Advanced Protocols.

Slides:



Advertisements
Similar presentations
Secure Evaluation of Multivariate Polynomials
Advertisements

296.3Page :Algorithms in the Real World Error Correcting Codes II – Cyclic Codes – Reed-Solomon Codes.
Introduction to Modern Cryptography, Lecture 11 1) More about efficient computation: Montgomery arithmetic, efficient exponentiation 2)Secret Sharing schemes.
Eran Omri, Bar-Ilan University Joint work with Amos Beimel and Ilan Orlov, BGU Ilan Orlov…!??!!
Secure Multi-party Computations (MPC) A useful tool to cryptographic applications Vassilis Zikas.
Elliptic Curve. p2. Outline EC over Z p EC over GF(2 n )
Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung.
Secret Sharing Algorithms
Identity Base Threshold Proxy Signature Jing Xu, Zhenfeng Zhang, and Dengguo Feng Form eprint Presented by 魏聲尊.
DANSS Colloquium By Prof. Danny Dolev Presented by Rica Gonen
ON MULTIVARIATE POLYNOMIAL INTERPOLATION
Polynomial Factorization Olga Sergeeva Ferien-Akademie 2004, September 19 – October 1.
Great Theoretical Ideas in Computer Science.
Chapter 2: Vector spaces
Robust Sharing of Secrets when the Dealer Is Honest or Cheating Tal Rabin 1994 Brian Fry COEN
Secure Computation (Lecture 7-8) Arpita Patra. Recap >> (n,t)-Secret Sharing (Sharing/Reconstruction) > Shamir Sharing > Lagrange’s Interpolation for.
Introduction to Numerical Analysis I MATH/CMPSC 455 Interpolation.
Secure Computation (Lecture 5) Arpita Patra. Recap >> Scope of MPC > models of computation > network models > modelling distrust (centralized/decentralized.
DISTRIBUTED CRYPTOSYSTEMS Moti Yung. Distributed Trust-- traditionally  Secret sharing: –Linear sharing over a group (Sum sharing) gives n out of n sharing.
Great Theoretical Ideas in Computer Science.
On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase Ronald Cramer, Ivan Damgard, Serge Fehr.
Communication vs. Computation S Venkatesh Univ. Victoria Presentation by Piotr Indyk (MIT) Kobbi Nissim Microsoft SVC Prahladh Harsha MIT Joe Kilian NEC.
Great Theoretical Ideas in Computer Science.
Lecture 14 Multi-party Computation Protocols Stefan Dziembowski MIM UW ver 1.0.
Attribute-Based Encryption
Secure Computation Lecture Arpita Patra. Recap > Shamir Secret-sharing > BGW Protocol based on secret-sharing > Offline/Online phase > Creating.
The Pennsylvania State University CSE597B: Special Topics in Network and Systems Security The Miscellaneous Instructor: Sencun Zhu.
1 Lect. 19: Secret Sharing and Threshold Cryptography.
Every polynomial P(x) of degree n>0 has at least one zero in the complex number system. N Zeros Theorem Every polynomial P(x) of degree n>0 can be expressed.
Polynomial P(x) Linear Factors Solutions of P(x)=0 Zeros of P(x) P(x) = 0.
Secret Sharing Schemes: A Short Survey Secret Sharing 2.
Linear, Nonlinear, and Weakly-Private Secret Sharing Schemes
Multi-Party Computation r n parties: P 1,…,P n  P i has input s i  Parties want to compute f(s 1,…,s n ) together  P i doesn’t want any information.
Cryptographic Protocols Secret sharing, Threshold Security
Availability Availability - A(t)
Great Theoretical Ideas in Computer Science
On the Size of Pairing-based Non-interactive Arguments
Numerical Analysis Lecture 25.
Roots and Zeros 5.7.
Notes Over 3.4 The Rational Zero Test
Algebra II Explorations Review ( )
3.8 Complex Zeros; Fundamental Theorem of Algebra
Elliptic Curves.
Secret Sharing (or, more accurately, “Secret Splitting”)
Cryptography CS 555 Lecture 22
Interpolation.
Polynomials, Secret Sharing, And Error-Correcting Codes
Fuzzy Identity Based Encryption
ElGamal Public-Key Systems over GF(p) & GF(2m)
RS – Reed Solomon List Decoding.
The Curve Merger (Dvir & Widgerson, 2008)
Find all solutions of the polynomial equation by factoring and using the quadratic formula. x = 0 {image}
Polynomials, Secret Sharing, And Error-Correcting Codes
Fundamental Theorem of Algebra
Secret Sharing Schemes using Visual Cryptography
Secret Sharing CPS Computer Security Nisarg Raval Sep 24, 2014
Linear Algebra Lecture 3.
Threshold RSA Cryptography
Secret Sharing and Applications
For ASIACRYPT 2018 Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem Fuyou Miao University of Science and Technology of China.
Secret Sharing: Linear vs. Nonlinear Schemes (A Survey)
A Novel Secret Sharing Scheme from Audio Perspective
CS21 Decidability and Tractability
Some New Issues on Secret Sharing Schemes
Cryptology Design Fundamentals
CS151 Complexity Theory Lecture 7 April 23, 2019.
Cryptographic Protocols Secret Sharing, Threshold Security
Secret Sharing CPS Computer Security Nisarg Raval Sep 24, 2014
Homework #3 Consider a verifyable secret sharing scheme (VSS) based on Shamir's polynomial secret sharing as follows. A dealer has a secret S, a public.
Introduction to Modern Cryptography
Presentation transcript:

Advanced Protocols

Things we don’t know The millionaires problem Secretly computing the average salary of n users Online gambling 1-on-1 poker is difficult enough Even agreeing on a common random bit is not easy Electronic elections

Computing the average Example How do we do t-private? Honest but curious, 1-private, single user output Honest but curious, fully private, single user output How do we do t-private?

Secret sharing Motivation “Definition” Access structure Dealer Secret Shares of secret Sets that can reconstruct secret Sets that have no information Access structure General structure Threshold structure

Threshold secret sharing Access structure includes all subsets with at least t+1 participants Example I n-1 threshold over a finite group Impossibility of secret sharing over an infinite domain Example II Threshold of 1

Polynomial interpolation F is a finite field and p(x) is a polynomial over F Theorem: If |F|≥t+1 then any t+1 pairs (xi,p(xi)) uniquely determine a degree t polynomial that passes through these points Lagrange interpolation t monomials of the type [(x-x1)*…*(x-xt+1)]/[(xi-x1)*…*(xi-xt+1)]*p(xi) t+1 points uniquely determine p(0) t points give no information on p(0) No information Pr[secret=s|t shares]=Pr[secret=s]

Shamir secret sharing A threshold secret sharing scheme for a parameter t Let the secret s be an element in a finite field F, |F|>n. The i-the participant is associated with a unique element xiF, all participants know x1,…,xn The dealer chooses a polynomial p(x) of degree t over F such that P(0)=s (this is also the free coefficient) The other coefficients of p(x) are random elements in F The i-th share is p(xi)

Shamir secret sharing (cont.) Reconstruction Sets of at least t+1 can perform Lagrange interpolation on pairs (xi,p(xi)) Secrecy A set of at most t parties learns nothing because any secret is still possible Can the dealer lie? Yes, but we’re not dealing with it right now (semi-honest assumption)

Examples What can be computed locally Shamir secret sharing of s in F, compute locally secret sharing of a*s for public value aF Shamir secret sharing of s1, s2 in F, compute locally secret sharing of s1+s2 in F Example - Computing the average with a threshold of t Example - Proactive secret sharing Periodically adding a zero

Linear functions on secrets Model n parties The i-th party has secret si in field F, S=(s1,…,sn) All parties know a fixed nXn matrix A={ai,j} Compute Y=AS Required threshold t Solution The i-th party is a dealer in a Shamir secret sharing for secret si using polynomial pi(x) (i.e. pi(0)=si ) If Y={yj} then yj=iaji*si, which is the free coefficient of qj(x)= iaji*pi(x) Each party uses its shares of p1(x),…,pn(x) to locally compute q1(x),…,qn(x)