, |G(k,m)|) * 2n(1-ϵ) |G[K,m]| = (PRF evaluation + Encryption) = poly(λ, |m|)

Sublinear |XiO(G[k,m])| = poly(λ, |G(k,m)|) * 2n(1-ϵ) |G[K,m]| = (PRF evaluation + Encryption) = poly(λ, |m|) Input length n = log t ≤ log |C|

Sublinear |XiO(G[k,m])| = poly(λ, |G(k,m)|) * 2n(1-ϵ) |G[K,m]| = (PRF evaluation + Encryption) = poly(λ, |m|) Input length n = log t ≤ log |C|

Sublinear |XiO(G[k,m])| = poly(λ, |G(k,m)|) * 2n(1-ϵ) ≤ poly(λ, m) * |C|(1-ϵ) |G[K,m]| = (PRF evaluation + Encryption) = poly(λ, |m|) Input length n = log t ≤ log |C|

XiO + LWE -> “short FE” TODAY: XiO + LWE -> “short FE” SubExp Secure “short FE” + LWE-> iO [LPST’15]

Then, there exists “standard iO” for circuits. Theorem: Assume the existence of XiO for circuits with “short inputs” and the hardness of LWE, both with subexponential security. Then, there exists “standard iO” for circuits.

Getting “non-trivial compression” is what makes iO hard/interesting Conclusion: Getting “non-trivial compression” is what makes iO hard/interesting

Thanks!