ON THE PROVABLE SECURITY OF HOMOMORPHIC ENCRYPTION Andrej Bogdanov Chinese University of Hong Kong Bertinoro Summer School | July 2014 based on joint work.

Slides:



Advertisements
Similar presentations
Efficiency vs. Assumptions in Secure Computation Yuval Ishai Technion & UCLA.
Advertisements

Shortest Vector In A Lattice is NP-Hard to approximate
Approximate List- Decoding and Hardness Amplification Valentine Kabanets (SFU) joint work with Russell Impagliazzo and Ragesh Jaiswal (UCSD)
Uniform Hardness vs. Randomness Tradeoffs for Arthur-Merlin Games. Danny Gutfreund, Hebrew U. Ronen Shaltiel, Weizmann Inst. Amnon Ta-Shma, Tel-Aviv U.
Lattices, Cryptography and Computing with Encrypted Data
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Vote privacy: models and cryptographic underpinnings Bogdan Warinschi University of Bristol 1.
CS555Topic 191 Cryptography CS 555 Topic 19: Formalization of Public Key Encrpytion.
11 Provable Security. 22 Given a ciphertext, find the corresponding plaintext.
Digital Signatures and Hash Functions. Digital Signatures.
Foundations of Cryptography Lecture 5 Lecturer: Moni Naor.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Foundations of Cryptography Lecture 13 Lecturer: Moni Naor.
S EMANTICALLY - SECURE FUNCTIONAL ENCRYPTION : P OSSIBILITY RESULTS, IMPOSSIBILITY RESULTS AND THE QUEST FOR A GENERAL DEFINITION Adam O’Neill, Georgetown.
Immunizing Encryption Schemes from Decryption Errors Cynthia Dwork Moni Naor Omer Reingold Weizmann Institute of ScienceMicrosoft Research.
New Lattice Based Cryptographic Constructions
Complexity 18-1 Complexity Andrei Bulatov Probabilistic Algorithms.
CS151 Complexity Theory Lecture 7 April 20, 2004.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Lattice-Based Cryptography
Introduction to Modern Cryptography, Lecture ?, 2005 Broadcast Encryption, Traitor Tracing, Watermarking.
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
A Designer’s Guide to KEMs Alex Dent
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
On The Cryptographic Applications of Random Functions Oded Goldreich Shafi Goldwasser Silvio Micali Advances in Cryptology-CRYPTO ‘ 84 報告人 : 陳昱升.
Oded Regev Tel-Aviv University On Lattices, Learning with Errors, Learning with Errors, Random Linear Codes, Random Linear Codes, and Cryptography and.
CRYPTOGRAPHY WHAT IS IT GOOD FOR? Andrej Bogdanov Chinese University of Hong Kong CMSC 5719 | 6 Feb 2012.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Zero Knowledge Proofs. Interactive proof An Interactive Proof System for a language L is a two-party game between a verifier and a prover that interact.
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
Foundations of Cryptography Lecture 9 Lecturer: Moni Naor.
Foundations of Cryptography Lecture 8 Lecturer: Moni Naor.
0x1A Great Papers in Computer Security
Lecture 3.2: Public Key Cryptography II CS 436/636/736 Spring 2014 Nitesh Saxena.
Cryptography Lecture 8 Stefan Dziembowski
Can we base cryptography on SZK-Hardness? Salil Vadhan Harvard University.
Cryptography Lecture 10 Arpita Patra. Quick Recall and Today’s Roadmap >> CPA & CPA-mult security >> Equivalence of CPA and CPA-mult security >> El Gamal.
Towards Automated Security Proof for Symmetric Encryption Modes Martin Gagné Joint work with Reihaneh Safavi-Naini, Pascal Lafourcade and Yassine Lakhnech.
Vadim Lyubashevsky INRIA / ENS, Paris
1 Information Security – Theory vs. Reality , Winter Lecture 10: Garbled circuits (cont.), fully homomorphic encryption Eran Tromer.
Lattice-Based Cryptography: From Practice to Theory to Practice Vadim Lyubashevsky INRIA / CNRS / ENS Paris (September 12, 2011)
Lecture 3.4: Public Key Cryptography IV CS 436/636/736 Spring 2013 Nitesh Saxena.
Cryptography Lecture 9 Stefan Dziembowski
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
CRYPTOGRAPHY AND NP-HARDNESS Andrej Bogdanov Chinese University of Hong Kong Bertinoro Summer School | July 2014.
Fast algorithm for the Shortest Vector Problem er (joint with Aggarwal, Dadush, and Stephens-Davidowitz) Oded Regev Courant Institute, NYU UC Irvine, Sloan.
On the Communication Complexity of SFE with Long Output Daniel Wichs (Northeastern) joint work with Pavel Hubáček.
Alternative Wide Block Encryption For Discussion Only.
Polynomially Homomorphic Signatures Dan Boneh Stanford University Joint work with David Freeman.
Lattice-based cryptography and quantum Oded Regev Tel-Aviv University.
CRYPTOGRAPHY AND NP-HARDNESS Andrej Bogdanov Chinese University of Hong Kong MACS Foundations of Cryptography| January 2016.
CRYPTOGRAPHIC HARDNESS OTHER FUNCTIONALITIES Andrej Bogdanov Chinese University of Hong Kong MACS Foundations of Cryptography| January 2016.
China Summer School on Lattices and Cryptography Craig Gentry and Shai Halevi June 3, 2014 Fully Homomorphic Encryption and Bootstrapping.
Does Privacy Require True Randomness? Yevgeniy Dodis New York University Joint work with Carl Bosley.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2014.
Cryptography Lecture 10 Arpita Patra © Arpita Patra.
Fully Homomorphic Encryption (FHE) By: Matthew Eilertson.
Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
Topic 36: Zero-Knowledge Proofs
Group theory exercise.
Background: Lattices and the Learning-with-Errors problem
Topic 30: El-Gamal Encryption
Cryptography Lecture 6.
Cryptography Lecture 25.
NP-completeness The Chinese University of Hong Kong Fall 2008
Indistinguishability by adaptive procedures with advice, and lower bounds on hardness amplification proofs Aryeh Grinberg, U. Haifa Ronen.
Cryptography Lecture 6.
Cryptography Lecture 21.
Cryptography Lecture 23.
Presentation transcript:

ON THE PROVABLE SECURITY OF HOMOMORPHIC ENCRYPTION Andrej Bogdanov Chinese University of Hong Kong Bertinoro Summer School | July 2014 based on joint work with Chin Ho Lee Northeastern Unversity

Public-key bit encryption SKPK Bob Alice b Enc PK (b) Dec SK ( ) b Enc PK (b) PK message indistinguishability (PK, Enc PK ( 0 )) and (PK, Enc PK ( 1 )) are computationally indistinguishable

El Gamal encryption g, h in some large cyclic group PK = ( g, h )g SK = h such that Enc PK (b) = ( g r, 2 b h r ) where r random Dec SK (x, y) = b such that x SK = 2 b y

Homomorphism of encryptions Enc PK (b) = ( g r, 2 b h r ) Enc PK (b) Enc PK (b’) and Enc PK (b + b’) are identically distributed Dec SK (Enc PK (b) Enc PK (b’)) = b + b’ strongly homomorphic weakly homomorphic

Does P ≠ NP imply cryptography? provided SAT is worst-case hard requires average-case hardness of distinguishing encryptions requires average-case hardness of distinguishing encryptions

Cryptography from lattices Ajtai one-way functions Ajtai-Dwork public-key encryption Regev, Peikert, Gentry, Brakerski and Vaikutanathan,... “somewhat” homomorphic encryption If short vectors in certain lattices are worst-case hard to find, then we have... but we can find them in NP ∩ coNP but we can find them in NP ∩ coNP

Reductions How to prove message indistinguishability? distinguisher (PK, Enc PK (b)) biased towards b x ∈ SAT ? q1q1 a1a1 q2q2 a2a2 YES/NO

From reductions to proof systems L distinguisher verifier prover R Brassard randomness for R transcript for every query (PK, C) answer b randomness r s.t. Enc PK (b, r) = C is it correct? are they correct? OK

From reductions to proof systems Conclusion A reduction from L to distinguishing Enc implies that L is in NP ∩ coNP Yes, but under implicit assumption that queries always have a unique answer Goldreich and Goldwasser

Brassard’s assumption for every PK Enc PK ( 0 ) Enc PK ( 1 ) query what if Enc PK ( 0 ) Enc PK ( 1 ) Enc PK ( 0 ) Enc PK ( 1 )

Restricting the reduction If reduction is nonadaptive then L is in AM ∩ coAM For general encryptions, best we can say Feigenbaum and Fortnow, B. and Trevisan, Akavia Goldreich Goldwasser and Moshkovitz

Our result If Enc has weak homomorphic evaluator for f, then L is in AM ∩ coAM Reduction can be adaptive, queries arbitrary If reduction has constant query complexity, then L is in statistical zero- knowledge Let f be a “polynomially sensitive” function

Sensitivity of functions f:f: sens 0 f( 0100 ) = 2 sens 0 f = max x sens 0 f(x) f: {0, 1} n → {0, 1} is polynomially sensitive if sens 0 f, sens 1 f are at least n  (1)

AM SZK P coAM Homomorphic encryptions, reductions of constant query complexity Homomorphic encryptions, arbitrary reductions previous works Arbitrary encryptions, nonadaptive reductions SAT

Rerandomization The ability to map a ciphertext into an i.i.d ciphertext without knowing the secret key C = ( g r, 2 b h r ) PK = ( g, h )g SK = h such that Rer PK (C) = C ∙ ( g r’, h r’ ) El Gamal example is i.i.d with C

Rerandomization from evaluation strong homomorphic evaluator for majority H Enc( 0 ) Enc(b) Enc( 0 ) Enc(b) Enc( 1 ) Rer

Rerandomization from evaluation H Enc( 0 ) To H, Enc( 0 ) indistinguishable from Enc( 0 ) so output of H must forget most of Enc( 0 )

Rerandomization from evaluation If H is a strong homomorphic evaluator for majority on k bits, then (Enc(b), Rer(Enc(b)) is √ c/k -close to a pair of independent encryptions of b. Lemma We prove a weaker version for weak homomorphic evaluators and any sensitive f.

Distinguishing rerandomizations Encryption can be broken using rerandomization and an SZK oracle Enc(b) Rer( ) Enc( 0 ) If b = 0, they are statistically close vs. If b = 1, they must be statistically far so they can be distinguished in SZK

The rest of the proof Since we can decrypt in SZK, L can be solved with reduction + SZK oracle So L is in BPP SZK ⊆ AM ⋂ coAM Mahmoody and Xiao For weak homomorphism and general f, not sure if true; we give new proof system

Quality of rerandomization If H is a homomorphic evaluator for majority on k bits, then (Enc(b), Rer(Enc(b)) is √ c/k -close to a pair of independent encryptions of b. Lemma For strong homomorphic evaluation, we can make this exponentially small.

Improving the rerandomization Enc(b) Enc( 0 )Enc( 1 ) H Enc(b) H Enc( 1 ) Enc( 0 ) Enc(b) Algorithm: Apply H iteratively t times.

Analysis Enc( 1 ) Enc( 0 ) H Enc( 1 )Enc( 0 ) H Enc(b) Enc( 1 ) H H Enc(b) Enc( 1 ) Enc( 0 ) Enc(b)

Analysis Enc( 1 ) Enc( 0 ) H Enc( 1 ) H H Enc( 0 )Enc( 1 )Enc( 0 ) H Enc( 1 )

Analysis If we recurse t times, original Enc(b) could be any one of 2 t inputs Applying lemma, distinguishing advantage drops to O( √ c/2 t ) Value of t is determined by quality of H Statistical distance between output of H and actual encryption

Rerandomization theorem f : any function except for AND, OR, NOT then there is a rerandomization with statistical error 2 -  (h). Assume f has strong homomorphic evaluator with quality 2 -h