REDUCTION-RESILIENT CRYPTOGRAPHY: PRIMITIVES THAT RESIST REDUCTIONS FROM ALL STANDARD ASSUMPTIONS Daniel Wichs (Charles River Crypto Day ‘12)

Slides:



Advertisements
Similar presentations
Impagliazzos Worlds in Arithmetic Complexity: A Progress Report Scott Aaronson and Andrew Drucker MIT 100% QUANTUM-FREE TALK (FROM COWS NOT TREATED WITH.
Advertisements

On Black-Box Separations in Cryptography
On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols Iftach Haitner, Alon Rosen and Ronen Shaltiel 1.
Ran Canetti, Yael Tauman Kalai, Mayank Varia, Daniel Wichs.
1. Breaking the Adaptivity Barrier for Deterministic Public-Key Encryption Ananth Raghunathan (joint work with Gil Segev and Salil Vadhan)
Many-to-one Trapdoor Functions and their Relations to Public-key Cryptosystems M. Bellare S. Halevi A. Saha S. Vadhan.
Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions PKC 2010 May 27, 2010 Petros Mol, Scott Yilek 1 UC, San Diego.
1 Reducing Complexity Assumptions for Statistically-Hiding Commitment Iftach Haitner Omer Horviz Jonathan Katz Chiu-Yuen Koo Ruggero Morselli Ronen Shaltiel.
Vote privacy: models and cryptographic underpinnings Bogdan Warinschi University of Bristol 1.
New Results on PA/CCA Encryption Carmine Ventre and Ivan Visconti Università di Salerno.
1 Adam O’Neill Leonid Reyzin Boston University A Unified Approach to Deterministic Encryption and a Connection to Computational Entropy Benjamin Fuller.
1 Vipul Goyal Microsoft Research India Non-Black-Box Simulation in the Fully Concurrent Setting.
CS555Topic 191 Cryptography CS 555 Topic 19: Formalization of Public Key Encrpytion.
11 Provable Security. 22 Given a ciphertext, find the corresponding plaintext.
Yevgeniy Dodis, Kristiyan Haralambiev, Adriana López-Alt, Daniel Wichs New York University Efficient Public-Key Cryptography in the Presence of Leakage.
Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen.
13. Oktober 2010 | Dr.Marc Fischlin | Kryptosicherheit | 1 Adaptive Proofs of Knowledge in the Random Oracle Model 21. PKC 2015 Marc Fischlin joint work.
Foundations of Cryptography Lecture 13 Lecturer: Moni Naor.
Optimistic Concurrent Zero-Knowledge Alon Rosen IDC Herzliya abhi shelat University of Virginia.
Public Key Cryptography in the Bounded Retrieval Model Based on joint works with Joël Alwen, Moni Naor, Gil Segev, Shabsi Walfish and Daniel Wichs Crypto.
On Minimal Assumptions for Sender-Deniable Public Key Encryption Dana Dachman-Soled University of Maryland.
1 Vipul Goyal Abhishek Jain Rafail Ostrovsky Silas Richelson Ivan Visconti Microsoft Research India MIT and BU UCLA University of Salerno, Italy Constant.
RECENT PROGRESS IN LEAKAGE-RESILIENT CRYPTOGRAPHY Daniel Wichs (NYU) (China Theory Week 2010)
On the Composition of Public- Coin Zero-Knowledge Protocols Rafael Pass (Cornell) Wei-Lung Dustin Tseng (Cornell) Douglas Wiktröm (KTH) 1.
Efficient Zero-Knowledge Proof Systems Jens Groth University College London FOSAD 2014.
Public-Key Encryption in the Bounded-Retrieval Model Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Segev, Shabsi Walfish, Daniel Wichs Earlier Today: Yevgeniy.
Nir Bitansky and Omer Paneth. Interactive Proofs.
Rafael Pass Cornell University Limits of Provable Security From Standard Assumptions.
On the (Im)Possibility of Key Dependent Encryption Iftach Haitner Microsoft Research TexPoint fonts used in EMF. Read the TexPoint manual before you delete.
Leakage-Resilient Signatures Sebastian Faust KU Leuven Joint work with Eike Kiltz CWI Krzysztof Pietrzak CWI Guy Rothblum Princeton TCC 2010, Zurich, Switzerland.
A Parallel Repetition Theorem for Any Interactive Argument Iftach Haitner Microsoft Research TexPoint fonts used in EMF. Read the TexPoint manual before.
The Physically Observable Security of Signature Schemes Alexander W. Dent Joint work with John Malone-Lee University of Bristol.
1 Theory and Application of Extractable Functions Ramzi Ronny Dakdouk.
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
Strongly Secure Certificateless Encryption Alexander W. Dent Information Security Group
CS555Spring 2012/Topic 41 Cryptography CS 555 Topic 4: Computational Approach to Cryptography.
On the Implausibility of Differing-Inputs Obfuscation (and Extractable Witness Encryption) with Auxiliary Input Daniel Wichs (Northeastern U) with: Sanjam.
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
Cramer-Shoup is Plaintext Aware in the Standard Model Alexander W. Dent Information Security Group Royal Holloway, University of London.
Leakage-Resilient Storage Francesco Davì Stefan Dziembowski Daniele Venturi SCN /09/2010 Sapienza University of Rome.
Foundations of Cryptography Lecture 8 Lecturer: Moni Naor.
Cryptography Lecture 8 Stefan Dziembowski
Improved Non-Committing Encryption with Application to Adaptively Secure Protocols joint work with Dana Dachman-Soled (Columbia Univ.), Tal Malkin (Columbia.
Controlled Algebras and GII’s Ronald L. Rivest MIT CSAIL IPAM Workshop October 9, 2006.
Cryptography Lecture 2 Arpita Patra. Summary of Last Class  Introduction  Secure Communication in Symmetric Key setting >> SKE is the required primitive.
Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6 Yevgeniy Dodis Leonid Reyzin.
1 Information Security – Theory vs. Reality , Winter Lecture 10: Garbled circuits and obfuscation Eran Tromer Slides credit: Boaz.
PROTECTING CIRCUITS from LEAKAGE IBM T. J. Watson Vinod Vaikuntanathan the computationally bounded and noisy cases Joint with S. Faust (KU Leuven), L.
Non-interactive quantum zero-knowledge proofs
Lower Bounds on Assumptions behind Indistinguishability Obfuscation
Based on work with: Sergey Gorbunov and Vinod Vaikuntanathan Homomorphic Commitments & Signatures Daniel Wichs Northeastern University.
CS555Spring 2012/Topic 71 Cryptography CS 555 Topic 7: Stream Ciphers and CPA Security.
1/28 Chosen-Ciphertext Security from Identity- Based Encryption Jonathan Katz U. Maryland Ran Canetti, Shai Halevi IBM.
Does Privacy Require True Randomness? Yevgeniy Dodis New York University Joint work with Carl Bosley.
Impossibility proofs for RSA signatures in the standard model Pascal Paillier Topics in Cryptology – CT-RSA 2007.
Cryptography Lecture 10 Arpita Patra © Arpita Patra.
Cryptography Lecture 3 Arpita Patra © Arpita Patra.
Cryptography Resilient to Continual Memory Leakage Zvika Brakerski Weizmann Institute Yael Tauman Kalai Microsoft Jonathan Katz University of Maryland.
Topic 36: Zero-Knowledge Proofs
Lower Bounds on Assumptions behind Indistinguishability Obfuscation
Modern symmetric-key Encryption
Digital signatures.
Cryptography Lecture 3 Arpita Patra © Arpita Patra.
On the Efficiency of 2 Generic Cryptographic Constructions
Fiat-Shamir for Highly Sound Protocols is Instantiable
Leakage-resilient Signatures
Impossibility of SNARGs
Jens Groth and Mary Maller University College London
Presentation transcript:

REDUCTION-RESILIENT CRYPTOGRAPHY: PRIMITIVES THAT RESIST REDUCTIONS FROM ALL STANDARD ASSUMPTIONS Daniel Wichs (Charles River Crypto Day ‘12)

Overview  Negative results for several natural primitives : cannot prove security via ‘black box reduction’.  Leakage-resilience with unique keys.  Pseudo-entropy generators.  Deterministic encryption.  Fiat-Shamir for “3-round proofs”.  Succinct non-interactive arguments (SNARGs).  No black-box reduction from any ‘standard’ assumption. Gentry-W ‘11 Bitansky-Garg-W ‘13 ‘weird’ definitions W ‘13

Standard vs. Weird AdversaryChallenger WIN? (g, g x ) e.g. Discrete Log x Efficient challenger = Falsifiable Definition

Standard vs. Weird  Standard Security Definition: Interactive game between a challenger and an adversary. Challenger decides if adversary wins.  For PPT Adversary, Pr[Adversary wins] = negligible  Weird = non-standard

Standard vs. Weird  Standard Definitions: Discrete Log, DDH, RSA, LWE, QR, “One-More DL”, Signature Schemes, CCA Encryption,…  Weird Definitions:  ‘Zero-Knowledge’ security.  ‘Knowledge of Exponent’ problem [Dam91, HT98].  Extractable hash functions. [BCCT11].  Leakage-resilience, adversarial randomness distributions.  Exponential hardness

Message of This Talk  For some primitives with a weird definition, we cannot prove security under any standard assumption via a reduction that treats the attacker as a black box.

Outline  Leakage-Resilience  Develop a framework for proving impossibility.  Pseudo-entropy  Correlated-inputs and deterministic encryption  Fiat-Shamir  Succinct Non-Interactive Arguments (SNARGs)

Leakage-Resilience Leak Challenger Invert

Leakage-Resilience Leak Invert Challenger

Leakage Resilient  Many positive results for leakage-resilient primitives from standard assumptions. [AGV09, NS09, ADW09, KV09, …, HLWW12]  Leakage-resilient OWF from any OWF. [ADW09,KV09]  Arbitrarily large (polynomial) amount of leakage L.  Add requirement: leakage-resilient injective OWF. Cannot have black-box reduction from any standard assumption.

Leakage-Resilient Injective OWF Leak Invert Challenger

Framework: Simulatable Adversary  Special inefficient adversary breaks security of primitive.  Two independent functions (Leak, Invert).  Efficient simulator that is indistinguishable.  Can be stateful and coordinated. ≈ Leak*Invert* Adversary* Stat, Comp Simulator

Framework: Simulatable Adversary

Adversary Reduction Assumption Challenger  Reduction: uses any (even inefficient) adversary that breaks LR one-way security to break assumption. WIN LeakInvert

Adversary* Reduction Assumption Challenger  Reduction uses “simulatable adv” to break assumption. WIN

Adversary* Reduction Assumption Challenger  Reduction uses “simulatable adv” to break assumption. WIN Distinguisher

Reduction Assumption Challenger WIN Distinguisher Simulator

Reduction Assumption Challenger  There is an efficient attack on the assumption. WIN Simulator

Framework: Simulatable Adversary

Constructing a Simulatable Adv Leak*Invert* Simulator ≈

Caveats

Generalizations

Outline  Leakage-Resilience  Develop a framework for proving separations.  Pseudo-entropy  Correlation and Deterministic Encryption  Fiat-Shamir  Succinct Non-Interactive Arguments

Pseudo-Entropy Generator

Simulatable Adv for LPEG Leak*Dist* Simulator ≈

Outline  Leakage-Resilience  Develop a framework for proving separations.  Pseudo-entropy  Correlation and Deterministic Encryption  Fiat-Shamir  Succinct Non-Interactive Arguments

Deterministic Public-Key Encryption  Cannot be `semantically secure’. [GM84]  Can be secure if messages have sufficient entropy. [BBO07]  Strong notion in RO model: encrypt arbitrarily many messages, can be arbitrarily correlated, each one has entropy on its own.  Standard model: each message must have fresh entropy conditioned on others. [BFOR08, BFO08, BS11] Bounded number of arbitrarily correlated messages. [FOR12]  Our work: cannot prove ‘strong notion’ under standard assumptions via BB reductions.  Even if we only consider one-way security.  Even if we don’t require efficient decryption.

Defining Security

Simulatable Attacker Sam*Inv* Simulator ≈

Outline  Leakage-Resilience  Develop a framework for proving separations.  Pseudo-entropy  Correlation and Deterministic Encryption  Fiat-Shamir  Succinct Non-Interactive Arguments

The Fiat-Shamir Heuristic  Use a hash function h to collapse a 3-round public-coin (3PC) argument into a non-interactive argument. Prover(x,w) Verifier(x) a z random challenge: c Statement: x Witness: w Ver(x,a,c,z)

The Fiat-Shamir Heuristic  Use a hash function h to collapse a 3-round public-coin (3PC) argument into a non-interactive argument. Prover(x,w) Verifier(x) a z c = h(a) Statement: x Witness: w Ver(x,a,c,z)

The Fiat-Shamir Heuristic  Use a hash function h to collapse a 3-round public-coin (3PC) argument into a non-interactive argument. Prover(x,w) Verifier(x) a,z c = h(a) Statement: x Witness: w Ver(x,a,c,z)

The Fiat-Shamir Heuristic  Use a hash function h to collapse a 3-round public-coin (3PC) argument into a non-interactive argument.  Used for signatures, NIZKs, succinct arguments (etc.)  Is it secure? Does it preserve soundness?  Yes: if h is a Random Oracle. [BR93]  No: there is a 3PC argument on which Fiat-Shamir fails when instantiated with any real hash function h. [Bar01,GK03]  Maybe: there is a hash function h that makes Fiat-Shamir secure when applied to any 3PC proof.

Fiat-Shamir-Universal Hash

Outline  Leakage-Resilience  Develop a framework for proving separations.  Pseudo-entropy  Correlation and Deterministic Encryption  Fiat-Shamir  Succinct Non-Interactive Arguments

SNARGs witness statement short proof valid/invalid

SNARGs  Positive Results:  Random Oracle Model [Micali 94]  ‘Extractability/Knowledge’ Assumptions [BCCT11,GLR11,DFH11]  Our Result: Cannot prove security via BB reduction from any falsifiable assumption. Standard assumption w/ efficient challenger.

SNARGs for Hard Languages

Simulatable Adversary SNARG Adv Simulator ≈

Simulatable Adversary SNARG Adv Simulator ≈

≈ For all (even inefficient) Aux exists some Lie s.t. ( Y, Lie(Y) ) ( X, Aux(X) ) Indisitinguishability w/ Auxiliary Info Theorem: Assume that: X ≈ Y … but security degrades by exp(|Aux|). Proof uses min-max theorem. Similarity to proofs of hardcore lemma and “dense model theorems”.

Outline  Leakage-Resilience  Develop a framework for proving separations.  Pseudo-entropy  Correlation and Deterministic Encryption  Fiat-Shamir  Succinct Non-Interactive Arguments

Comparison to other BB Separations  Many “black box separation results”  [Impagliazzo Rudich 89]: Separate KA from OWP.  [Sim98]: Separate CRHFs from OWP.  [GKM+00, GKTRV00, GMR01, RTV04, BPR+08 …]  In all of the above: Cannot construct primitive A using a generic instance of primitive B as a black box.  Our result: Construction can be arbitrary. Reduction uses attacker as a black box.  Other examples: [DOP05, HH09, Pas11,DHT12]  Most relevant [HH09] for KDM security. Can be overcome with non-black- box techniques: [BHHI10]!

Conclusions & Open Problems  Several natural primitives with ‘weird’ definitions cannot be proven secure via a BB reduction from any standard assumption.  Can we overcome the separations with non-black-box techniques (e.g. [Barak 01, BHHI10] ) ?  Security proofs under other (less) weird assumptions.