Andrew Lindell Aladdin Knowledge Systems and Bar-Ilan University 04/09/08 CRYP-202 Legally-Enforceable Fairness in Secure Two-Party Computation.

Slides:



Advertisements
Similar presentations
Dov Gordon & Jonathan Katz University of Maryland.
Advertisements

Quantum Software Copy-Protection Scott Aaronson (MIT) |
Revisiting the efficiency of malicious two party computation David Woodruff MIT.
Secure Multiparty Computations on Bitcoin
A l a d d i n. c o m eToken NG-OTP Combined PKI - OTP Authentication Solution November, 2008.
Sales Contracts.  Sale – Contract in which ownership of goods transfers immediately from the seller to the buyer  Ownership – Collection of rights that.
Efficient Zero-Knowledge Proof Systems Jens Groth University College London.
Polling With Physical Envelopes A Rigorous Analysis of a Human–Centric Protocol Tal Moran Joint work with Moni Naor.
ITIS 6200/ Secure multiparty computation – Alice has x, Bob has y, we want to calculate f(x, y) without disclosing the values – We can only do.
Semi-Honest to Malicious Oblivious-Transfer The Black-box Way Iftach Haitner Weizmann Institute of Science.
Improved Efficiency for Private Stable Matching Matthew Franklin, Mark Gondree, and Payman Mohassel University of California, Davis 02/07/07 - Session.
CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation.
1 Cryptanalysis-tolerant CPA crypt. ● Suppose E, E’ are two encryption schemes which on of them is CPA - secure  E.g., a standard and a proprietary, a.
Recoverable and Untraceable E-Cash Dr. Joseph K. Liu The Chinese University of HongKong.
Introduction to Modern Cryptography, Lecture 12 Secure Multi-Party Computation.
Eran Omri, Bar-Ilan University Joint work with Amos Beimel and Ilan Orlov, BGU Ilan Orlov…!??!!
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Payment Systems 1. Electronic Payment Schemes Schemes for electronic payment are multi-party protocols Payment instrument modeled by electronic coin that.
Modeling Insider Attacks on Group Key Exchange Protocols Jonathan Katz Ji Sun Shin University of Maryland.
General Cryptographic Protocols (aka secure multi-party computation) Oded Goldreich Weizmann Institute of Science.
Yan Huang, Jonathan Katz, David Evans University of Maryland, University of Virginia Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose.
Impossibility Results for Concurrent Two-Party Computation Yehuda Lindell IBM T.J.Watson.
Oblivious Transfer based on the McEliece Assumptions
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
Receipt-freeness and coercion-resistance: formal definitions and fault attacks Stéphanie Delaune / Steve Kremer / Mark D. Ryan.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
1 Introduction to Secure Computation Benny Pinkas HP Labs, Princeton.
Survey: Secure Composition of Multiparty Protocols Yehuda Lindell IBM T.J. Watson.
Optimistic Synchronous Multi-Party Contract Signing N. Asokan, Baum-Waidner, M. Schunter, M. Waidner Presented By Uday Nayak Advisor: Chris Lynch.
Anonymous Communication Luis von Ahn Andrew Bortz Nick Hopper The Aladdin Center Carnegie Mellon University.
K-Anonymous Message Transmission Luis von Ahn Andrew Bortz Nick Hopper The Aladdin Center Carnegie Mellon University.
Cramer-Shoup is Plaintext Aware in the Standard Model Alexander W. Dent Information Security Group Royal Holloway, University of London.
Slide 1 Vitaly Shmatikov CS 380S Oblivious Transfer and Secure Multi-Party Computation With Malicious Parties.
1 Cross-Domain Secure Computation Chongwon Cho (HRL Laboratories) Sanjam Garg (IBM T.J. Watson) Rafail Ostrovsky (UCLA)
Information-Theoretic Security and Security under Composition Eyal Kushilevitz (Technion) Yehuda Lindell (Bar-Ilan University) Tal Rabin (IBM T.J. Watson)
Adaptively Secure Broadcast, Revisited
How to play ANY mental game
Public-Key Encryption with Lazy Parties Kenji Yasunaga Institute of Systems, Information Technologies and Nanotechnologies (ISIT), Japan Presented at SCN.
Efficient and Robust Private Set Intersection and multiparty multivariate polynomials Dana Dachman-Soled 1, Tal Malkin 1, Mariana Raykova 1, Moti Yung.
Oblivious Signature-Based Envelope Ninghui Li, Stanford University Wenliang (Kevin) Du, Syracuse University Dan Boneh, Stanford University.
Chapter 4: Intermediate Protocols
Distributed Algorithms – 2g1513 Lecture 9 – by Ali Ghodsi Fault-Tolerance in Distributed Systems.
Secure two-party computation: a visual way by Paolo D’Arco and Roberto De Prisco.
1 Privacy Preserving Data Mining Haiqin Yang Extracted from a ppt “Secure Multiparty Computation and Privacy” Added “Privacy Preserving SVM”
Introduction to Modern Cryptography Sharif University Spring 2015 Data and Network Security Lab Sharif University of Technology Department of Computer.
A l a d d i n. c o m eSafe 6 FR2 Product Overview.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Rational Cryptography Some Recent Results Jonathan Katz University of Maryland.
Zero-knowledge proof protocols 1 CHAPTER 12: Zero-knowledge proof protocols One of the most important, and at the same time very counterintuitive, primitives.
Secure Computation (Lecture 2) Arpita Patra. Vishwaroop of MPC.
Multi-Party Proofs and Computation Based in part on materials from Cornell class CS 4830.
PROACTIVE SECRET SHARING Or: How to Cope With Perpetual Leakage Herzberg et al. Presented by: Avinash Ravi Kevin Skapinetz.
Andrew Lindell Aladdin Knowledge Systems and Bar-Ilan University 04/08/08 CRYP-106 Efficient Fully-Simulatable Oblivious Transfer.
Jonathan Katz University of Maryland Andrew Lindell Aladdin Knowledge Systems and Bar-Ilan University 04/08/08 CRYP-108 Aggregate Message- Authentication.
Utility Dependence in Correct and Fair Rational Secret Sharing Gilad Asharov Yehuda Lindell Bar-Ilan University, Israel.
CS555Spring 2012/Topic 151 Cryptography CS 555 Topic 15: HMAC, Combining Encryption & Authentication.
 5.1 Zero-Knowledge Proofs  5.2 Zero-Knowledge Proofs of Identity  5.3 Identity-Based Public-Key Cryptography  5.4 Oblivious Transfer  5.5 Oblivious.
Verifiable Threshold Secret Sharing and Full Fair Secure Two-party Computation YE Jian-wei March 7, 2009.
Bit Commitment, Fair Coin Flips, and One-Way Accumulators Matt Ashoff 11/9/2004 Cryptographic Protocols.
Cryptographic methods. Outline  Preliminary Assumptions Public-key encryption  Oblivious Transfer (OT)  Random share based methods  Homomorphic Encryption.
The secure site rendering issue (all navigation crushed together as a list at the top of the page) is a compatibility issue with Internet Explorer only.
Connectivity to bank and sample account structure
Topic 36: Zero-Knowledge Proofs
Course Business I am traveling April 25-May 3rd
Automation in an XML Authoring Environment
Applications of Blockchains - III
Motivation for 36OU Open Rack
TITLE Source: Footnotes:. TITLE Source: Footnotes:
Emotional Intelligence: The Core of Family Offices
Presentation transcript:

Andrew Lindell Aladdin Knowledge Systems and Bar-Ilan University 04/09/08 CRYP-202 Legally-Enforceable Fairness in Secure Two-Party Computation

Insert presenter logo here on slide master Secure Multiparty Computation  A set of parties with private inputs wish to compute some joint function of their inputs  Parties wish to preserve some security properties. E.g., privacy and correctness » Example: secure election protocol  Security must be preserved in the face of adversarial behavior by some of the participants, or by an external party

Insert presenter logo here on slide master Security Requirements  Privacy » Parties can learn their designated output and nothing more My private vote in an election is not revealed  Correctness » The correct function is computed The candidate with the majority vote is elected  Independence of inputs » Parties cannot make their inputs depend on others  Fairness » If one party receives output, then all receive output

Insert presenter logo here on slide master Fairness  Cleve (1986) showed that it is impossible for two parties to fairly toss a coin » Can be extended to other functionalities as well  Intuition behind proof » Assume that can compute fairly with m rounds » Consider an adversary that doesn’t send its last message » By the requirement of fairness, the other party still receives output Thus, this last message is not needed and the protocol can be made m–1 rounds

Insert presenter logo here on slide master Impossibility of Fairness (continued)  By induction, all messages can be removed, and so we are left with an empty protocol  But only trivial functions can be computed without interaction!  Conclusion: fairness cannot be achieved  Warning » This intuition is not exact, and the real situation is more involved

Insert presenter logo here on slide master Fairness – Alternatives  Gradual release [BG,GL] » The output is released slowly, so that no party has too much advantage in guessing it  Optimistic computation [M,ASW,CC] » An online trusted party is assumed to be in place » If no one cheats, the trusted party is not needed » If fairness is breached by cheating, the trusted party is invoked to help restore fairness

Insert presenter logo here on slide master A New Approach  Similar to the optimistic model, but use existing legal and financial infrastructure  Assume that digital signature law is in place and recognized » Digitally-signed cheques are enforced

Insert presenter logo here on slide master Concurrent Signatures – Prior Work  Problem of fair exchange of signatures  Fundamental observation by Chen, Kudla and Paterson » A signature can only be enforced by revealing it (e.g., in a court)  Their idea » First, one party receives only a keystone (useless by itself) » Then, the other party receives the full signature it is supposed to » Given the keystone and the other signature, the first party can derive its full signature  Construction under specific assumptions and using a random oracle

Insert presenter logo here on slide master Achieving Concurrent Signatures  To motivate our method, we show how to achieve concurrent signatures » With general assumptions and no random oracle  Requirement: » P 1 should receive a signature on m 1, denoted  1 =Sign(m 1 ). » P 2 should receive a signature on m 2, denoted  2 =Sign(m 2 ).  The protocol: » The parties use a secure two-party computation protocol First, P 1 receives  1 =Sign(m 1,  2 ) Then, P 2 receives  2 =Sign(m 2 )

Insert presenter logo here on slide master Achieving Concurrent Signatures  Reminder » P 1 receives  1 =Sign(m 1,  2 ) » P 2 receives  2 =Sign(m 2 )  If P 1 aborts after receiving  1, then P 2 may not receive its signature  2 » In order to enforce  1, P 1 has to present it (e.g., to a court) » But, this reveals  2, restoring fairness  Remark » This is not perfect, but it is very good...

Insert presenter logo here on slide master Secure Two-Party Protocol – Background  Requirement: » P 1 and P 2 have inputs x and y » P 1 and P 2 should receive f(x,y), for some function f  Notation » A cheque from P 1 to P 2 is a digitally signed message: Stating whom the recipient is Stating how much money should be transferred Containing an additional field for arbitrary text

Insert presenter logo here on slide master Our Protocol for Secure 2-Party Computation  Phase 1: The parties use a secure two-party computation protocol: » P 1 receives a signed cheque chq 1 for $10,000 from P 2 This cheque contains another cheque chq 2 for $10,000 for P 2 from P 1 The cheque chq 2 is encrypted so that only P 2 can decrypt The cheque chq 2 contains the output value f(x,y)  Phase 2 » P 1 sends the encrypted chq 2 to P 2 » P 2 decrypts, obtains f(x,y) and sends it back to P 1 chq 1 chq 2 f(x,y)

Insert presenter logo here on slide master Our Protocol for Secure 2-Party Computation Party P 2 Party P 1 x y x y Secure computation subprotocol chq 1 Contains encrypted counter-cheque chq 2 for P 2 (with output) chq 2, f(x,y) Decrypt, and obtain f(x,y) f(x,y)f(x,y) Output f(x,y)

Insert presenter logo here on slide master Early Aborting  If either party aborts before the end of phase 1 » No one learns anything and so fairness is preserved  If P 1 aborts after receiving chq 1 » It hasn’t learned the output and so fairness is preserved » If it tries to cash chq 1, P 2 will obtain chq 2 and will counter it (so P 2 won’t lose money) xy chq 1 chq 2, f(x,y ) f(x,y)f(x,y)

Insert presenter logo here on slide master Early Aborting  If P 2 aborts after receiving chq 2 » P 2 has learned f(x,y) and P 1 hasn’t, so fairness is breached » But P 1 has a cheque from P 2 and so can force P 2 to either present f(x,y) or pay!  Conclusion: » P 2 can breach fairness, but only by paying the cheque Setting the sum high enough makes this unlikely xy chq 1 chq 2, f(x,y ) f(x,y)f(x,y)

Insert presenter logo here on slide master A Comparison to the Optimistic Model  Optimistic model » Guarantees fairness always » Fairness is obtained immediately » Requires “special” infrastructure and trust  Our solution » Uses existing infrastructure in society (that is trusted) » Fairness is not immediate (need to wait for courts, bank…) » Adversary can choose to breach fairness for a high enough price

Insert presenter logo here on slide master Summary  We introduced a different approach to fairness  Future challenges » Construct efficient protocols according to our approach » Make the world a fairer place Although this may be out of the scope of this work

Insert presenter logo here on slide master Legal Notice © Copyright 2008 Aladdin Knowledge Systems Ltd. All rights reserved. Aladdin, Aladdin Knowledge Systems, the Aladdin Knowledge Systems logo, eToken and eSafe are trademarks of Aladdin Knowledge Systems Ltd. covered by patents other patents pending. You may not copy, reproduce (or the like), or use in any other way whatsoever, whether directly or indirectly, any of the materials represented and/or disclosed herein without the express written consent of Aladdin. Some of the information contained herein may be proprietary information of Aladdin or third parties and all text, images, graphics, trademarks, service marks, logos, trade names and other materials which are part of this communication are subject to intellectual property rights of Aladdin or third parties. The information herein is provided “as is” without any warranty, express or implied (by statute or otherwise), of any kind whatsoever. Aladdin does not undertake any obligation to update the information herein and it does not assume responsibility for errors or omissions.