Round-Optimal and Efficient Verifiable Secret Sharing

Slides:



Advertisements
Similar presentations
Provable Unlinkability Against Traffic Analysis Ron Berman Joint work with Amos Fiat and Amnon Ta-Shma School of Computer Science, Tel-Aviv University.
Advertisements

Secret Sharing Protocols [Sha79,Bla79]
Secure Multiparty Computations on Bitcoin
Cryptography for Unconditionally Secure Message Transmission in Networks Kaoru Kurosawa.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
1 Vipul Goyal Abhishek Jain UCLA On the Round Complexity of Covert Computation.
CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation.
Computational Security. Overview Goal: Obtain computational security against an active adversary. Hope: under a reasonable cryptographic assumption, obtain.
Introduction to Modern Cryptography, Lecture 12 Secure Multi-Party Computation.
Eran Omri, Bar-Ilan University Joint work with Amos Beimel and Ilan Orlov, BGU Ilan Orlov…!??!!
Improving the Round Complexity of VSS in Point-to-Point Networks Jonathan Katz (University of Maryland) Chiu-Yuen Koo (Google Labs) Ranjit Kumaresan (University.
Randomized Algorithms for Reliable Broadcast (IBM T.J. Watson) Vinod Vaikuntanathan Michael Ben-OrShafi GoldwasserElan Pavlov.
Yan Huang, Jonathan Katz, David Evans University of Maryland, University of Virginia Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose.
Complexity 26-1 Complexity Andrei Bulatov Interactive Proofs.
1 Principles of Reliable Distributed Systems Lecture 6: Synchronous Uniform Consensus Spring 2005 Dr. Idit Keidar.
1 Principles of Reliable Distributed Systems Lecture 3: Synchronous Uniform Consensus Spring 2006 Dr. Idit Keidar.
Secure Multi-party Computations (MPC) A useful tool to cryptographic applications Vassilis Zikas.
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung.

Optimistic Synchronous Multi-Party Contract Signing N. Asokan, Baum-Waidner, M. Schunter, M. Waidner Presented By Uday Nayak Advisor: Chris Lynch.
Study Group Randomized Algorithms Jun 7, 2003 Jun 14, 2003.
K-Anonymous Message Transmission Luis von Ahn Andrew Bortz Nick Hopper The Aladdin Center Carnegie Mellon University.
Secure Message Transmission In Asynchronous Directed Networks Kannan Srinathan, Center for Security, Theory and Algorithmic Research, IIIT-Hyderabad. In.
Information-Theoretic Security and Security under Composition Eyal Kushilevitz (Technion) Yehuda Lindell (Bar-Ilan University) Tal Rabin (IBM T.J. Watson)
Adaptively Secure Broadcast, Revisited
How to play ANY mental game
Efficient and Robust Private Set Intersection and multiparty multivariate polynomials Dana Dachman-Soled 1, Tal Malkin 1, Mariana Raykova 1, Moti Yung.
Provable Unlinkability Against Traffic Analysis Amnon Ta-Shma Joint work with Ron Berman and Amos Fiat School of Computer Science, Tel-Aviv University.
Secure Multi-Party Quantum Computation Michael Ben-Or QCrypt 2013 Tutorial M. Ben-Or, C. Crépeau, D. Gottesman, A.Hassidim, A. Smith, arxiv.org/abs/
Robust Sharing of Secrets when the Dealer Is Honest or Cheating Tal Rabin 1994 Brian Fry COEN
Secure Computation (Lecture 7-8) Arpita Patra. Recap >> (n,t)-Secret Sharing (Sharing/Reconstruction) > Shamir Sharing > Lagrange’s Interpolation for.
Multiparty Computation Ivan Damgård BRICS, Århus University.
Secure Computation (Lecture 3 & 4) Arpita Patra. Recap >> Why secure computation? >> What is secure (multi-party) computation (MPC)? >> Secret Sharing.
Welcome to to Autumn School! Some practical issues.
Secure Computation (Lecture 5) Arpita Patra. Recap >> Scope of MPC > models of computation > network models > modelling distrust (centralized/decentralized.
1 Maximal Independent Set. 2 Independent Set (IS): In a graph G=(V,E), |V|=n, |E|=m, any set of nodes that are not adjacent.
On the Communication Complexity of SFE with Long Output Daniel Wichs (Northeastern) joint work with Pavel Hubáček.
On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase Ronald Cramer, Ivan Damgard, Serge Fehr.
Secure Computation Lecture Arpita Patra. Recap > Shamir Secret-sharing > BGW Protocol based on secret-sharing > Offline/Online phase > Creating.
PROACTIVE SECRET SHARING Or: How to Cope With Perpetual Leakage Herzberg et al. Presented by: Avinash Ravi Kevin Skapinetz.
Secure Computation with Minimal Interaction, Revisited Yuval Ishai (Technion) Ranjit Kumaresan (MIT) Eyal Kushilevitz (Technion) Anat Paskin-Cherniavsky.
Secure Computation Lecture Arpita Patra. Recap >Three orthogonal problems- (n,t)-sharing, reconstruction, multiplication protocol > Verifiable Secret.
Round-Efficient Multi-Party Computation in Point-to-Point Networks Jonathan Katz Chiu-Yuen Koo University of Maryland.
Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation Michael Ben-Or Shafi Goldwasser Avi Wigderson Lecture: Mickey Hakimi.
Multi-Party Computation r n parties: P 1,…,P n  P i has input s i  Parties want to compute f(s 1,…,s n ) together  P i doesn’t want any information.
Swarming Secrets Shlomi Dolev (BGU), Juan Garay (AT&T Labs), Niv Gilboa (BGU) Vladimir Kolesnikov (Bell Labs) Allerton 2009.
Theory of Computational Complexity Probability and Computing Chapter Hikaru Inada Iwama and Ito lab M1.
Topic 36: Zero-Knowledge Proofs
Adaptively Secure Multi-Party Computation from LWE (via Equivocal FHE)
Information Complexity Lower Bounds
Foundations of Secure Computation
TCC 2016-B Composable Security in the Tamper-Proof Hardware Model under Minimal Complexity Carmit Hazay Bar-Ilan University, Israel Antigoni Ourania.
MPC and Verifiable Computation on Committed Data
Foundations of Secure Computation
Maximal Independent Set
Oblivious Transfer and GMW MPC
Computational Molecular Biology
Byzantine-Resilient Colorless Computaton
The Round Complexity of Verifiable Secret Sharing
Course Business I am traveling April 25-May 3rd
Ranjit Kumaresan (UMD) Arpita Patra C. Pandu Rangan (IITMadras)
On the Power of Hybrid Networks in Multi-Party Computation
Agreement Protocols CS60002: Distributed Systems
Cryptography for Quantum Computers
Cryptographic protocols 2016, Lecture 9 multi-party computation
Expected Constant-Round Protocols for Broadcast
Threshold RSA Cryptography
Malicious-Secure Private Set Intersection via Dual Execution
Homework #3 Consider a verifyable secret sharing scheme (VSS) based on Shamir's polynomial secret sharing as follows. A dealer has a secret S, a public.
Presentation transcript:

Round-Optimal and Efficient Verifiable Secret Sharing Matthias Fitzi (Aarhus University) Juan Garay (Bell Labs) Shyamnath Gollakota (IIT Madras) C. Pandu Rangan (IIT Madras) Kannan Srinathan (IIIT Hyderabad)

Secret Sharing Protocols [Sha79,Bla79] Set of players P = {P1 , P2, … , Pn}, dealer D (e.g., D = P1). Two phases Sharing phase Reconstruction phase Sharing Phase D initially holds s and each player Pi finally holds some private information vi. Reconstruction Phase Each player Pi reveals (some of) his private information v’i on which a reconstruction function is applied to obtain s = Rec(v’1, v’2, …, v’n). Round-Optimal and Efficient VSS —TCC’06

Secret Sharing (cont’d) Dealer v1 v2 v3 vn Sharing Phase … Less than t +1 players have no info’ about the secret Reconstruction Phase Round-Optimal and Efficient VSS —TCC’06

Secret Sharing (cont’d) Dealer v1 v2 v3 vn Sharing Phase …  t +1 players can reconstruct the secret Secret s Reconstruction Phase Players are assumed to give their shares honestly Round-Optimal and Efficient VSS —TCC’06

Verifiable Secret Sharing (VSS) [CGMA85] Extends secret sharing to the case of active corruptions (corrupted players, incl. Dealer, may not follow the protocol) Up to t corrupted players Adaptive adversary Reconstruction Phase Each player Pi reveals (some of) his private information v’i on which a reconstruction function is applied to obtain s’ = Rec(v’1, v’2, …, v’n). Round-Optimal and Efficient VSS —TCC’06

Round-Optimal and Efficient VSS —TCC’06 VSS Requirements Privacy If D is honest, adversary has no Shannon information about s during the Sharing phase. Correctness If D is honest, the reconstructed value s’ = s. Commitment After Sharing phase, s’ is uniquely determined. Round-Optimal and Efficient VSS —TCC’06

Round-Optimal and Efficient VSS —TCC’06 Weak VSS (WSS) [RB89] Privacy If D is honest, adversary has no Shannon information about s during the Sharing phase. Correctness If D is honest, the reconstructed value s’ = s. Weak Commitment After Sharing phase, s’ is uniquely determined such that Rec(v’1, v’2, …, v’n)  {, s’}. Round-Optimal and Efficient VSS —TCC’06

Communication Model and Round Complexity Synchronous, fully connected network of pair-wise secure channels + broadcast channel. Round complexity: Number of communication rounds in the Sharing phase. Efficiency: Total computation and communication polynomial in n and size of the secret. Round-Optimal and Efficient VSS —TCC’06

Round-Optimal and Efficient VSS —TCC’06 Prior (Relevant) Work Perfect VSS possible iff n > 3t [BGW88, DDWY90] Round complexity of VSS [GIKR01] n > 4t: Efficient 2-round protocol n > 3t: No 2-round protocol exists Efficient 4-round protocol Inefficient 3-round protocol Round-Optimal and Efficient VSS —TCC’06

Round-Optimal and Efficient VSS —TCC’06 Our Contributions VSS: Efficient 3-round protocol for n > 3t WSS: Efficient 3-round protocol for n > 3t — round optimal Efficient 1-round protocol for n > 4t (1+ ) amortized-round VSS protocol for n > 3t Round-Optimal and Efficient VSS —TCC’06

Round-Optimal and Efficient VSS —TCC’06 Our Contributions VSS: Efficient 3-round protocol for n > 3t WSS: Efficient 3-round protocol for n > 3t — round optimal Efficient 1-round protocol for n > 4t (1+ ) amortized-round VSS protocol for n > 3t Round-Optimal and Efficient VSS —TCC’06

Round-Optimal and Efficient VSS —TCC’06 3-Round (n/3)-WSS Secret s Dealer Sharing Phase … v1 v2 v3 vn Reconstruction Phase Round-Optimal and Efficient VSS —TCC’06

Round-Optimal and Efficient VSS —TCC’06 3-Round (n/3)-WSS Secret s … v1 v2 v3 vn Secret s’ Reconstruction Phase Round-Optimal and Efficient VSS —TCC’06

3-Round (n/3)-WSS — Sharing Phase D selects a random bivariate polynomial F(x,y) of degree t in each variable, s.t. F(0,0) = s; sends F(x,i) = fi(x) and F(i,y) = gi(y) to Pi. Player Pi sends to Pj a random pad rij. Round 2: Pi broadcasts aij = fi(j) + rij bij = gi(j) + rji Pj broadcasts aiji = fj(i) + rji bji = gj(i) + rij F(j,i) + r Round-Optimal and Efficient VSS —TCC’06

3-Round (n/3)-WSS — Sharing Phase D selects a random bivariate polynomial F(x,y) of degree t in each variable, s.t. F(0,0) = s; sends F(x,i) = fi(x) and F(i,y) = gi(y) to Pi. Player Pi sends to Pj a random pad rij. Round 2: Pi broadcasts aij = fi(j) + rij bij = gi(j) + rji Round 3: For each aij ≠ bji Pi broadcasts fi(j) Pj broadcasts gj(i) D broadcasts F(j,i) A player is said to be unhappy if his value does not match D’s value. If no. unhappy players > t, disqualify D. Pj broadcasts aij = fj(i) + rji bji = gj(i) + rij Round-Optimal and Efficient VSS —TCC’06

3-Round (n/3)-WSS — Reconstruction Phase Every happy player Pi broadcasts fi(x) and gi(y). Local computation: Every player constructs a consistency graph G over the set of happy players: there exists an edge between Pi, Pj  G iff fi(j) = gj(i) and gi(j) = fj(i). Every player constructs a set CORE as follows: Initially all nodes with degree at least n–t in G are in CORE. Players in CORE consistent with less than n–t players in CORE are removed. Repeat until no more players can be removed from CORE. Secret determined by the polynomial defined by any t+1 players from CORE. If |CORE| < n–t, the secret is . Round-Optimal and Efficient VSS —TCC’06

3-Round (n/3)-WSS — Proof Sketch Privacy: (D is honest) D distributes consistent information  any pair of honest players publish same mutual padded values. Randomness of pads leads to indistinguishability of adversary’s view under different secrets. Correctness: (D is honest) All honest players (at least n–t) are happy  no disqualification of D in Sharing Phase. They all end up in CORE, thus the secret reconstructed is s. Round-Optimal and Efficient VSS —TCC’06

3-Round (n/3)-WSS — Proof Sketch Weak Commitment: |CORE| < n – t: All honest players output . |CORE|  n – t: All players in CORE are consistent with a polynomial fixed at the end of the Sharing Phase: The n–2t honest happy players define a unique polynomial F’(x,y) (at the end of Sharing Phase). Every dishonest happy player in CORE is consistent with at least n–t players in CORE, of which n–2t  t+1 are honest  every dishonest happy player in CORE is also consistent with F’(x,y). Round-Optimal and Efficient VSS —TCC’06

Recall: 3-Round (n/3)-WSS — Sharing Phase D selects a random bivariate polynomial F(x,y) of degree t in each variable, s.t. F(0,0) = s; sends F(x,i) = fi(x) and F(i,y) = gi(y) to Pi. Player Pi sends to Pj a random pad rij. Round 2: Pi broadcasts aij = fi(j) + rij bij = gi(j) + rji Round 3: For each aij ≠ bji Pi broadcasts fi(j) Pj broadcasts gj(i) D broadcasts F(j,i) A player is said to be unhappy if his value does not match D’s value. If no. unhappy players > t, disqualify D. Round-Optimal and Efficient VSS —TCC’06

3-Round (n/3)-VSS — Sharing Phase D selects a random bivariate polynomial F(x,y) of degree t in each variable, s.t. F(0,0) = s; sends F(x,i) = fi(x) and F(i,y) = gi(y) to Pi. Player Pi selects random ri and starts (n/3)-WSS on ri using FiW(x,y). Round-Optimal and Efficient VSS —TCC’06

3-Round (n/3)-VSS — Sharing Phase D selects a random bivariate polynomial F(x,y) of degree t in each variable, s.t. F(0,0) = s; sends F(x,i) = fi(x) and F(i,y) = gi(y) to Pi. Player Pi selects random ri and starts (n/3)-WSSi on ri using FiW(x,y). Round 2: Pi broadcasts aij = fi(j) + FiW(0,j) bij = gi(j) + FjW(0,i) Concurrently, round 2 of (n/3)- WSSi takes place. Round-Optimal and Efficient VSS —TCC’06

3-Round (n/3)-VSS — Sharing Phase D selects a random bivariate polynomial F(x,y) of degree t in each variable, s.t. F(0,0) = s; sends F(x,i) = fi(x) and F(i,y) = gi(y) to Pi. Player Pi selects random ri and starts (n/3)-WSSi on ri using FiW(x,y). Round 2: Pi broadcasts aij = fi(j) + FiW(0,j) bij = gi(j) + FjW(0,i) Round 3: For each aij ≠ bji Pi broadcasts fi(j) Pj broadcasts gj(i) D broadcasts F(j,i) Concurrently, round 2 of (n/3)-WSSi takes place. Concurrently, round 3 of (n/3)-WSSi takes place. Round-Optimal and Efficient VSS —TCC’06

3-Round (n/3)-VSS — Sharing Phase D selects a random bivariate polynomial F(x,y) of degree t in each variable, s.t. F(0,0) = s; sends F(x,i) = fi(x) and F(i,y) = gi(y) to Pi. Player Pi selects random ri and starts (n/3)-WSSi on ri using FiW(x,y). Round 2: Pi broadcasts aij = fi(j) + FiW(0,j) bij = gi(j) + FjW(0,i) Round 3: For each aij ≠ bji Pi broadcasts fi(j) Pj broadcasts gj(i) D broadcasts F(j,i) A player is said to be unhappy if his value does not match D’s value. If no. unhappy players > t, disqualify D. Concurrently, round 2 of (n/3)-WSSi takes place. Concurrently, round 3 of (n/3)-WSSi takes place. Round-Optimal and Efficient VSS —TCC’06

3-Round (n/3)-VSS — Sharing Phase Local Computation: H = {happy players} – {players disqualified as WSS dealers} If |H| < n–t, disqualify D and stop. For Pi  H, if |H ∩ HiW| < n–t, remove Pi from H. Call the final set COREsh. If |COREsh| < n–t disqualify D and stop. Properties of COREsh: If D is honest, then COREsh contains all honest players  D is not disqualified during the Sharing phase. Every player in COREsh is consistent with n–t players in COREsh  At least t+1 honest players in COREsh (defining a unique polynomial FH(x,y)). Round-Optimal and Efficient VSS —TCC’06

3-Round (n/3)-VSS — Reconstruction Phase For each Pi  COREsh, run Rec. phase of (n/3)-WSSi, concurrently. Local computation: CORErec := COREsh CORErec := CORErec – {Pi :   (n/3)-WSSi } For each Pi  CORErec compute fi(j) = aij – FiW(0,j), 1≤ j ≤ n If fi(x) not a t-degree polynomial, remove Pi from CORErec. Obtain F’(x,y) by taking any t+1 polynomials fi(x) from CORErec; s’ := F’(0,0). Round-Optimal and Efficient VSS —TCC’06

3-Round (n/3)-VSS — Reconstruction Phase Properties of CORErec: At least n–2t ( t+1) honest players in COREsh  unique t-degree polynomial FH(x,y). Dishonest Pi in CORErec: WSSi succeeded; fi(j) lie on a t-degree polynomial f’i(x) ; F’iW(x,y) is … consistent with  t+1 honest players in CORErec  f’i(x) is consistent with FH(x,y). Privacy: The only difference with WSS protocol is the pads. Prove that aij = fi(j) + FiW(0,j) does not reveal any info’ about fi(j). Round-Optimal and Efficient VSS —TCC’06

Amortized VSS Round Complexity Say, m k-round sequential VSS protocols (e.g., MPC) Using “deferred commitment,” m+2 total rounds  1+ O(1/m) amortized-round VSS protocol Initial phase: Dealer(s) share random values r1, r2,…, rm using the given VSS protocol. Sharing Phase of jth VSS protocol: Broadcast correction term cj = sj – rj Correction: (two ways) In Reconstruction Phase each player computes sj = cj + rj. At the end of Sharing Phase every player Pi computes F*j(x,i) = Fj(x,i) + cj and F*j(i,y) = Fj(i,y) + cj Round-Optimal and Efficient VSS —TCC’06

Round-Optimal and Efficient VSS —TCC’06 Summary VSS: Efficient 3-round protocol for n > 3t WSS: Efficient 3-round protocol for n > 3t — round optimal Efficient 1-round protocol for n > 4t (1+ ) amortized-round VSS Round-Optimal and Efficient VSS —TCC’06

Round-Optimal and Efficient Verifiable Secret Sharing Matthias Fitzi (Aarhus University) Juan Garay (Bell Labs) Shyamnath Gollakota (IIT Madras) C. Pandu Rangan (IIT Madras) Kannan Srinathan (IIIT Hyderabad)

(n/3)-WSS Round Optimality Based on impossibility of 3-round Weak Secure Multicast: P = {P1 , P2, … , Pn}; D  P holds input m; multicast set M  P. Privacy: If all players in M are honest, then adversary learns no information about m. Correctness: If D is honest, then all honest players in M output m. Weak Agreement: Even if D is dishonest, all honest players in M output a value in {m’, }. r-round WSS  r-round WSM Round-Optimal and Efficient VSS —TCC’06