Oblivious Transfer based on the McEliece Assumptions

Slides:



Advertisements
Similar presentations
Polylogarithmic Private Approximations and Efficient Matching
Advertisements

Efficient Private Approximation Protocols Piotr Indyk David Woodruff Work in progress.
Revisiting the efficiency of malicious two party computation David Woodruff MIT.
Quid-Pro-Quo-tocols Strengthening Semi-Honest Protocols with Dual Execution Yan Huang 1, Jonathan Katz 2, David Evans 1 1. University of Virginia 2. University.
Many-to-one Trapdoor Functions and their Relations to Public-key Cryptosystems M. Bellare S. Halevi A. Saha S. Vadhan.
Secure Computation of Linear Algebraic Functions
Secure Evaluation of Multivariate Polynomials
Secure Multiparty Computations on Bitcoin
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Implementing Oblivious Transfer Using a Collection of Dense Trapdoor Permutations Iftach Haitner WEIZMANN INSTITUTE.
Efficient Zero-Knowledge Proof Systems Jens Groth University College London.
Polling With Physical Envelopes A Rigorous Analysis of a Human–Centric Protocol Tal Moran Joint work with Moni Naor.
ITIS 6200/ Secure multiparty computation – Alice has x, Bob has y, we want to calculate f(x, y) without disclosing the values – We can only do.
Semi-Honest to Malicious Oblivious-Transfer The Black-box Way Iftach Haitner Weizmann Institute of Science.
Rational Oblivious Transfer KARTIK NAYAK, XIONG FAN.
CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation.
Digital Signatures and Hash Functions. Digital Signatures.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Computational Security. Overview Goal: Obtain computational security against an active adversary. Hope: under a reasonable cryptographic assumption, obtain.
Introduction to Modern Cryptography, Lecture 12 Secure Multi-Party Computation.
Eran Omri, Bar-Ilan University Joint work with Amos Beimel and Ilan Orlov, BGU Ilan Orlov…!??!!
Short course on quantum computing Andris Ambainis University of Latvia.
Yan Huang, Jonathan Katz, David Evans University of Maryland, University of Virginia Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose.
CS426Fall 2010/Lecture 351 Computer Security CS 426 Lecture 35 Commitment & Zero Knowledge Proofs.
Zero Knowledge Proofs By Subha Rajagopalan Jaisheela Kandagal.
1 Introduction to Secure Computation Benny Pinkas HP Labs, Princeton.
Introduction to Modern Cryptography, Lecture 7/6/07 Zero Knowledge and Applications.
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
K-Anonymous Message Transmission Luis von Ahn Andrew Bortz Nick Hopper The Aladdin Center Carnegie Mellon University.
Blind Vision Shai Avidan, Moshe Butman Yuval Schwartz.
Slide 1 Vitaly Shmatikov CS 380S Oblivious Transfer and Secure Multi-Party Computation With Malicious Parties.
Quadratic Residuosity and Two Distinct Prime Factor ZK Protocols By Stephen Hall.
CS573 Data Privacy and Security
A Secure Protocol for Computing Dot-products in Clustered and Distributed Environments Ioannis Ioannidis, Ananth Grama and Mikhail Atallah Purdue University.
Andrew Lindell Aladdin Knowledge Systems and Bar-Ilan University 04/09/08 CRYP-202 Legally-Enforceable Fairness in Secure Two-Party Computation.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
Secure Computation of the k’th Ranked Element Gagan Aggarwal Stanford University Joint work with Nina Mishra and Benny Pinkas, HP Labs.
On the Practical Feasibility of Secure Distributed Computing A Case Study Gregory Neven, Frank Piessens, Bart De Decker Dept. of Computer Science, K.U.Leuven.
Secure two-party computation: a visual way by Paolo D’Arco and Roberto De Prisco.
Improved Non-Committing Encryption with Application to Adaptively Secure Protocols joint work with Dana Dachman-Soled (Columbia Univ.), Tal Malkin (Columbia.
Introduction to Modern Cryptography Sharif University Spring 2015 Data and Network Security Lab Sharif University of Technology Department of Computer.
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark ECRYPT Autumn School, Bertinoro Wednesday, October.
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark 9 th workshop on QIP 2006, Paris Tuesday, January.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
Quantum Teleportation and Bit Commitment Chi-Yee Cheung Chung Yuan Christian University June 9, 2009.
On the Communication Complexity of SFE with Long Output Daniel Wichs (Northeastern) joint work with Pavel Hubáček.
Introduction to Quantum Key Distribution
Secure Computation (Lecture 2) Arpita Patra. Vishwaroop of MPC.
Cryptography In the Bounded Quantum-Storage Model
Andrew Lindell Aladdin Knowledge Systems and Bar-Ilan University 04/08/08 CRYP-106 Efficient Fully-Simulatable Oblivious Transfer.
Efficient Oblivious Transfer with Stateless Secure Tokens Alcatel-Lucent Bell Labs Vlad Kolesnikov.
 5.1 Zero-Knowledge Proofs  5.2 Zero-Knowledge Proofs of Identity  5.3 Identity-Based Public-Key Cryptography  5.4 Oblivious Transfer  5.5 Oblivious.
Bit Commitment, Fair Coin Flips, and One-Way Accumulators Matt Ashoff 11/9/2004 Cryptographic Protocols.
Cryptographic methods. Outline  Preliminary Assumptions Public-key encryption  Oblivious Transfer (OT)  Random share based methods  Homomorphic Encryption.
Multi-Party Computation r n parties: P 1,…,P n  P i has input s i  Parties want to compute f(s 1,…,s n ) together  P i doesn’t want any information.
Zero Knowledge r Two parties:  All powerful prover P  Polynomially bounded verifier V r P wants to prove a statement to V with the following properties:
Topic 36: Zero-Knowledge Proofs
Fast Actively Secure OT Extension For Short Secrets
Laconic Oblivious Transfer and its Applications
Topic 14: Random Oracle Model, Hashing Applications
The first Few Slides stolen from Boaz Barak
Course Business I am traveling April 25-May 3rd
Maliciously Secure Two-Party Computation
Cryptography for Quantum Computers
Interactive Proofs and Secure Multi-Party Computation
Example: multi-party coin toss
Oblivious Transfer.
ITIS 6200/8200 Chap 5 Dr. Weichao Wang.
A Light-weight Oblivious Transfer Protocol Based on Channel Noise
Presentation transcript:

Oblivious Transfer based on the McEliece Assumptions Rafael Dowsley Jeroen van der Graaf Jörn Müller-Quade Anderson C. A. Nascimento University of Brasilia

Plaintext Ciphertext Plaintext Encryption Decryption Key Key

However, there are other (more challenging) tasks to be dealt with in cryptology… Secure Multi (Two)-Party Computations.

They want to know if there exists mutual interest between them. However, they do not want to reveal an uncorresponded love. F(X,Y)= X AND Y X AND Y=1  I love you X AND Y=0  Get away! The players must learn the answer but should get no extra knowledge on each other’s input, besides what can be computed from his/her input and the output itself.

The Millionaires Problem Two millionaires want to know who is the richest one between them. However, they are not willing to reveal the amount of their wealth.

F(X,Y) Y X Bob Secure Two Party Computations Alice Alice should know nothing about F(X,Y) besides what can be computed from X. Bob should know nothing about X besides what can be computed from F(X,Y) If both players are honest Bob should receive F(X,Y) F(X,Y)

An Ideal Protocol X Y Trusted Third Party Bob F(X,Y) F(X,Y)

Security and Adversarial Models A protocol is secure if anything an adversary obtains in the real protocol can also be obtained in the ideal model. Honest-but-Curious Adversary: Follows the protocol, but otherwise tries to obtain as much information on the other player input as possible Malicious: Can deviate from the protocol in an arbitrary way (spit on your face, stick a finger in your eye, etc.)

Oblivious Transfer b0, b1 c bc Joe Kilian: Founding Cryptography on Oblivious Transfer. STOC 88: 20-31

Oblivious Transfer b0,b1 c c bc bc

Oblivious Transfer b0,b1 c bc Oblivious Transfer is an important primitive, but no quantum resistant implementation is known.

Here we give an oblivious transfer protocol based b0,b1 c Here we give an oblivious transfer protocol based on assumptions from coding theory, which is computationally secure for Alice and for Bob. bc Oblivious Transfer is an important primitive, but no quantum resistant implementation is known

Relationship to PKC OT and PKC do not imply each other in general.

McEliece Error Correcting Codes m c c‘ m Random linear codes are good, but difficult to decode.

McEliece Error Correcting Codes m c c‘ m Random linear codes are good, but difficult to decode. NP compete

McEliece turned this into a public key scheme Error Correcting Codes m c c‘ m Random linear codes are good, but difficult to decode. McEliece turned this into a public key scheme

Goppa Codes Goppa codes are algebraic geometry codes with good error correction properties.

Scrambled Goppa Codes . . = P G G‘ S G‘ looks like a generator matrix of a random code

The McEliece Cryptosystem G Secret key: Public key: S , , G‘

The McEliece Cryptosystem G‘ e c . Encrypt: Decrypt: + = m random error vector with t errors c P-1 error correction procedure . S-1 = m

The McEliece Assumptions A scrambled Goppa code matrix is indistiguishable from a random matrix Decoding a random linear code is hard on average We will turn this into an oblivious transfer scheme

Two Steps Semi-honest adversary Active adversary To later cope with the active adversary we need a commitment scheme from the McEliece assumption.

Secure commitment schemes give us zero knowledge proofs! Bit Commitment b b Alice puts a bit b in a strong box Alice gives this box to Bob. She cannot change b Later Alice can unveil b to Bob Secure commitment schemes give us zero knowledge proofs! A commitment scheme is said to be secure if it is binding, concealing and correct: Binding: the probability that Alice can successfully open two different commitments is negligible. Concealing: Bob gets at most negligible information on the information Alice commits to before the opening phase. Correct: The probability that honest Alice fails to open a commitment is negligible in a security parameter n.

Commitments from McEliece Simple: Commit = encrypt Unveil = reveal the error vector e

Commitments from McEliece Simple: Commit = encrypt Unveil = reveal the error vector e To achieve information theoretic security for Bob we need a statistically hiding commitment.

Commitments from McEliece Simple: Commit = encrypt Unveil = reveal the error vector e To achieve information theoretic security for Bob we need a statistically hiding commitment. The McEliece cryptosystem yields a one-way-function and statistically hiding commitments can be obtained from any one-way-function [Haitner/Reingold STOC07]

The protocol for semi honest adversary Random matrix Q Q

The protocol for semi honest adversary Random matrix Q Q McEliece matrix G G, GQ

The protocol for semi honest adversary Random matrix Q Q Order depends on choice McEliece matrix G G, GQ

The protocol for semi honest adversary Random matrix Q Q McEliece matrix G G, GQ Encrypts m0, m1 c0, c1

The protocol for semi honest adversary Random matrix Q Q McEliece matrix G G, GQ Encrypts m0, m1 c0, c1 can decrypt only one

An Active Attack Given Q can one find P and P‘ with Q = PP‘ such that both have reasonable error correcting properties? We could not exclude this... Bob could be able to obtain both...

An Actively Secure Protocol We perform the protocol twice (with random inputs): Bob commits to G, and in one of the protocols Alice will ask Bob to unveil and check if he cheated. The cheating probability for Bob is 50%, but this can be made arbitrarily small by repetition... More efficient than Goldreich‘s compiler.

Interactive Hashing We want Bob to send two matrices to Alice one he can decode efficiently and one which is random. Interactive hashing could yield a more efficient solution...

We have a different reduction to a protocol secure against active cheaters based on BR Commitments (a generalized version). Yields committed oblivious transfer!

Conclusions OT based on McElice Cryptosystem Secure against quantum computers (?) Maybe an application for interactive hashing.