Many-to-one Trapdoor Functions and their Relations to Public-key Cryptosystems M. Bellare S. Halevi A. Saha S. Vadhan.

Slides:



Advertisements
Similar presentations
Quantum Software Copy-Protection Scott Aaronson (MIT) |
Advertisements

RSA.
Function Technique Eduardo Pinheiro Paul Ilardi Athanasios E. Papathanasiou The.
ONE WAY FUNCTIONS SECURITY PROTOCOLS CLASS PRESENTATION.
One-Way Functions David Lagakos Yutao Zhong April 2, 2001.
Shortest Vector In A Lattice is NP-Hard to approximate
Foundations of Cryptography Lecture 2: One-way functions are essential for identification. Amplification: from weak to strong one-way function Lecturer:
1 Complexity ©D.Moshkovitz Cryptography Where Complexity Finally Comes In Handy…
CS555Spring 2012/Topic 171 Cryptography CS 555 Topic 17: Textbook RSA encryption.
Isolation Technique April 16, 2001 Jason Ku Tao Li.
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Foundations of Cryptography Lecture 11 Lecturer: Moni Naor.
Implementing Oblivious Transfer Using a Collection of Dense Trapdoor Permutations Iftach Haitner WEIZMANN INSTITUTE.
CIS 5371 Cryptography 3b. Pseudorandomness.
Foundations of Cryptography Lecture 5 Lecturer: Moni Naor.
Foundations of Cryptography Lecture 13 Lecturer: Moni Naor.
Foundations of Cryptography Lecture 4 Lecturer: Moni Naor.
Probabilistic Algorithms Michael Sipser Presented by: Brian Lawnichak.
Foundations of Cryptography Lecture 12 Lecturer: Moni Naor.
Computability and Complexity 20-1 Computability and Complexity Andrei Bulatov Random Sources.
1 The RSA Algorithm Supplementary Notes Prepared by Raymond Wong Presented by Raymond Wong.
Perfect and Statistical Secrecy, probabilistic algorithms, Definitions of Easy and Hard, 1-Way FN -- formal definition.
Lecturer: Moni Naor Foundations of Cryptography Lecture 4: One-time Signatures, UOWHFs.
Introduction to Modern Cryptography, Lecture ?, 2005 Broadcast Encryption, Traitor Tracing, Watermarking.
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
A Designer’s Guide to KEMs Alex Dent
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
Lecturer: Moni Naor Foundations of Cryptography Lecture 11: Security of Encryption Schemes.
On The Cryptographic Applications of Random Functions Oded Goldreich Shafi Goldwasser Silvio Micali Advances in Cryptology-CRYPTO ‘ 84 報告人 : 陳昱升.
1 Secure Indexes Author : Eu-Jin Goh Presented by Yi Cheng Lin.
1 Constructing Pseudo-Random Permutations with a Prescribed Structure Moni Naor Weizmann Institute Omer Reingold AT&T Research.
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
Foundations of Cryptography Lecture 10: Pseudo-Random Permutations and the Security of Encryption Schemes Lecturer: Moni Naor Announce home )deadline.
Cramer-Shoup is Plaintext Aware in the Standard Model Alexander W. Dent Information Security Group Royal Holloway, University of London.
Foundations of Cryptography Lecture 9 Lecturer: Moni Naor.
Foundations of Cryptography Lecture 8 Lecturer: Moni Naor.
Foundations of Cryptography Lecture 2 Lecturer: Moni Naor.
Foundations of Cryptography Rahul Jain CS6209, Jan – April 2011
1 eill Adam O’Neill Georgetown University Joint work with Dana Dachman-Soled (Univ. of Maryland), Georg Fuchsbauer (IST Austria), and Payman Mohassel (Univ.
The RSA Algorithm Rocky K. C. Chang, March
Cryptography Lecture 8 Stefan Dziembowski
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Alternative Wide Block Encryption For Discussion Only.
Interactive proof systems Section 10.4 Giorgi Japaridze Theory of Computability.
1 Network and Computer Security (CS 475) Modular Arithmetic and the RSA Public Key Cryptosystem Jeremy R. Johnson.
Scott CH Huang COM 5336 Cryptography Lecture 6 Public Key Cryptography & RSA Scott CH Huang COM 5336 Cryptography Lecture 6.
Manipulating the Quota in Weighted Voting Games (M. Zuckerman, P. Faliszewski, Y. Bachrach, and E. Elkind) ‏ Presented by: Sen Li Software Technologies.
Attacking RSA Brian Winant Reference “Twenty Years of Attacks on the RSA Cryptosystem” By Dan Boneh In Notices of the American Mathematical.
多媒體網路安全實驗室 Anonymous Authentication Systems Based on Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: Networked Digital Technologies,
Complexity 24-1 Complexity Andrei Bulatov Interactive Proofs.
Comparing Notions of Full Derandomization Lance Fortnow NEC Research Institute With thanks to Dieter van Melkebeek.
Ryan Henry I 538 /B 609 : Introduction to Cryptography.
Impossibility proofs for RSA signatures in the standard model Pascal Paillier Topics in Cryptology – CT-RSA 2007.
多媒體網路安全實驗室 Variations of Diffie-Hellman Problem Proceedings of ICICS 2003, LNCS 2836, Springer-Verlag, 2003, pp. 301–312 Feng Bao, Robert H. Deng, Huafei.
Key Exchange in Systems VPN usually has two phases –Handshake protocol: key exchange between parties sets symmetric keys –Traffic protocol: communication.
PROBABILITY AND COMPUTING RANDOMIZED ALGORITHMS AND PROBABILISTIC ANALYSIS CHAPTER 1 IWAMA and ITO Lab. M1 Sakaidani Hikaru 1.
Probabilistic Algorithms
B504/I538: Introduction to Cryptography
Cryptographic Hash Functions Part I
COMS E F15 Lecture 2: Median trick + Chernoff, Distinct Count, Impossibility Results Left to the title, a presenter can insert his/her own image.
Topic 7: Pseudorandom Functions and CPA-Security
Soundness of Formal Encryption in the Presence of Key Cycles
B504/I538: Introduction to Cryptography
Cryptography Lecture 12 Arpita Patra © Arpita Patra.
Cryptography Lecture 8.
Where Complexity Finally Comes In Handy…
CS21 Decidability and Tractability
Where Complexity Finally Comes In Handy…
Where Complexity Finally Comes In Handy…
Presentation transcript:

Many-to-one Trapdoor Functions and their Relations to Public-key Cryptosystems M. Bellare S. Halevi A. Saha S. Vadhan

Introduction One-way function –Easy to compute, hard to invert Trapdoor function –One-way function –Hard to invert; but with trapdoor, easy to invert. –Injective (one-to-one) trapdoor function suffices for a public key cryptosystem. (Proved by Yao) Injectivity can guarantee the unique decryption

Several questions arise What’s the relationship between one-way function and trapdoor function? –Does one-way function imply trapdoor function? Does a public key cryptosystem requires an injective trapdoor function? –Is a non-injective trapdoor function able to construct a public key cryptosystem? –If yes, what is the domain size of such a non-injective trapdoor function?

Definitions: PPT: –Probabilistic, polynomial time x||y: –Concatenation of two strings x and y x  S: –Select an element from the set S. Pre-images of y under a function f: –f -1 (y) = { x  Dom(f): f(x) = y}. Injective: –A function is said to be injective if Dom(f) = Range(f). One-wayness: –An function is said to be on-way if InvProb f (I,k) is negligible for any PPT algorithm I.

Trapdoorness: –A function f is said to be trapdoor if with knowing “trapdoor information” tp, one can invert f. –Formally, there exists a PPT algorithm F– Inv (f, tp, y) for all y  Range(f), which outputs an element of f -1 (y) with probability 1. Predicate: –A probabilistic function with domain {0,1}, p, takes a bit b and flips coins r to generate some output y = p(b:r). Decryption error  (k) of a predicate: –If there exists a PPT algorithm P-Inv, which with knowing trapdoor fails to decrypt only with probability: – is at most  (k)

From on-way function to trapdoor functions Theorem: Suppose there exists a family of one-way functions. Then there exists a family of trapdoor, one-way functions. –Proof: Given a family of one-way functions, construct a family of trapdoor one-way functions. –Given f, we construct a g which “mimics” f but embeds a trapdoor.  = f(  ), where  is trapdoor of g, and  is the image of the trapdoor  under f. –Is g a one-way trapdoor function? If knowing , a pre-image of z under g is (z, ,  ). So knowing trapdoor, one can invert g. g is a trapdoor function. Without knowing , can we invert g? –If g(y,x, v) = z then either f(v) = z or f(x) = . To calculate g -1 (z) requires inverting f at either z or , both of which are hard by one- wayness of f. –g is one-way function. g is one-way trapdoor function.

Does a public key cryptosystem requires an injective trapdoor function? Unapproximable trapdoor predicates and semantically secure public key cryptosystems are equivalent. So the question becomes whether unapproximable trapdoor predicates imply injective trapdoor functions.

From trapdoor functions to cryptosystem Theorem: If there exist trapdoor one-way function families with polynomially bounded pre-image size, then there exists a family of unapproximable trapdoor predicates with exponentially small decryption error. Proof: Given a trapdoor one-way function F, construct an unapproximable family of trapdoor predicates P with decryption error ½ - 1/poly(k), and reduce the decryption error by repetition to get the the family claimed in the theorem.

Claim: p is an unapproximable trapdoor predicate family, with decryption error at most ½ - 1/[2Q(k)] –The output of p is (f(x),r,  ) –b =   (x r) –x’ = F-Inv(f,tp,y) and b’ =   (x’ r) –Since f is not injective function, even with tp, x’ may not be equal to x. –If x’ = x, then b’=b. –If x’  x then b’=b with probability at most ½ since r is random chosen. The chance that x = x’ is at least 1/Q(k) ( The size of pre-image of f is Q(k)). –So

To prove the theorem, we need a predicate with exponentially small decryption error. –The predicate is constructed as Polynomial number of p(b) are concatenated to form a final predicate. –To decrypt b with tp, let b i ’ = P-Inv (p, tp, (y i, r i,  i )). It outputs b’ which is 1 if the majority of the b i ’ are 1 and 0 otherwise. –b i ’ has decryption error ½ - 1/[2Q(k)], b has exponentially decryption error.

Several known results so far. 1.Existence of unapproximable trapdoor predicates is equivalent to the existence of semantically secure public-key encryption. 2.Injective trapdoor one-way function can be used to construct unapproximable trapdoor predicates. Question Can unapproximable trapdoor predicates be used to construct injective trapdoor one-way functions? If it is possible to implement using one-way functions a function G with “sufficiently” strong randomness properties” to maintain the security of this scheme, then the question would have a positive answer.

From a predicate to a function, we need to de-randomization, meanwhile maintaining the one-wayness of the function. –Method 1: It is one-way [Yao]. However, it is not a trapdoor function, because even with the trapdoor information, we cannot recover r 1,r 2,…r k. –Method 2: Where G is a pseudo-random generator. It is proved that f is not one-way either.

Method 3: Use a truly random function G, ie., a random oracle. To invert f, we need to invert p(b 1 ;r 1 ), p(b 2 ; r 2 ), …p(b k ; r k ). Even knowing r 1, r 2, r 3,…r k, since G is truly random generator, b 1, b 2,… b k are totally independent with r 1, r 2, r 3,…r k. And each p is unapproximable,so f is one-way function. Theorem: If there exists a family of unapproximable trapdoor predicates, then there exists a family of injective trapdoor one-way functions in the random oracle model.

Conclusion