Rishab Goyal Venkata Koppula Brent Waters

Slides:



Advertisements
Similar presentations
Quantum Software Copy-Protection Scott Aaronson (MIT) |
Advertisements

Simulation-sound NIZK Proofs for a Practical Language and Constant Size Group Signatures Jens Groth University of California Los Angeles Presenter: Eike.
Many-to-one Trapdoor Functions and their Relations to Public-key Cryptosystems M. Bellare S. Halevi A. Saha S. Vadhan.
Lattices, Cryptography and Computing with Encrypted Data
Probabilistic Public Key Encryption with Equality Test Duncan S. Wong Department of Computer Science City University of Hong Kong Joint work with Guomin.
Secure Evaluation of Multivariate Polynomials
CS555Topic 191 Cryptography CS 555 Topic 19: Formalization of Public Key Encrpytion.
Outsourcing Private RAM Computation Daniel Wichs Northeastern University with: Craig Gentry, Shai Halevi, Mariana Raykova.
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
1 Identity-Based Encryption form the Weil Pairing Author : Dan Boneh Matthew Franklin Presentered by Chia Jui Hsu Date :
A Designer’s Guide to KEMs Alex Dent
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
ON THE PROVABLE SECURITY OF HOMOMORPHIC ENCRYPTION Andrej Bogdanov Chinese University of Hong Kong Bertinoro Summer School | July 2014 based on joint work.
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
Simons Institute, Cryptography Boot Camp
Cramer-Shoup is Plaintext Aware in the Standard Model Alexander W. Dent Information Security Group Royal Holloway, University of London.
Circular-Secure Encryption from Decision Diffie-Hellman Dan Boneh Shai Halevi Mike Hamburg Rafail Ostrovsky.
Lecture 11 Chosen-Ciphertext Security Stefan Dziembowski MIM UW ver 1.0.
1 Lect. 13 : Public Key Encryption RSA ElGamal. 2 Shamir Rivest Adleman RSA Public Key Systems  RSA is the first public key cryptosystem  Proposed in.
CS555Spring 2012/Topic 111 Cryptography CS 555 Topic 11: Encryption Modes and CCA Security.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
On the Communication Complexity of SFE with Long Output Daniel Wichs (Northeastern) joint work with Pavel Hubáček.
Succinct Functional Encryption: d Reusable Garbled Circuits and Beyond
Witness Encryption and Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption Craig Gentry IBM Allison Lewko Columbia Amit.
Obfuscation of Probabilistic Circuits Ran Canetti, Huijia Lin Stefano Tessaro, Vinod Vaikuntanathan.
China Summer School on Lattices and Cryptography Craig Gentry and Shai Halevi June 3, 2014 Fully Homomorphic Encryption and Bootstrapping.
Online/Offline Attribute-Based Encryption Brent WatersSusan Hohenberger Presented by Shai Halevi.
The Many Faces of Garbled Circuits MIT Vinod Vaikuntanathan.
A plausible approach to computer-aided cryptographic proofs (a collection of thoughts) Shai Halevi – May 2005.
Packing Techniques for Homomorphic Encryption Schemes Scott Thompson CSCI-762 4/28/2016.
Bounded key-dependent message security
Lower Bounds on Assumptions behind Indistinguishability Obfuscation
Adaptively Secure Multi-Party Computation from LWE (via Equivocal FHE)
Cryptography Lecture 5 Arpita Patra © Arpita Patra.
Group theory exercise.
Secrecy of (fixed-length) stream ciphers
Topic 14: Random Oracle Model, Hashing Applications
Course Business I am traveling April 25-May 3rd
Cryptographic Hash Functions Part I
Semantic Security and Indistinguishability in the Quantum World
Cryptography Lecture 12.
B504/I538: Introduction to Cryptography
Cryptography Lecture 4.
Verifiable Oblivious Storage
Risky Traitor Tracing and New Differential Privacy Negative Results
Topic 30: El-Gamal Encryption
Cryptography Lecture 6.
B504/I538: Introduction to Cryptography
Soundness of Formal Encryption in the Presence of Key Cycles
Cryptography for Quantum Computers
Cryptography Lecture 25.
Cryptography Lecture 11.
Cryptographic protocols 2016, Lecture 3 Key Exchange, CDH, DDH
Cynthia Dwork Moni Naor Guy Rothblum
Cryptographic protocols 2015, Lecture 3 Key Exchange, CDH, DDH
Cryptographic Hash Functions Part I
Cryptography Lecture 8.
Cryptography Lecture 6.
Non-Trivial Witness Encryption and Null-
Cryptography Lecture 7.
Impossibility of SNARGs
Cryptography Lecture 3.
The power of Pairings towards standard model security
Oblivious Transfer.
Cryptography Lecture 10.
Cryptography Lecture 21.
Cryptography Lecture 25.
Cryptography Lecture 24.
Cryptography Lecture 23.
Presentation transcript:

Rishab Goyal Venkata Koppula Brent Waters Separating IND-CPA and Circular Security for Unbounded Length Key Cycles Rishab Goyal Venkata Koppula Brent Waters

Key Dependent Message Security [BlackRogawayShrimpton02] Plaintexts dependent on secret key Encrypted Storage Systems (e.g., BitLocker) Anonymous Credential Systems [CamenischLysyanskaya01] Gentry’s Bootstrapping [Gentry09] .... Semantic (IND-CPA) security might not be sufficient Let’s start by talking about …

n-Circular Encryption [CamenischLysyanskya01] All-or-Nothing Sharing Credentials PK1 PK2 . . . PKn Secret SK1 SK2 . . . SKn The most common example where we see key dependent messages in practice is … “A user who allows a friend to use one of her credentials once, gives him the ability to use all of her credentials, i.e., taking over her identity. “ EncPK1(SK2) . . . EncPKn-1(SKn) EncPKn(SK1)

n-Circular Security BDDH [BonehHamburgHaleviOstrovysky08] PK1 PK1 . . . . . . +ve Results PKn BDDH [BonehHamburgHaleviOstrovysky08] LWE [ApplebaumCashPeikertSahai09] Extensions [BG10, BHHI10, BGK11, App11, MTY11, BV11, AP12] PKn EncPK1(SK2) EncPK1(0) . . . . . . EncPKn(SK1) EncPKn(0)

Does IND-CPA imply n-Circular Security?

Negative Results n = 2 Bilinear Groups [AcarBelenkiyBellareCash10, CashGreenHohenberger12] LWE [BishopHohenbergerWaters15] n ≥ 3 Obfuscation [KoppulaRamchenWaters15, MarcedoneOrlandi16] LWE [KoppulaWaters16, AlamatiPeikert16] So, what does this suggest?

A Closer Look … iO [KRW15] LWE [AP16, KW16] Theorem. ∀ n, ∃ IND-CPA secure encryption scheme E that is not n-circular secure. For every scheme E, does there exist a parameter n such that it is n-circular secure? So, what does this suggest? These are contrived schemes. This leaves door open for each scheme to have a cycle length property such that it is circular secure for that length. This would mean that every scheme is circular secure for some parameter.

A Closer Look … Assuming iO New Theorem. ∃ IND-CPA secure encryption scheme E such that ∀ n, it is not n-circular secure. For every scheme E, does there exist a parameter n such that it is n-circular secure? So, what does this suggest? These are contrived schemes. This leaves door open for each scheme to have a cycle length property such that it is circular secure for that length. This would mean that every scheme is circular secure for some parameter.

Indistinguishability Obfuscation [BarakGoldreichImpagliazzoRudichSahaiVadhanYang01] Compiling functionally equivalent programs to indistinguishable programs ≣ P0 P1 O O O(P0) O(P1)

} KRW Counterexample ……… Choose key pair = obfuscation of Decrypt ct1 as Decrypt ct2 as … Decrypt ctn as If sk1 = m, output ‘Cycle’. } ……… Inputs

} Extending KRW ……… Decrypt ct1 as Decrypt ct2 as … Decrypt ctn as Inputs Decrypt ct1 as Decrypt ct2 as … Decrypt ctn as If sk1 = m, output ‘Cycle’. Want this to work for all cycle lengths. Cycle length not a-priori known or fixed. (Q- How to defend from iO for TMs?) At first thought, it might seem iO for TMs. But it needs leveraging and input size fixed. Cycle length fixed!

An Iterative Approach …… …… EncPKn(SK1) 1 EncPK1(SK2) n 2 EncPKn-1(SKn) n - 1 EncPK2(SK3) 3 EncPKn-2(SKn-1) …… …… EncPK3(SK4)

An Iterative Approach …… …… EncPKn(SK1) 1 n EncPKn-1(SKn) EncPK1(SK3)

An Iterative Approach …… …… EncPKn(SK1) 1 n EncPKn-1(SKn) EncPK1(SK4)

An Iterative Approach 1 EncPK1(SK1) At a high level, …

Main Idea … Use FHE for cycle reduction Create a 1-cycle tester … … 1 2 n - 1 n 3 … 1 n - 1 n 3 … 1 …

Cycle Reduction: FHE Correctness :

Cycle Reduction: FHE ………… …………

1-Cycle Tester: First Attempt Choose key pair Compute = obfuscation of Output

1-Cycle Tester: First Attempt Choose key pair Compute = obfuscation of Output Intuitively secure, but how to prove under iO? IND-CPA security provable if VBB obfuscation.

1-Cycle Tester: KRW Technique Choose key pair , string s Compute = obfuscation of Output KRW trick. IND-CPA security provable under iO.

1-Cycle Tester: Proof Idea Choose key pair , string s Compute = obfuscation of Output

Putting Together … Needs Fully Homomorphic Encryption!! Use FHE for cycle reduction Create a 1-cycle tester Needs Fully Homomorphic Encryption!! Leveled HE not sufficient! 1 2 n - 1 n 3 … 1 n - 1 n 3 … 1 … Not known from standard assumption or even iO.

An Alternative Approach 1 EncPKn(SK1) EncPK1(SK2) n 2 EncPKn-1(SKn) n - 1 EncPK2(SK3) 3 EncPKn-2(SKn-1) …… …… EncPK3(SK4)

An Alternative Approach 1 EncPK1(SK2) 2 EncPKn-1(SK1) n - 1 EncPK2(SK3) 3 EncPKn-2(SKn-1) …… …… EncPK3(SK4)

An Alternative Approach 1 EncPK1(SK2) 2 EncPKn-2(SK1) EncPK2(SK3) 3 …… …… EncPK3(SK4)

An Alternative Approach 1 EncPK1(SK1) At a high level, …

Summarizing … Use FHE for cycle reduction Create a 1-cycle tester 2 n - 1 n 3 … 1 2 n - 1 3 … 1 … Not known from standard assumption or even iO. Leveled HE

Conclusions and Open Problems Stronger circular security counterexample. Assume existence of iO. Can it be based on more standard assumptions? Say why stronger. That is, it says IND-CPA schemes may not be circular secure for any length parameter.

Conclusions and Open Problems Stronger circular security counterexample. Assume existence of iO. Can it be based on more standard assumptions? Yes! Normally a talk ends here. But very recently, we were able to solve this problem under LWE.

Lockable Obfuscation [GKoppulaWaters17] Correctness:

Lockable Obfuscation [GKoppulaWaters17] Security:

Our Result [GKoppulaWaters17] Lockable Obfuscation All poly sized circuits* Secure under LWE Applications Attribute-Based Encryption  Predicate Encryption Circular Security Separations (Bit Encryption, Unbounded, …) Random Oracle Uninstantiability (Fujisaki-Okamoto, …) Rejecting Indistinguishability Obfuscator (riO) … ePrint: 2017/274

Thank you! Questions?