Polynomially Homomorphic Signatures Dan Boneh Stanford University Joint work with David Freeman.

Slides:



Advertisements
Similar presentations
FULLY HOMOMORPHIC ENCRYPTION
Advertisements

Perfect Non-interactive Zero-Knowledge for NP
Simulation-sound NIZK Proofs for a Practical Language and Constant Size Group Signatures Jens Groth University of California Los Angeles Presenter: Eike.
Fully Homomorphic Encryption over the Integers
Efficient Non-interactive Proof Systems for Bilinear Groups Jens Groth University College London Amit Sahai University of California Los Angeles TexPoint.
Rennes, 24/10/2014 Cristina Onete CIDRE/ INRIA Privacy in signatures. Hiding in rings, hiding in groups.
Secure Evaluation of Multivariate Polynomials
Spreading Alerts Quietly and the Subgroup Escape Problem Aleksandr Yampolskiy (Yale) Joint work with James Aspnes, Zoë Diamadi, Kristian Gjøsteen, and.
Cryptographic Multilinear Maps
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Vote privacy: models and cryptographic underpinnings Bogdan Warinschi University of Bristol 1.
Gillat Kol joint work with Ran Raz Competing Provers Protocols for Circuit Evaluation.
FULLY HOMOMORPHIC ENCRYPTION IBM T. J. Watson Vinod Vaikuntanathan from the Integers Joint Work with M. van Dijk (MIT & RSA labs), C. Gentry (IBM), S.
Notation Intro. Number Theory Online Cryptography Course Dan Boneh
New Advances in Garbling Circuits Based on joint works with Yuval Ishai Eyal Kushilevitz Brent Waters University of TexasTechnion Benny Applebaum Tel Aviv.
Secret Handshakes from CA-Oblivious Encryption Asiacrypt 2004, Jeju-do, Korea Claude Castelluccia, Stanisław Jarecki, Gene Tsudik UC Irvine.
The Bright Side of Hardness Relating Computational Complexity and Cryptography Oded Goldreich Weizmann Institute of Science.
CNS2010handout 10 :: digital signatures1 computer and network security matt barrie.
Foundations of Cryptography Lecture 5: Signatures and pseudo-random generators Lecturer: Moni Naor.
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
1 Queries on Encrypted Data Dan Boneh Brent Waters Stanford UniversitySRI.
1 Conjunctive, Subset, and Range Queries on Encrypted Data Dan Boneh Brent Waters Stanford University SRI International.
ON THE PROVABLE SECURITY OF HOMOMORPHIC ENCRYPTION Andrej Bogdanov Chinese University of Hong Kong Bertinoro Summer School | July 2014 based on joint work.
Foundations of Cryptography Lecture 9 Lecturer: Moni Naor.
Foundations of Cryptography Lecture 8 Lecturer: Moni Naor.
Foundations of Cryptography Rahul Jain CS6209, Jan – April 2011
Dan Boneh Public Key Encryption from trapdoor permutations Public key encryption: definitions and security Online Cryptography Course Dan Boneh.
Realizing Hash and Sign Signatures under Standard Assumptions Realizing Hash and Sign Signatures under Standard Assumptions Susan Hohenberger Johns Hopkins.
Functional Encryption: An Introduction and Survey Brent Waters.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Oblivious Signature-Based Envelope Ninghui Li, Stanford University Wenliang (Kevin) Du, Syracuse University Dan Boneh, Stanford University.
ON CONTINUAL LEAKAGE OF DISCRETE LOG REPRESENTATIONS Shweta Agrawal IIT, Delhi Joint work with Yevgeniy Dodis, Vinod Vaikuntanathan and Daniel Wichs Several.
The Generic Transformation from Standard Signatures to Identity-Based Aggregate Signatures Bei Liang, Hongda Li, Jinyong Chang.
Forward-Secure Signatures (basic + generic schemes)
1 Information Security – Theory vs. Reality , Winter Lecture 10: Garbled circuits (cont.), fully homomorphic encryption Eran Tromer.
Foundations of Cryptography Lecture 6 Lecturer: Moni Naor.
Cryptography Lecture 2 Arpita Patra. Summary of Last Class  Introduction  Secure Communication in Symmetric Key setting >> SKE is the required primitive.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
On the Communication Complexity of SFE with Long Output Daniel Wichs (Northeastern) joint work with Pavel Hubáček.
Some Fundamental Insights of Computational Complexity Theory Avi Wigderson IAS, Princeton, NJ Hebrew University, Jerusalem.
1 Lossy Trapdoor Functions and Their Applications Brent Waters SRI International Chris Peikert SRI International.
1 Information Security – Theory vs. Reality , Winter Lecture 11: Fully homomorphic encryption Lecturer: Eran Tromer Including presentation.
1 Efficient Ring Signatures Without Random Oracles Hovav Shacham and Brent Waters.
Based on work with: Sergey Gorbunov and Vinod Vaikuntanathan Homomorphic Commitments & Signatures Daniel Wichs Northeastern University.
Almost Entirely Correct Mixing With Applications to Voting Philippe Golle Dan Boneh Stanford University.
CRYPTOGRAPHIC HARDNESS OTHER FUNCTIONALITIES Andrej Bogdanov Chinese University of Hong Kong MACS Foundations of Cryptography| January 2016.
1/28 Chosen-Ciphertext Security from Identity- Based Encryption Jonathan Katz U. Maryland Ran Canetti, Shai Halevi IBM.
1 Compact Group Signatures Without Random Oracles Xavier Boyen and Brent Waters.
Aggelos Kiayias, Nikos Leonardos, Helger Lipmaa, Kateryna Pavlyk, and Qiang Tang FIT 2016, February 6, 2016.
China Summer School on Lattices and Cryptography Craig Gentry and Shai Halevi June 3, 2014 Fully Homomorphic Encryption and Bootstrapping.
Keyword search on encrypted data. Keyword search problem  Linux utility: grep  Information retrieval Basic operation Advanced operations – relevance.
China Summer School on Lattices and Cryptography Craig Gentry and Shai Halevi June 3, 2014 Somewhat Homomorphic Encryption.
ICICS2002, Singapore 1 A Group Signature Scheme Committing the Group Toru Nakanishi, Masayuki Tao, and Yuji Sugiyama Dept. of Communication Network Engineering.
Fully Homomorphic Encryption (FHE) By: Matthew Eilertson.
Multi-Party Computation r n parties: P 1,…,P n  P i has input s i  Parties want to compute f(s 1,…,s n ) together  P i doesn’t want any information.
Bounded key-dependent message security
Topic 36: Zero-Knowledge Proofs
On the Size of Pairing-based Non-interactive Arguments
Laconic Oblivious Transfer and its Applications
Digital Signature Schemes and the Random Oracle Model
Verifiable Oblivious Storage
Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces
1. Use the quadratic formula to find all real zeros of the second-degree polynomial
Conditional Computational Entropy
Rishab Goyal Venkata Koppula Brent Waters
Zcash adds privacy to Bitcoin’s decentralization
CS 394B Introduction Marco Canini.
Leakage-resilient Signatures
Compact Adaptively Secure ABE for NC1 from k-Lin
Presentation transcript:

Polynomially Homomorphic Signatures Dan Boneh Stanford University Joint work with David Freeman

Recall: fully homomorphic encryption server PK, E pk [ x ] E pk [ f(x) ] For any function f [G’09, SV’10, vDGHV’10, …] Lots of excitement around this concept (FHE) E pk [x] E pk [ f(x) ]

Can we do the same for signatures? u 1, 91.0, σ 1 u 2, 73.0, σ 2 u k, 84.0, σ k signed grades untrusted server SK 87.3, σ f σ f = sig on ‹ “grades”, 91.0, u i › σ = sig on ‹ “grades”, 87.3, “f” › σ f authenticates x = f(x 1,…,x k ) and f “grades”, f:X k →X (e.g. mean) Can further compute on σ f : σ gf sig on ( t, g(f(m)), “g  f” )

more generally: Predicate Signatures [ABCHSW’10] Homomorphic signature for relation P ⊆ 2 M × M’ S can generate Alice’s sig on P-approved msgs. and nothing else Derived sigs should be “short”, “private”, and composable m 1, sign(sk,m 1 ) m k, sign(sk,m k ) SK (m, sig. on m) ⇔ P* ( (m 1, …, m k ), m ) S

Unifies three lines of research Quoting/Redaction [JMSW’02, …] : given (document, sig) anyone can derive a signature on substring or subset of document Linearly homomorphic (network coding) [KFM’04,…] : given signatures on vectors v 1, …, v k in F n anyone can derive a sig on linear combination Transitive signatures [MR’02,…] : given sigs on nodes and edges of graph G=(V,E) anyone can derive sig on (u,v) in V 2 if there is a path from u to v in G

Back to Homomorphic Sigs: Syntax setup( 1 n, k ): n=(sec. param), k=(max data size) → signing key sk, public key pk function family f: Y X ∈ F sign ( sk, m ) : output ( σ, random tag t ) eval ( pk, t, f, sig σ on m ) : sig σ’ on ( t, f(m), “f” ) verify ( pk, (t, m, “f”), σ ) : 1 or 0 to verify fresh sig use “id” function: f(x) = x

Desirable properties: data m with tag t 1.Certified computation (existential unforgeability): given (σ i, t i )Sign( sk, {m i,1... m i,k } ) for many i, can’t compute σ’ on (t i, x, “f”) for x ≠ f(m i,1 … m i,k ) 2.Private: Let σ’ be derived sig on (t, x, “f”) for x = f(m). given x and f, sig. σ’ reveals “no other info” about m 3.Short: the length of σ’ is at most ( log |m| ) × λ O(1) 4.Composable

Privacy: two definitions Weak context hiding [BBD…’10] (a la witness indistinguishability): derived sig. does not help adv. distinguish compatible data sets f(m 1 ) = f(m 2 )  derived sig on f(m 1 )  derived sig on f(m 2 ) Strong context hiding [MR’02, ABCHSW’10] (a la zero knowledge): derived sigs look like fresh sigs (given sk and original sigs)  m: ( sk, sign(sk, m ), sign(sk, f(m) )  ( sk, sign(sk, m ), eval( pk, , f, sig σ on m ) ) Key difference: original sigs remain hidden in weak context hiding (in both defs adv. can be given the secret key)

Applications Authenticated statistics: average, variance, … Data mining: signed decision trees (ID3), signed SVM, … Least squares log (axis of orbit) log (orbit period) earth mars jupiter venus saturn

Signed least squares (ex: y = ax+b) ⇒ Consider data set { (x i, y i ) } i=1,…k of integers. Then: a = f(x, y) / h(x, y) and b = g(x, y) / h(x, y) where f, g, h are cubic integer polynomials Using a cubic homomorphic scheme: signed x 1, …, x k, y 1, …, y k signed f(x,y), g(x,y), h(x,y)

Constructions

Homomorphic systems EncryptionSignatures Linear functions Large p : [P’99,…] Small p : [GM’82,…] [KFM’04,CJL’06,BFKW’09] [BF’10, BF’11] Polynomials quadratic: [BGN’05, GHV’10] small degree: [G’09] [BF’11] (small degree) Poly-size circuits [G’09, vDGHV’10, SV’10]????

Homomorphic systems EncryptionSignatures Linear functions Large p : [P’99,…] Small p : [GM’82,…] [KFM’04,CJL’06,BFKW’09] [BF’10, BF’11] Polynomials quadratic: [BGN’05, GHV’10] small degree: [G’09] [BF’11] (small degree) Poly-size circuits [G’09, vDGHV’10, SV’10]????

Homomorphic systems EncryptionSignatures Linear functions Large p : [P’99,…] Small p : [GM’82,…] [KFM’04,CJL’06,BFKW’09] [BF’10, BF’11] Polynomials quadratic: [BGN’05, GHV’10] small degree: [G’09] [BF’11] (small degree) Poly-size circuits [G’09, …]????

Linearly homomorphis sigs: options

B = b1b1 bmbm …

Cosets of a lattice

Lattice-based signatures [GPV’08]

A linear lattice signature system (the intersection method)

Homomorphic property

Unforgeabililty

Polynomially homomorphic sigs But no privacy !

Summary EncryptionSignatures Linear functions Large p : [P’99,…] Small p : [GM’82,…] [KFM’04,CJL’06,BFKW’09] [BF’10] Polynomials quadratic: [BGN’05, GHV’10] small degree: [G’09] [BF’11] (small degree) Poly-size circuits [G’09, …]????

Alternate approaches Computationally Sound (CS) Proofs [Micali’00] m, t sign( sk, (t, m) ) x=f(m), proof π m, t σ t, f: Y → X π: short proof of knowledge [V’07] that (t, f, x) ∈ { (t, f, x; m, σ) s.t. } Need PCP machinery. Harder to compose [V’07] Cannot build from falsifiable assumptions [GW’11] x = f(m), and verify(PK, (t,m), σ) = 1

Many open problems Fully homomorphic sigs (a la Gentry’s bootstrapping) Or more than low-degree polynomials Polynomially homomorphic sigs: with privacy without random oracles (can do for linear sigs)

THE END

Restricted Homomorphic Encryption Back in 2008: best homomorphic systems -- linear or quadratic operations Prabhakaran and Rosulek [PR’08] : Built systems that provably support only linear operations. More generally: can we build systems that support a restricted set of homomorphisms F ?

Applications [BSW’11] Network guards on encrypted traffic: With restricted FHE: guard can implement policy, but nothing else Goal: restricted FHE that keeps ciphertext size short Guard 1 Guard 2

A New Construction [BSW’11] Properties:no ciphertext expansion under constant iteration Tools: a recent short NIZK due to Groth [G’10] Fully Hom. Enc. func. family F Hom. Enc. for F