Algebraic Lower Bounds for Computing on Encrypted Data Rafail Ostrovsky William E. Skeith III.

Slides:



Advertisements
Similar presentations
Quantum Versus Classical Proofs and Advice Scott Aaronson Waterloo MIT Greg Kuperberg UC Davis | x {0,1} n ?
Advertisements

Impagliazzos Worlds in Arithmetic Complexity: A Progress Report Scott Aaronson and Andrew Drucker MIT 100% QUANTUM-FREE TALK (FROM COWS NOT TREATED WITH.
On the degree of symmetric functions on the Boolean cube Joint work with Amir Shpilka.
Introduction The concept of transform appears often in the literature of image processing and data compression. Indeed a suitable discrete representation.
CSE 636 Data Integration Conjunctive Queries Containment Mappings / Canonical Databases Slides by Jeffrey D. Ullman.
Price Of Anarchy: Routing
An Ω(n 1/3 ) Lower Bound for Bilinear Group Based Private Information Retrieval Alexander Razborov Sergey Yekhanin.
Information and Coding Theory
Uniqueness of Optimal Mod 3 Circuits for Parity Frederic Green Amitabha Roy Frederic Green Amitabha Roy Clark University Akamai Clark University Akamai.
CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation.
Gillat Kol joint work with Ran Raz Competing Provers Protocols for Circuit Evaluation.
Algebraic Structures: Group Theory II
The number of edge-disjoint transitive triples in a tournament.
1 Introduction to Computability Theory Lecture12: Reductions Prof. Amos Israeli.
Hardness Results for Problems P: Class of “easy to solve” problems Absolute hardness results Relative hardness results –Reduction technique.
1 Undecidability Andreas Klappenecker [based on slides by Prof. Welch]
1. 2 Gap-QS[O(n), ,2|  | -1 ] 3SAT QS Error correcting codesSolvability PCP Proof Map In previous lectures: Introducing new variables Clauses to polynomials.
Deciding Primality is in P M. Agrawal, N. Kayal, N. Saxena Slides by Adi Akavia.
INTEGRALS The Fundamental Theorem of Calculus INTEGRALS In this section, we will learn about: The Fundamental Theorem of Calculus and its significance.
1 Digital Logic
Avraham Ben-Aroya (Tel Aviv University) Oded Regev (Tel Aviv University) Ronald de Wolf (CWI, Amsterdam) A Hypercontractive Inequality for Matrix-Valued.
Oded Regev Tel-Aviv University On Lattices, Learning with Errors, Learning with Errors, Random Linear Codes, Random Linear Codes, and Cryptography and.
Hidden pairings and trapdoor DDH groups Alexander W. Dent Joint work with Steven D. Galbraith.
Private Information Retrieval. What is Private Information retrieval (PIR) ? Reduction from Private Information Retrieval (PIR) to Smooth Codes Constructions.
Session 6: Introduction to cryptanalysis part 1. Contents Problem definition Symmetric systems cryptanalysis Particularities of block ciphers cryptanalysis.
Public Key Encryption that Allows PIR Queries Dan Boneh 、 Eyal Kushilevitz 、 Rafail Ostrovsky and William E. Skeith Crypto 2007.
Propositional Calculus Math Foundations of Computer Science.
1 10. Joint Moments and Joint Characteristic Functions Following section 6, in this section we shall introduce various parameters to compactly represent.
Foundations of Cryptography Lecture 2 Lecturer: Moni Naor.
Iddo Tzameret Tel Aviv University The Strength of Multilinear Proofs (Joint work with Ran Raz)
Polynomials Algebra Polynomial ideals
The Polynomial Time Algorithm for Testing Primality George T. Gilbert.
1 CSI5388: Functional Elements of Statistics for Machine Learning Part I.
A Linear Lower Bound on the Communication Complexity of Single-Server PIR Weizmann Institute of Science Israel Iftach HaitnerJonathan HochGil Segev.
Private Keyword Search on Streaming Data Rafail Ostrovsky William Skeith UCLA (patent pending)
Disclosure risk when responding to queries with deterministic guarantees Krish Muralidhar University of Kentucky Rathindra Sarathy Oklahoma State University.
The Integers. The Division Algorithms A high-school question: Compute 58/17. We can write 58 as 58 = 3 (17) + 7 This forms illustrates the answer: “3.
Slide 1 Propositional Definite Clause Logic: Syntax, Semantics and Bottom-up Proofs Jim Little UBC CS 322 – CSP October 20, 2014.
Week 10Complexity of Algorithms1 Hard Computational Problems Some computational problems are hard Despite a numerous attempts we do not know any efficient.
Private Approximation of Search Problems Amos Beimel Paz Carmi Kobbi Nissim Enav Weinreb (Technion)
Data Security and Encryption (CSE348) 1. Lecture # 12 2.
Today’s Goal: Proof of Extension Theorem If a partial solution fails to extend, then Corollary. If is constant for some i, then all partial solutions extend.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Expectation for multivariate distributions. Definition Let X 1, X 2, …, X n denote n jointly distributed random variable with joint density function f(x.
1 Building The Ultimate Consistent Reader. 2 Introduction We’ve already built a consistent reader (cube-Vs.-point)... Except it had variables ranging.
Propositional Calculus CS 270: Mathematical Foundations of Computer Science Jeremy Johnson.
Copyright © Zeph Grunschlag, Induction Zeph Grunschlag.
THE LAPLACE TRANSFORM LEARNING GOALS Definition
Information and Coding Theory Cyclic codes Juris Viksna, 2015.
Block Ciphers and the Advanced Encryption Standard
Algebra Problems… Solutions Algebra Problems… Solutions © 2007 Herbert I. Gross Set 17 part 2 By Herbert I. Gross and Richard A. Medeiros next.
CS 203: Introduction to Formal Languages and Automata
Great Theoretical Ideas In Computer Science Anupam GuptaCS Fall 2006 Lecture 15Oct 17, 2006Carnegie Mellon University Algebraic Structures: Groups,
On the Notion of Pseudo-Free Groups Ronald L. Rivest MIT Computer Science and Artificial Intelligence Laboratory TCC 2/21/2004.
Copyright © Zeph Grunschlag, Induction Zeph Grunschlag.
Approximation Algorithms based on linear programming.
Multi-Party Computation r n parties: P 1,…,P n  P i has input s i  Parties want to compute f(s 1,…,s n ) together  P i doesn’t want any information.
1 IAS, Princeton ASCR, Prague. The Problem How to solve it by hand ? Use the polynomial-ring axioms ! associativity, commutativity, distributivity, 0/1-elements.
Information and Coding Theory
Algebraic Proofs over Noncommutative Formulas
DIFFERENTIATION RULES
Quick reviews / corrections
Matrix PI-algebras and Lower Bounds on Arithmetic Proofs (work in progress) Iddo Tzameret Joint work with Fu Li Tsinghua University.
Topic 25: Discrete LOG, DDH + Attacks on Plain RSA
RS – Reed Solomon List Decoding.
The Curve Merger (Dvir & Widgerson, 2008)
PCP Characterization of NP:
Switching Lemmas and Proof Complexity
Cryptography Lecture 18.
Practical (F)HE Part III – Bootstrapping
Presentation transcript:

Algebraic Lower Bounds for Computing on Encrypted Data Rafail Ostrovsky William E. Skeith III

Non-Interactive Crypto-Computing XY E(X) = E(f(X,Y)) A wants to distribute computation of f to B f,g g(E(X),Y) AB

Homomorphic Encryption and CC Homomorphic encryption is a very natural starting point, and the primary tool for many CC protocols: Let f be a function, and A some algebraic structure. –If f can be computed by the algebra of A and A is preserved via homomorphic encryption, –Then we have non-interactive CC of f

Algebraic Non-Interactive CC For a given algebraic structure, what can be accomplished with algebraic computation? Main question: which crypto-computing functions can we implement using known homomorphic cryptosystems?

Examples We’ll Study In an algebraic setting, we address the following: –Private Database Modification –Homomorphic PIR Protocols –Private Keyword Search

Algebraic Private Database Modification [BKOS] M i =(g 1,…,g m ) g 1, g 2,…, g m X’ = F(x 1,…,x n,g 1,…g m,h 1,…h r ) X1X1 X2X2 X3X3 …… ………….. …………… …………… …………XnXn All g j, x i, h k 2 A, and F is some “algebraic” function X = U DB

Homomorphic PIR Protocols [BGN,KO] Q i =(g 1,…,g m ) g 1, g 2,…, g m F X (g 1,…g m,h 1,…h r ) X1X1 X2X2 X3X3 …… ………….. …………… …………… …………XnXn All g j, h k 2 A, and F X is some “algebraic” function determined by the database X 2 A n X = (x j 1,…,x i l )=F X (g 1,…g m,h 1,…h r ) UDB

Manuscript (2002) of Sander, et al. Result uses techniques of Ben-Or. Cryptosystem from manuscript was broken… however, an interesting question is asked: “ “

Two Results A positive result: –Homomorphic encryption over any simple non-abelian group is equivalent to fully homomorphic encryption (preserving a ring). –Homomorphic encryption over any simple non-abelian group is equivalent to non-interactive CC. A family of negative results (i.e., lower bounds): –Using the algebras preserved by existing cryptosystems, we can show lower bounds for homomorphic PIR, database modification, characteristic vectors…

Our First Result: For any non-abelian simple group, the following holds: Any circuit with N gates can be replaced by a circuit of size O(N) that uses only the group operation to simulate gates (wires will carry group elements). Example: for A 5, we can represent a NAND gate ¼ 50 group operations (this may not be minimal…).

More Formally:

Our Second Result: Overview We’ll make an abstract algebraic observation From the observation, we’ll derive:  (n) bounds (over an abelian group) –algebraic private database modification –homomorphic PIR Bounds on conjunctive queries in the keyword search of [OS,BSW] First, a few definitions...

Characteristic Vectors over a Group Let G be a group. We’ll call v 2 G n a characteristic vector if v is non-identity in precisely one position: v=(id G,id G,...,x  id G,id G,…,id G ) Let V={v i } i 2 [n] be a complete set of such vectors.

Question What is the inherent communication involved in “algebraic” functions that generate characteristic vectors? We’ll reduce all of our algebraic crypto- computing protocols to this basic functionality.

Idea: Generating Char. Vectors 9 F:G m ! G n, an “algebraic” function s.t. For each i 2 [n], 9 w i = (g 1,…,g m ) with F(w i ) = v i

An Algebraic Observation Let A and G be abelian groups. Let F:A ! G n be an “affine” group map, i.e., F=f+c, where f 2 Hom Z (A,G n ) and c 2 G n. Then if V ½ F(A), we have log(|A|) 2  (n)

Difficulties Can’t we use linear algebra to immediately prove the theorem? The most naturally occurring instance (in cryptography) is the case of A=G m If G were a field, this would be an easy linear- algebra dimension argument, but this is not generally the case (G is only assumed to be an abelian group). Even with G cyclic, we could successfully implement even with m=1. (I.e., we can specify characteristic vectors by communicating only a single group element.)

Example: m=1

Other Non-productive Ideas: Affine to Linear Recall that F=f+c is “affine”, and let m denote the number of group elements communicated. One might think that the problem could be rephrased as linear by just incrementing m to account for c 2 G n. However, to model the affine map, you in general need to increase m by a non-constant amount (consider non-cyclic G). Certainly, it doesn’t seem to be the “right” approach.

The “Right” Approach: Stay abstract. –Dimension is irrelevant –Will give a stronger result. –Takes care of typical cases nicely, but will actually be quite a bit more general (rules out End(G), etc…)

Lemma

Proof of Lemma

Proof of Theorem (Idea) Idea: show that h V i is a Z |A| -module, and apply the Lemma. Recall that in an abelian group –ord(a+b)|lcm(ord(a),ord(b)) And in any group, –ord((a,b)) = lcm(ord(a),ord(b)) –ord(f(a))|ord(a)

Proof of Theorem (1 of 2) Let F=f+c be affine, from A ! G n, define V as before, and let c=(c 1,…,c n ). Define V’={v i -c} i 2 [n]. (Note: V’ ½ f(A)) All elements of V’ have order | |A| ) all c i and therefore c have order | |A|. Since A,G abelian, we have that all of V has elts of order | |A|.

Proof of Theorem (2 of 2) Since all elements of h V i, h V’ i have order dividing |A|, they are in fact Z |A| - modules. Set R=Z |A| and M= h V [ V’ i and apply the lemma to yield: 2 n · | h V’ i ||A| · |A| 2, and hence log(|A|) 2  (n)

Consequences Over an abelian group, –Algebraic private modification of an encrypted database   (n) –Homomorphic PIR protocols   (n) –Impossibility of conjunctive queries in the keyword search of [OS,BSW] Using poly’s of total degree t, bounds become  (n 1/t )

Algebraic Private Database Modification [BKOS] M i =(g 1,…,g m ) g 1, g 2,…, g m X’ = F(x 1,…,x n,g 1,…g m,h 1,…h r ) X1X1 X2X2 X3X3 …… ………….. …………… …………… …………XnXn All g j, x i, h k 2 A, and F is some “algebraic” function X = U DB

Algebraic Database Modification Implies Characteristic Vectors Let X be a database consisting of id G in all locations. Apply F(X,M i,H)  X’ X’ = v i will be a characteristic vector.

Homomorphic PIR Protocols [BGN,KO] Q i =(g 1,…,g m ) g 1, g 2,…, g m F X (g 1,…g m,h 1,…h r ) X1X1 X2X2 X3X3 …… ………….. …………… …………… …………XnXn All g j, h k 2 A, and F X is some “algebraic” function determined by the database X 2 A n X = (x j 1,…,x i l )=F X (g 1,…g m,h 1,…h r ) UDB

Homomorphic PIR Implies Characteristic Vectors For a moment, suppose the protocol returns an encryption of a single element. Let V={v i } i=1 n be a complete set of characteristic vectors over G n. Define databases X i = v i for i 2 [n]. If Q i queries position i, then (F X 1 (Q i,H),…, F X n (Q i,H)) will be non-identity exactly in position i.

Non-singleton Query Returns It may be the case that a PIR query returns many database values, as long as the right value is at a predictable location in the result (e.g. [KO]). More generally, we can prove the following algebraic claim:

Claim Let V={v i } i=1 n be a complete collection of characteristic type vectors, except… Then if V ½ F(A), we have that: log(|A|) 2  (n/w(n)) v i can be non-identity in up to w(n) locations for any positive function w.

General Case: Homomorphic PIR Implies Characteristic Vectors Suppose that the query returns k values. Define f i (g 1,...g m )=  j=1 k (F X i (g 1,…,h r )) j (f 1 (g 1,…,g m ),…f n (g 1,…,g m )) will be non- identity in at most k positions ) user communication is  (n/k(n)) Server communication is clearly at least k(n), so we are done.

Other Types of Cryptosystems Recently there has been a lot of attention on bilinear maps in cryptography. The work of [BGN] demonstrates a cryptosystem that allows polynomials of total degree 2 to be evaluated on ciphertext.

Polynomials of Bounded Total Degree We can prove an extension of our original algebraic result, which will give similar bounds on the utility of total degree t polynomials. (even for t>2)

Corollary

Proof Idea The number of monomials in an m- variable polynomial of total degree t is O(m t ). Simulate such a polynomial with a total degree 1 polynomial in O(m t ) variables. Apply initial theorem to the abelian group (R,+).

More General Results If given the ability of computation of polynomials of total degree t, we obtain similar bounds, only n  n 1/t In particular, this corollary gives  (n 1/2 ) bounds when applied to algebraic protocols based on the cryptosystem of [BGN] (this matches the upper bound for database modification seen in [BKOS]).

Generality of Results The algebraic assumptions may seem quite rigid, but are often appropriate in crypto-computing settings. From an algebraic point of view however, they are very general: –Incorporates all algebraic formulas, but also many other types of maps (formulas with End(G), changing representations, etc…). –Covers most all algebraic structures preserved by known cryptosystems

Perspective Help researchers determine the feasibility of various new protocols. Especially useful when such protocols are needed as a subroutine in a larger crypto-computing function. –Protocol may need output with algebraic value to continue the computation Simple Non-abelian group-homomorphic encryption: –Seems pretty hard. –Equivalent to fully-homomorphic encryption (/ring).

Thank You