1 Keyword Search and Oblivious Pseudo-Random Functions Mike Freedman NYU Yuval Ishai, Benny Pinkas, Omer Reingold.

Slides:



Advertisements
Similar presentations
Polylogarithmic Private Approximations and Efficient Matching
Advertisements

Constant-Round Private Database Queries Nenad Dedic and Payman Mohassel Boston UniversityUC Davis.
1 Cryptography: on the Hope for Privacy in a Digital World Omer Reingold VVeizmann and Harvard CRCS.
Private Inference Control David Woodruff MIT Joint work with Jessica Staddon (PARC)
Private Inference Control
Efficient Private Approximation Protocols Piotr Indyk David Woodruff Work in progress.
Revisiting the efficiency of malicious two party computation David Woodruff MIT.
Efficiency vs. Assumptions in Secure Computation Yuval Ishai Technion & UCLA.
Computational Privacy. Overview Goal: Allow n-private computation of arbitrary funcs. –Impossible in information-theoretic setting Computational setting:
Secure Evaluation of Multivariate Polynomials
Oblivious Branching Program Evaluation
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Presenter: Qin Liu a,b Joint work with Chiu C. Tan b, Jie Wu b,
Efficient Two-party and Multiparty Computation against Covert Adversaries Vipul Goyal Payman Mohassel Adam Smith Penn Sate UCLAUC Davis.
ITIS 6200/ Secure multiparty computation – Alice has x, Bob has y, we want to calculate f(x, y) without disclosing the values – We can only do.
Semi-Honest to Malicious Oblivious-Transfer The Black-box Way Iftach Haitner Weizmann Institute of Science.
Rational Oblivious Transfer KARTIK NAYAK, XIONG FAN.
CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation.
Amortizing Garbled Circuits Yan Huang, Jonathan Katz, Alex Malozemoff (UMD) Vlad Kolesnikov (Bell Labs) Ranjit Kumaresan (Technion) Cut-and-Choose Yao-Based.
NON-MALLEABLE EXTRACTORS AND SYMMETRIC KEY CRYPTOGRAPHY FROM WEAK SECRETS Yevgeniy Dodis and Daniel Wichs (NYU) STOC 2009.
Modeling Insider Attacks on Group Key Exchange Protocols Jonathan Katz Ji Sun Shin University of Maryland.
What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.
Yan Huang, Jonathan Katz, David Evans University of Maryland, University of Virginia Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose.
On the (Im)Possibility of Key Dependent Encryption Iftach Haitner Microsoft Research TexPoint fonts used in EMF. Read the TexPoint manual before you delete.
Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems Omer Barkol Yuval Ishai Technion.
Oblivious Transfer based on the McEliece Assumptions
Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung.
Private Analysis of Data Sets Benny Pinkas HP Labs, Princeton.
1 Introduction to Secure Computation Benny Pinkas HP Labs, Princeton.
1 Constructing Pseudo-Random Permutations with a Prescribed Structure Moni Naor Weizmann Institute Omer Reingold AT&T Research.
Privacy Preserving Data Mining Yehuda Lindell & Benny Pinkas.
Private Information Retrieval Amos Beimel – Ben-Gurion University Tel-Hai, June 4, 2003 This talk is based on talks by:
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
Privacy Preserving Learning of Decision Trees Benny Pinkas HP Labs Joint work with Yehuda Lindell (done while at the Weizmann Institute)
Extending Oblivious Transfers Efficiently Yuval Ishai Technion Joe Kilian Kobbi Nissim Erez Petrank NEC Microsoft Technion.
Public Key Encryption that Allows PIR Queries Dan Boneh 、 Eyal Kushilevitz 、 Rafail Ostrovsky and William E. Skeith Crypto 2007.
Efficient and Robust Private Set Intersection and multiparty multivariate polynomials Dana Dachman-Soled 1, Tal Malkin 1, Mariana Raykova 1, Moti Yung.
Oblivious Signature-Based Envelope Ninghui Li, Stanford University Wenliang (Kevin) Du, Syracuse University Dan Boneh, Stanford University.
Secure Computation of the k’th Ranked Element Gagan Aggarwal Stanford University Joint work with Nina Mishra and Benny Pinkas, HP Labs.
A Linear Lower Bound on the Communication Complexity of Single-Server PIR Weizmann Institute of Science Israel Iftach HaitnerJonathan HochGil Segev.
On the Practical Feasibility of Secure Distributed Computing A Case Study Gregory Neven, Frank Piessens, Bart De Decker Dept. of Computer Science, K.U.Leuven.
Secure two-party computation: a visual way by Paolo D’Arco and Roberto De Prisco.
Improved Non-Committing Encryption with Application to Adaptively Secure Protocols joint work with Dana Dachman-Soled (Columbia Univ.), Tal Malkin (Columbia.
How to Update Documents Verifiably in Searchable Symmetric Encryption Kaoru Kurosawa and Yasuhiro Ohtaki Ibaraki University, Japan.
On the Communication Complexity of SFE with Long Output Daniel Wichs (Northeastern) joint work with Pavel Hubáček.
Non-Interactive Verifiable Computing August 5, 2009 Bryan Parno Carnegie Mellon University Rosario Gennaro, Craig Gentry IBM Research.
Secure Conjunctive Keyword Search Over Encrypted Data Philippe Golle Jessica Staddon Palo Alto Research Center Brent Waters Princeton University.
On the Cryptographic Complexity of the Worst Functions Amos Beimel (BGU) Yuval Ishai (Technion) Ranjit Kumaresan (Technion) Eyal Kushilevitz (Technion)
UC/Garbled Searchable Symmetric Encryption Kaoru Kurosawa Ibaraki University, Japan.
Vladimir Kolesnikov (Bell Labs) Steven M. Bellovin, Seung Geol Choi, Ben Fisch, Wesley George, Angelos Keromytis, Fernando Krell, Abishek Kumarasubramanian,
Based on work with: Sergey Gorbunov and Vinod Vaikuntanathan Homomorphic Commitments & Signatures Daniel Wichs Northeastern University.
Andrew Lindell Aladdin Knowledge Systems and Bar-Ilan University 04/08/08 CRYP-106 Efficient Fully-Simulatable Oblivious Transfer.
Efficient Private Matching and Set Intersection Mike Freedman, NYU Kobbi Nissim, MSR Benny Pinkas, HP Labs EUROCRYPT 2004.
Private Information Retrieval Based on the talk by Yuval Ishai, Eyal Kushilevitz, Tal Malkin.
Aggelos Kiayias, Nikos Leonardos, Helger Lipmaa, Kateryna Pavlyk, and Qiang Tang FIT 2016, February 6, 2016.
Secure Data Outsourcing
Keyword search on encrypted data. Keyword search problem  Linux utility: grep  Information retrieval Basic operation Advanced operations – relevance.
Cryptographic methods. Outline  Preliminary Assumptions Public-key encryption  Oblivious Transfer (OT)  Random share based methods  Homomorphic Encryption.
Multi-Party Computation r n parties: P 1,…,P n  P i has input s i  Parties want to compute f(s 1,…,s n ) together  P i doesn’t want any information.
Bounded key-dependent message security
Topic 36: Zero-Knowledge Proofs
Committed MPC Multiparty Computation from Homomorphic Commitments
Modern symmetric-key Encryption
Course Business I am traveling April 25-May 3rd
Verifiable Oblivious Storage
Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems Omer Barkol Yuval Ishai Technion.
Cryptography for Quantum Computers
Malicious-Secure Private Set Intersection via Dual Execution
Limits of Practical Sublinear Secure Computation
Oblivious Transfer.
CRYP-F02 Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection Peter Scholl (University of Bristol) Michele Orrù (ENS Paris)
Presentation transcript:

1 Keyword Search and Oblivious Pseudo-Random Functions Mike Freedman NYU Yuval Ishai, Benny Pinkas, Omer Reingold

2 Background: Oblivious Transfer Oblivious Transfer (OT) [R], 1-out-of-N [EGL]: – Input: Server:x 1,x 2,…,x n Client: 1 ≤ j ≤ n – Output: Server: nothing Client: x j – Privacy: Serverlearns nothing about j Clientlearns nothing about x i for i ≠ j 4 – Well-studied, good solutions: O(n) overhead X1X1 … X2X2 X3X3 X4X4 XnXn XjXj j

3 Background: Private Information Retrieval (PIR) Private Information Retrieval (PIR) [CGKS,KO] – Client hides which element retrieved – Client can learn more than a single x j – o(N) communication, O(N) computation Symmetric Private Information Retrieval (SPIR) [GIKM,NP] – PIR in which client learns only x j – Hence, privacy for both client and server – “OT with sublinear communication”

4 Motivation: Sometimes, OT is not enough Bob (“Application Service Provider”) – Advises merchants on credit card fraud – Keeps list of fraudulent card numbers Alice (“Merchant”) – Received a credit card, wants to check if fraudulent – Wants to hide credit-card details from Bob, vice-versa Use OT? – Table of ≈ 2 53 entries, 1 if fraudulent, 0 otherwise?

5 Keyword Search (KS): definition Input: – Server: database X={ (x i,p i ) }, 1 ≤ i ≤ N x i is a keyword (e.g. number of a corrupt card) p i is the payload (e.g. why card is corrupt) – Client: search word w (e.g. credit card number) Output: – Server: nothing – Client: p i if  i : x i = w otherwise nothing Client output: (x j,p j ) iff w=x j …(x 1,p 1 )(x n,p n )(x 2,p 2 ) Server: Client: w

6 Take any efficient query-able data structure – Hash table, search tree, trie, etc. Replace direct query with OT / PIR Achieves client privacy We’re done? Keyword Search from data structures? [KO,CGN]

7 Keyword Search from hashing + OT [KO] Use hash function H to map (x i,p i ) to bin H(x i ) Client uses OT to read bin H(w) Multiple per bin: no server privacy: client gets > 1 elt One per bin, N bins: no server privacy: H leaks info One per bin, >> N bins:not efficient (x 1, p 1 )(x 2, p 2 ) ………………… (x N, p N ) …

8 Keyword Search Variants – Multiple queries – Adaptive queries – Allowing setup – Malicious parties Prior Work – OT + Hashing = KS without server privacy [KO] Add server privacy using trie and many rounds [CGN] – Adaptive KS [OK] But, setup with linear communication, RO model, one-more-RSA-inversion assumption

9 Keyword Search: Results Specific protocols for KS – One-time KS based on OPE (homomorphic encryption) – First 1-round KS with sublinear communication Adaptive KS by generic reduction – Semi-private KS + oblivious PRFs New notions and constructions of OPRFs – Fully-adaptive (DDH- or factoring-specific) – T-time adaptive (black-box use of OT)

10 Keyword Search based on Oblivious Evaluation of Polynomials

11 Specific KS protocols using polynomials Tool: Oblivious Polynomial Evaluation (OPE) [NP] – Privacy: Server: nothing about w. Client: nothing but P(w) P(w) SC P(x) = Σa i x i w

12 1-round KS protocol using polynomials OPE implementation based on homomorphic encryption – Given E(x), E(y), can compute E(x+y), E(c·x), w/o secret key Server defines on input X={(x i,p i )}, – Z(x) = r · P(x) +Q(x), with fresh random r  x i If x i  X : 0 + p i |0 k If x i  X : rand Client/server run OPE of Z(w), overhead O(N) – C sends:E(w), E(w 2 ), …, E(w d ), PK – S returns: E(r·Σp i w i + Σq i w i ) = E(r·P(w) + Q(w)) = E(Z(w))

13 Reducing the overhead using hashing… (x 1, p 1 )(x 2, p 2 ) ………………… (x N, p N ) … L bins m Z2Z2 Z1Z1 Fresh random r for Z j (x) = r · P j (x) + Q j (x) Client sends input for L OPE’s of degree m Server has E(Z 1 (w)), …,E(Z L (w)) Client uses PIR to obtain OPE output from bin H(w) Comm: O(m = log N) + PIR overhead (polylog N) Comp: O(N) server, O(m = log N) client public hash function H m independent of X

14 What about malicious parties? Efficient 1 round protocol for non-adaptive KS – Only consider privacy: server need not commit or know DB – Similar relaxation used before in like contexts (PIR, OT) Privacy against a malicious server? – Server only sees client’s interaction in an OT / PIR protocol Malicious clients? – Message in OPE might not correspond to polynomial values – Can enforce correct behavior with about same overhead – 1 OPE of degree-m polynomials → m OPEs of linear poly’s

15 Keyword Search based on Oblivious Evaluation of Pseudo-Random Functions

16 Semi-Private Keyword Search Goal: Obtain KS from semi-private KS + OPRF Semi-Private Keyword Search (PERKY [CGN]) – Provides privacy for client but not for server – Similar privacy to that of PIR Examples – Send database to client: O(N) communication – Hash-based solutions + PIR to obtain bin – Use any fancy data structure + PIR to query

17 Oblivious Evaluation of Pseudo-Random Functions Pseudo-Random Function: F k : {0,1} n  {0,1} n – Keyed by k (chooses a specific instantiation of F ) – Without k, the output of F k cannot be distinguished from that of a random function Oblivious evaluation of a PRF (OPRF) – Client:PRF output, nothing about k – Server:Nothing F k (x) SC kx

18 KS from Semi-Private KS + OPRF (x 1, p 1 )(x 2, p 2 ) ………………… (x N, p N ) (x’ 1, p’ 1 )(x’ 2, p’ 2 ) ………………… (x’ N, p’ N ) S chooses k, defining F k (·) Client –U–Uses OPRF to computex’ | p’ ← F k (w ) –U–Uses semi-private KS to obtain(x i, p i ) where x i = x’ –I–If entry in database, recoversp i = p i  p’  (x i, p i )  X, Letx’ i | p’ i ←F k (x i ) Let (x i, p i ) ←(x’ i, p i  p’ i ) key, payload masked by PRF

19 KS from Semi-Private KS + OPRF (x 1, p 1 )(x 2, p 2 ) ………………… (x N, p N ) (x’ 1, p’ 1 )(x’ 2, p’ 2 ) ………………… (x’ N, p’ N ) Security – Preserved even if client obtains all pseudo-database… – Requires that client can’t determine output of OPRF other than at inputs from legitimate queries key, payload masked by PRF  (x i, p i )  X, Letx’ i | p’ i ←F k (x i ) Let (x i, p i ) ←(x’ i, p i  p’ i ) S chooses k, defining F k (·)

20 Weaker OPRF definition suffices for KS Strong OPRF: Secure 2PC of PRF functionality – No info leaked about key k for arbitrary f k, other than what follows from legitimate queries – Same OPRF on multiple inputs w/o losing server privacy Relaxed OPRF: No info about outputs of random f k, other than what follows from legitimate queries – Does not preclude learning partial info about k – Query set size bounded by t for t-time OPRFs – Indistinguishability: Outputs on unqueried inputs cannot be distinguished from outputs of random function

21 Other results: constructions of OPRF OPRF based on non-black-box OT [Y,GMW] OPRF based on specific assumptions [NP] – E.g., based on DDH or factoring – Fully adaptive – Quite efficient OPRF based on black-box OT – Uses relaxed definition of OPRF – Good for up to t adaptive queries

22 OPRF based on DDH [“scaled up” NP] The Naor-Reingold PRF: – Key k = [ a 1, …, a L ] – Input x = x 1 x 2 x 3 … x L – Pseudorandom based on DDH OPRF based on PRF + OT – Server:[ a 1, …, a L ], [ r 1, …, r L ] – Client:x = x 1 x 2 x 3 … x L – L OT’s:r i if x i = 0, a i r i otherwise r1r1 a1r1a1r1 r2r2 a2r2a2r2 rLrL aLrLaLrL g^(1 / r 1 r 2 …r L ) OT 1 2 x 1 =0 x 2 =1 x L =1

23 Relaxed OPRF based on OT Server key:L x 2t matrix Client input: x = { x 1, x 2, …, x L } Client gets L keys using OT 1 2t After t calls, learns t L keys a 0,0 aL,0aL,0 a 0,2t Map inputs to locations in L-dimensions using a (t+2)-wise independent, secret mapping h Client first obliviously computes h(x), then F(h(x)) Learns t of 2t keys in L dimensions Probability that other value uses these keys is (1/2) L

24 Conclusions Keyword search is an important tool We show: – Efficient constructions based on OPE – Generic reduction to OPRF + semi-private KS Fully-adaptive based on DDH Black-box reduction via OT, yet only good for t invoc’s Open problem: – Black-box reduction to OT good for poly invoc’s?

25 Thanks….