13. Oktober 2010 | Dr.Marc Fischlin | Kryptosicherheit | 1 Security-Preserving Operations on Big Data Algorithms for Big Data, Frankfurt, September, 2014.

Slides:



Advertisements
Similar presentations
Security Seminar, Fall 2003 On the (Im)possibility of Obfuscating Programs Boaz Barak, Oded Goldreich, Russel Impagliazzo, Steven Rudich, Amit Sahai, Salil.
Advertisements

Probabilistic Public Key Encryption with Equality Test Duncan S. Wong Department of Computer Science City University of Hong Kong Joint work with Guomin.
Dan Boneh Public key encryption from Diffie-Hellman ElGamal Variants With Better Security Online Cryptography Course Dan Boneh.
1 Adam O’Neill Leonid Reyzin Boston University A Unified Approach to Deterministic Encryption and a Connection to Computational Entropy Benjamin Fuller.
REDUCTION-RESILIENT CRYPTOGRAPHY: PRIMITIVES THAT RESIST REDUCTIONS FROM ALL STANDARD ASSUMPTIONS Daniel Wichs (Charles River Crypto Day ‘12)
CS555Topic 191 Cryptography CS 555 Topic 19: Formalization of Public Key Encrpytion.
Kurosawa, Takagi, ”Some RSA-based Encryption Schemes with Tight Security Reduction” Asiacrypt 2003, November 30 - December 4, Taipei, Taiwan Some RSA-based.
How to Use Indistinguishability Obfuscation
11 Provable Security. 22 Given a ciphertext, find the corresponding plaintext.
CIS 5371 Cryptography 3b. Pseudorandomness.
Encryption Public-Key, Identity-Based, Attribute-Based.
Dual System Encryption: Concept, History and Recent works Jongkil Kim.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
13. Oktober 2010 | Dr.Marc Fischlin | Kryptosicherheit | 1 Adaptive Proofs of Knowledge in the Random Oracle Model 21. PKC 2015 Marc Fischlin joint work.
Public-Key Encryption in the Bounded-Retrieval Model Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Segev, Shabsi Walfish, Daniel Wichs Earlier Today: Yevgeniy.
Outsourcing Private RAM Computation Daniel Wichs Northeastern University with: Craig Gentry, Shai Halevi, Mariana Raykova.
Rennes, 23/10/2014 Cristina Onete Putting it all together: using multiple primitives together.
Private Programs: Obfuscation, a survey Guy Rothblum Barak, Goldreich, Impagliazzo, Rudich, Sahai, Vadhan and Yang Lynn, Prabhakaran and Sahai Goldwasser.
On the (Im)Possibility of Key Dependent Encryption Iftach Haitner Microsoft Research TexPoint fonts used in EMF. Read the TexPoint manual before you delete.
The Physically Observable Security of Signature Schemes Alexander W. Dent Joint work with John Malone-Lee University of Bristol.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
The Bright Side of Hardness Relating Computational Complexity and Cryptography Oded Goldreich Weizmann Institute of Science.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 5 Jonathan Katz.
A Designer’s Guide to KEMs Alex Dent
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
CRYPTOGRAPHY WHAT IS IT GOOD FOR? Andrej Bogdanov Chinese University of Hong Kong CMSC 5719 | 6 Feb 2012.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Nir Bitansky Ran Canetti Henry Cohn Shafi Goldwasser Yael Tauman-Kalai
CS555Spring 2012/Topic 41 Cryptography CS 555 Topic 4: Computational Approach to Cryptography.
On the Implausibility of Differing-Inputs Obfuscation (and Extractable Witness Encryption) with Auxiliary Input Daniel Wichs (Northeastern U) with: Sanjam.
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
Foundations of Cryptography Lecture 8 Lecturer: Moni Naor.
Shai Halevi – IBM Research PKC 2014 Multilinear Maps and Obfuscation A Survey of Recent Results.
Software Protection and Code obfuscation Amitabh Saxena Department of Information & Communication Technology University of Trento,
1 CIS 5371 Cryptography 3. Private-Key Encryption and Pseudorandomness B ased on: Jonathan Katz and Yehuda Lindel Introduction to Modern Cryptography.
The Generic Transformation from Standard Signatures to Identity-Based Aggregate Signatures Bei Liang, Hongda Li, Jinyong Chang.
Ryan Henry I 538 /B 609 : Introduction to Cryptography.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
CS555Spring 2012/Topic 111 Cryptography CS 555 Topic 11: Encryption Modes and CCA Security.
Cryptography Lecture 2 Arpita Patra. Summary of Last Class  Introduction  Secure Communication in Symmetric Key setting >> SKE is the required primitive.
Integrity via Encryption with Redundancy  Question: Encryption is not ideal for authentication. But, can we gain security advantages if we add recognizable.
Making Secure Computation Practical IBM: Craig Gentry, Shai Halevi, Charanjit Jutla, Hugo Krawczyk, Tal Rabin, NYU: Victor Shoup SRI: Mariana Raykova Stanford:
On the Communication Complexity of SFE with Long Output Daniel Wichs (Northeastern) joint work with Pavel Hubáček.
1 Secure Multi-party Computation Minimizing Online Rounds Seung Geol Choi Columbia University Joint work with Ariel Elbaz(Columbia University) Tal Malkin(Columbia.
1 Information Security – Theory vs. Reality , Winter Lecture 10: Garbled circuits and obfuscation Eran Tromer Slides credit: Boaz.
Lecture 2: Introduction to Cryptography
Non-Interactive Verifiable Computing August 5, 2009 Bryan Parno Carnegie Mellon University Rosario Gennaro, Craig Gentry IBM Research.
Witness Encryption and Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption Craig Gentry IBM Allison Lewko Columbia Amit.
Introduction to Obfuscation Mohammad Mahmoody University of Virginia *some slides borrowed from abhi shelat.
CS555Spring 2012/Topic 71 Cryptography CS 555 Topic 7: Stream Ciphers and CPA Security.
Secure Computation (Lecture 9-10) Arpita Patra. Recap >> MPC with honest majority in i.t. settings > Protocol using (n,t)-sharing, proof of security---
Boaz Barak, Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth, Amit Sahai.
Dan Boneh Stream ciphers PRG Security Defs Online Cryptography Course Dan Boneh.
Ilya Mironov, Omkant Pandey, Omer Reingold, Gil Segev Microsoft Research.
Obfuscation from Multi-linear Maps: Vulnerabilities and Protections
Lower Bounds on Assumptions behind Indistinguishability Obfuscation
Designing Proofs of Human Work for Cryptocurrency and Beyond
Modern symmetric-key Encryption
Course summary COS 433: Crptography -Spring 2010 Boaz Barak.
Semantic Security and Indistinguishability in the Quantum World
Risky Traitor Tracing and New Differential Privacy Negative Results
Applications of Blockchains - III
Cryptography for Quantum Computers
Rishab Goyal Venkata Koppula Brent Waters
Investigating Provably Secure and Practical Software Protection
The power of Pairings towards standard model security
Identity Based Encryption from the Diffie-Hellman Assumption
Presentation transcript:

13. Oktober 2010 | Dr.Marc Fischlin | Kryptosicherheit | 1 Security-Preserving Operations on Big Data Algorithms for Big Data, Frankfurt, September, 2014 Marc Fischlin Alexander May Arno Mittelbach

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 2 Big Data

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 3 Big Data Drawings by Giorgia Azzurra Marson

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 4 Big Data

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 5 What about security?

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 6 Big Data

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 7 What about operations?

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 8 Security-Preserving Operations on Big Data In a Nutshell Secure Outsourcing of Data and Functionality Privacy Integrity & Authenticity

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 9 The overall plan General Solution General Solution Specialized, Efficient Solutions Specialized, Efficient Solutions fully homomorphic encryption, code obfuscation,… Deterministic Encryption, Specialized Signature Schemes,… Specialized, Efficient Solutions Specialized, Efficient Solutions

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 10 The Map Reduce Framework  Programming model to process large datasets in parallel ERGEBNIS Data Interim Sorting Reduce-PhaseMap-Phase (key, value) (key, List(value))

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 11 Map Reduce Framework: Goals  Security (privacy and authenticity)  e.g. via deterministic encryption  How to work with low entropy in data packets  How to handle integrity and authenticity  Homomorphic Signatures, Aggregate Signatures Develop specialized crypto primitives for typical Map/Reduce cases.

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 12 The Map Reduce Framework  Programming Model to process large datasets in parallel ERGEBNIS Data Interim Storage Reduce-PhaseMap-Phase (key, value) (key, List(value))

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 13 IND-CPA Public-Key Encryption Encryption sk,b sk,b pk m 0,m 1 cbcb b Encryption process must be randomized. Given c 0, c 1, are they encryptions of the same message m?

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 14 The Map Reduce Framework  Programming Model to process large datasets in parallel ERGEBNIS Data Interim Storage Reduce-PhaseMap-Phase (key, value) (key, List(value))

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 15 Deterministic Public-Key Encryption Randomized PKE m m E E E E E E E E pk c 1 c 2 c 3 c 4 Deterministic PKE m m E E E E E E E E pk c c How to define security?

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 16 DPKE is cannot be IND-CPA secure Deterministic PKE m m E E E E E E E E pk c c Encryption sk,b sk,b pk m 0,m 1 cbcb b Solution: If messages contain entropy, then encryptions are indistinguishable

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 17 DPKE security Deterministic PKE m m E E E E E E E E pk c c Encryption sk,b sk,b pk m0,m1m0,m1 cbcb b Vectors of same length Each value has min-entropy No communication Challenge: Current schemes require that every plaintext has high min-entropy conditioned on all previous.

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 18 The Map Reduce Framework  Programming Model to process large datasets in parallel ERGEBNIS Data Interim Storage Reduce-PhaseMap-Phase (key, value) (key, List(value))

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 19 The overall plan General Solution General Solution Specialized, Efficient Solutions Specialized, Efficient Solutions fully homomorphic encryption, code obfuscation,… Deterministic Encryption, Specialized Signature Schemes,… General Solution General Solution

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 20 Code Obfuscation: The Software Engineering View Obfuscation is a heuristic that makes reverse engineering hard.

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 21 Provable Security Thm: If assumption X holds then construction O is secure. The Obfuscation Scheme A well understood problem is difficult: e.g. Factoring No adversary can win a well specified game.

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 22 ? ? VBB – Obfuscation (Virtual Black-Box) For every there exists a Indistinguishable output An adversary can only do so much as one that only has oracle access.

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 23 VBB – Obfuscation: security proof For every there exists a Indistinguishable output Proof existence: e.g. give construction Proof that existence contradicts assumption Obfuscator O ? ?

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 24 What if VBB-Obfuscation exists? Secure communication kk EncryptDecrypt k m c m Secret keys

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 25 What if VBB-Obfuscation exists? Secure communication EncryptDecrypt k m c m k k pk

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 26 What about big data?

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 27 Obfuscation for Big Data Secure Outsourcing of Data and Functionality

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 28 m <- Decrypt(k,c) Perform operation on m Output result m <- Decrypt(k,c) Perform operation on m Output result Ciphertext c result

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 29 ? ? VBB – Obfuscation (Virtual Black-Box) For every there exists a Indistinguishable output An adversary can only do so much as one that only has oracle access. Solves all (or at least many of) our problems VBB Obfuscation does not exist [BGIRSVY01]

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 30 VBB Obfuscation does not exist [BGIRSVY01] All Functions [BGIRSVY01]

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 31 VBB Obfuscation does not exist [BGIRSVY01] All Functions [BGIRSVY01]

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 32 VBB Obfuscation does not exist [BGIRSVY01] All Functions [BGIRSVY01]

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 33 [Garg, Gentry, Halevi, Raykova, Sahai, Waters 2013] Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits Indistinguishability Obfuscation exists for all functions.

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 34 Indistinguishability Obfuscation (iO) For any two programs that implement the same function, their obfuscations look identical. ? ? ? ?

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 35 So what?

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 36 Indistinguishability Obfuscator Best Obfuscator for P 2 Ind. Obfuscation (iO) is best possible Obfuscation P1P1 P2P2 P 1 or P 2 ?

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 37 iO for Big Data  iO is somewhat weird but incredibly useful!  How to use iO?  What can we do with iO?

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 38 How to use Ind. Obfuscation (iO) A pseudorandom generator PRG: {0,1} n -> {0,1} 2n is a function such that no efficient adversary can distinguish PRG(s) for a random s in {0,1} n from a random t in {0,1} 2n Sample t in {0,1} 2n Sample s in {0,1} n t PRG(s) ? ?

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 39 How to use Ind. Obfuscation (iO) A pseudorandom generator PRG: {0,1} n -> {0,1} 2n is a function such that no efficient adversary can distinguish PRG(s) for a random s in {0,1} n from a random t in {0,1} 2n return “Hello World!“ x P1P1 if PRG(x) = t return “Hello World!“ return “Hello World!“ x P 2 [t] Sample s in {0,1} n t <- PRG(s) ? ?

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 40 How to use Ind. Obfuscation (iO) return “Hello World!“ x P1P1 if PRG(x) = t return “Hello World!“ return “Hello World!“ x P 2 [t] Sample s in {0,1} n t <- PRG(s) if PRG(x) = t return “Hello World!“ return “Hello World!“ x P 3 [t] Sample t in {0,1} 2n if PRG(x) = t return “secret msg“ return “Hello World!“ x P 4 [t] Sample t in {0,1} 2n if PRG(x) = t return “secret msg“ return “Hello World!“ P 5 [t] Sample s in {0,1} n t <- PRG(s) ? ?

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 41 Indistinguishability Obfuscation preliminary results Positive Results Functional Encryption [GGHRSW13] Multi-party Key-Exchange [BZ13] Two round secure MPC [GGHR13] Universal Hardcore Functions [BM14a] Correlation Secure Hash Functions [BM14a] Leakage Resilient PKE [BM14b] Deterministic Public-Key Encryption [BM14c] Negative Results No UCE1 and UCE2 [BFM14a] No Multi-bit Output Point Function Obfuscation with AI [BM14b] No Random Oracle Transformations [BFM14b] [BFM14a]: CRYPTO 2014 [BM14a]: ASIACRYPT 2014 [BM14b]: ASIACRYPT 2014 [BM14c]: in submission [BFM14c]: in submission shortly

Arno Mittelbach| September 2014 | Security-Preserving Operations on Big Data| 42 References Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil P. Vadhan, Ke Yang: On the (Im)possibility of Obfuscating Programs. CRYPTO 2001: 1-18 Dan Boneh and Mark Zhandry. Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. In Juan A. Garay and Rosario Gennaro, editors, CRYPTO 2014, Part I, volume 8616 of LNCS, pages 480–499. Springer, August Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, and Brent Waters. Candidate indistinguishability obfuscation and functional encryption for all circuits. In 54th FOCS, pages 40–49. IEEE Computer Society Press, October Sanjam Garg, Craig Gentry, Shai Halevi, and Mariana Raykova. Two-round secure MPC from indistinguishability obfuscation. In Yehuda Lindell, editor, TCC 2014, volume 8349 of LNCS, pages 74–94. Springer, February Christina Brzuska, Pooya Farshim, and Arno Mittelbach. Indistinguishability obfuscation and UCEs: The case of computationally unpredictable sources. In Juan A. Garay and Rosario Gennaro, editors, CRYPTO 2014, Part I, volume 8616 of LNCS, pages 188–205. Springer, August Christina Brzuska and Arno Mittelbach. Indistinguishability obfuscation versus multibit point obfuscation with auxiliary input. In Palash Sarkar and Tetsu Iwata, editors, ASIACRYPT 2014, LNCS, pages ??–??, Kaohsiung, Taiwan, December 7–11, Springer, Berlin, Germany Christina Brzuska and Arno Mittelbach. Using indistinguishability obfuscation via uces. In Palash Sarkar and Tetsu Iwata, editors, ASIACRYPT 2014, LNCS, pages ??–??, Kaohsiung, Taiwan, December 7–11, Springer, Berlin, Germany. Christina Brzuska and Arno Mittelbach. Deterministic Public-Key Encryption from Indistinguishability Obfuscation and Point Obfuscation. Preprint Christina Brzuska, Pooya Farshim, and Arno Mittelbach. Random Oracle Uninstantiability from Indistinguishability Obfuscation. Preprint