Secure Computation (Lecture 9-10) Arpita Patra. Recap >> MPC with honest majority in i.t. settings > Protocol using (n,t)-sharing, proof of security---

Slides:



Advertisements
Similar presentations
Efficient Private Approximation Protocols Piotr Indyk David Woodruff Work in progress.
Advertisements

Efficiency vs. Assumptions in Secure Computation Yuval Ishai Technion & UCLA.
Probabilistic Public Key Encryption with Equality Test Duncan S. Wong Department of Computer Science City University of Hong Kong Joint work with Guomin.
Secure Evaluation of Multivariate Polynomials
Vote privacy: models and cryptographic underpinnings Bogdan Warinschi University of Bristol 1.
Semi-Honest to Malicious Oblivious-Transfer The Black-box Way Iftach Haitner Weizmann Institute of Science.
CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation.
11 Provable Security. 22 Given a ciphertext, find the corresponding plaintext.
Cryptography Lecture 9 Arpita Patra.
Computational Security. Overview Goal: Obtain computational security against an active adversary. Hope: under a reasonable cryptographic assumption, obtain.
Foundations of Cryptography Lecture 13 Lecturer: Moni Naor.
Introduction to Modern Cryptography, Lecture 12 Secure Multi-Party Computation.
General Cryptographic Protocols (aka secure multi-party computation) Oded Goldreich Weizmann Institute of Science.
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
Slide 1 Vitaly Shmatikov CS 380S Oblivious Transfer and Secure Multi-Party Computation With Malicious Parties.
Multi-Client Non-Interactive Verifiable Computation Seung Geol Choi (Columbia U.) Jonathan Katz (U. Maryland) Ranjit Kumaresan (Technion) Carlos Cid (Royal.
How to play ANY mental game
Cryptography Lecture 8 Stefan Dziembowski
CS573 Data Privacy and Security
Public-Key Encryption with Lazy Parties Kenji Yasunaga Institute of Systems, Information Technologies and Nanotechnologies (ISIT), Japan Presented at SCN.
Cryptography Lecture 10 Arpita Patra. Quick Recall and Today’s Roadmap >> CPA & CPA-mult security >> Equivalence of CPA and CPA-mult security >> El Gamal.
Secure Computation (Lecture 7-8) Arpita Patra. Recap >> (n,t)-Secret Sharing (Sharing/Reconstruction) > Shamir Sharing > Lagrange’s Interpolation for.
Improved Non-Committing Encryption with Application to Adaptively Secure Protocols joint work with Dana Dachman-Soled (Columbia Univ.), Tal Malkin (Columbia.
Secure Computation (Lecture 3 & 4) Arpita Patra. Recap >> Why secure computation? >> What is secure (multi-party) computation (MPC)? >> Secret Sharing.
Secure Computation (Lecture 5) Arpita Patra. Recap >> Scope of MPC > models of computation > network models > modelling distrust (centralized/decentralized.
Secure Computation Lecture Arpita Patra. Recap >> MPC with dishonest majority over Boolean circuit- [GMW87] > Oblivious Transfer (from CPA secure.
Cryptography Lecture 2 Arpita Patra. Summary of Last Class  Introduction  Secure Communication in Symmetric Key setting >> SKE is the required primitive.
On the Communication Complexity of SFE with Long Output Daniel Wichs (Northeastern) joint work with Pavel Hubáček.
1 Secure Multi-party Computation Minimizing Online Rounds Seung Geol Choi Columbia University Joint work with Ariel Elbaz(Columbia University) Tal Malkin(Columbia.
Secure Computation (Lecture 2) Arpita Patra. Vishwaroop of MPC.
Secure Computation Lecture Arpita Patra. Recap >> Improving the complexity of GMW > Step I: Offline: O(n 2 c AND ) OTs; Online: i.t., no crypto.
Secure Computation Lecture Arpita Patra. Recap > Shamir Secret-sharing > BGW Protocol based on secret-sharing > Offline/Online phase > Creating.
Cryptography Lecture 4 Arpita Patra.
CS555Spring 2012/Topic 71 Cryptography CS 555 Topic 7: Stream Ciphers and CPA Security.
Andrew Lindell Aladdin Knowledge Systems and Bar-Ilan University 04/08/08 CRYP-106 Efficient Fully-Simulatable Oblivious Transfer.
Cryptography Lecture 11 Arpita Patra. Generic Results in PK World  CPA-secure KEM  SKE COA-secure SKE  Hyb CPA-secure CPA SecurityCCA Security Bit.
Cryptography Lecture 4 Arpita Patra. Recall o Various Definitions and their equivalence (Shannon’s Theorem) o Inherent Drawbacks o Cannot afford perfect.
Cryptography Lecture 6 Arpita Patra © Arpita Patra.
Randomness Leakage in the KEM/DEM Framework Hitoshi Namiki (Ricoh) Keisuke Tanaka (Tokyo Inst. of Tech.) Kenji Yasunaga (Tokyo Inst. of Tech.  ISIT) ProvSec.
Secure Computation Lecture Arpita Patra. Recap >Three orthogonal problems- (n,t)-sharing, reconstruction, multiplication protocol > Verifiable Secret.
Ryan Henry I 538 /B 609 : Introduction to Cryptography.
Cryptography Lecture 8 Arpita Patra © Arpita Patra.
Cryptography Lecture 9 Arpita Patra © Arpita Patra.
Cryptography Lecture 10 Arpita Patra © Arpita Patra.
Cryptography Lecture 3 Arpita Patra © Arpita Patra.
Cryptographic methods. Outline  Preliminary Assumptions Public-key encryption  Oblivious Transfer (OT)  Random share based methods  Homomorphic Encryption.
Cryptography Lecture 6 Arpita Patra. Quick Recall and Today’s Roadmap >> MAC for fixed-length messages >> Domain Extension for MAC >> Authenticated Encryption:
Multi-Party Computation r n parties: P 1,…,P n  P i has input s i  Parties want to compute f(s 1,…,s n ) together  P i doesn’t want any information.
Topic 36: Zero-Knowledge Proofs
Carmit Hazay (Bar-Ilan University, Israel)
Cryptography Lecture 5 Arpita Patra © Arpita Patra.
Foundations of Secure Computation
Foundations of Secure Computation
Modern symmetric-key Encryption
Secrecy of (fixed-length) stream ciphers
Oblivious Transfer and GMW MPC
Topic 30: El-Gamal Encryption
Cryptography Lecture 6.
Topic 7: Pseudorandom Functions and CPA-Security
Cryptography Lecture 25.
Cryptography Lecture 12 Arpita Patra © Arpita Patra.
Cryptography Lecture 5 Arpita Patra © Arpita Patra.
Cryptography Lecture 12 Arpita Patra © Arpita Patra.
Cryptography Lecture 5 Arpita Patra © Arpita Patra.
Cryptography Lecture 21.
Cryptography Lecture 23.
Cryptography Lecture 8 Arpita Patra © Arpita Patra.
A Light-weight Oblivious Transfer Protocol Based on Channel Noise
Presentation transcript:

Secure Computation (Lecture 9-10) Arpita Patra

Recap >> MPC with honest majority in i.t. settings > Protocol using (n,t)-sharing, proof of security--- Feasibility Result > Efficiency: Offline-online paradigm, Reduction of online phase to secret using raw material Various Raw materials Randomness extraction techniques Linear Overhead MPC >> Comp. MPC with n>= 2t+1 is useful (CDN)

Impossibility of i.t MPC with n<=2t >> Do you first see that the protocols that we discussed so far will not work? >> Generating triple sharing >> Multiplication gate >> Functions consisting of linear gates: no problem >> (n,(2t,t))-sharing >> Impossibility of i.t. for any function

Impossibility of i.t MPC with n=2 for multiplication of bits P0P0 P1P1 b0b0 b1b1 m0m0 m1m1 m2m2 m3m3 m 2i m 2i T (b 0, b 1 ) Random variable over the random choice of the parties b 0  b 1 r0r0 r1r1

Impossibility of i.t MPC with n=2 for multiplication of bits P0P0 P1P1 b0b0 b1b1 m0m0 m1m1 m2m2 m3m3 m 2i m 2i T (b 0, b 1 ) If b 0 = 0, then T (b 0, b 1 ) should leak nothing about b 1. Otherwise corrupted P 0 can learn b 1 Breach in perfect secrecy We show P 0 can learn b 1 even when b 0 =0 and thus breach in perfect secrecy

Impossibility of i.t MPC with n=2 for multiplication of bits P0P0 P1P1 b0b0 b1b1 m0m0 m1m1 m2m2 m3m3 m 2i m 2i T (b 0, b 1 ) If b 1 = 0, then T (b 0, b 1 ) should leak nothing about b 0. b 0 = 0, r 0 b 0 = 1, r 1

Impossibility of i.t. MPC with n=2 for multiplication of bits P0P0 P1P1 b 0 = 0 b1b1 m0m0 m1m1 m2m2 m3m3 m 2i m 2i T (b 0, b 1 ) If b 1 = 0, there exists r 1 so that T (b 0, b 1 ) is consistent with (b 0 =1, r 1 ) If b 1 = 1, there can NOT exist r 1 so that T (b 0, b 1 ) is consistent with (b 0 =1, r 1 ) b 1 = ?? r0r0 b 0  b 1

Impossibility of i.t. MPC with n=2 for multiplication of bits P0P0 P1P1 b 0 = 0, r 0 b 1 = 1 m0m0 m1m1 m2m2 m3m3 m 2i m 2i T (b 0, b 1 ) b 0  b 1 = 0 b 0 = 1, r 1 Same transcript - > same output!! No correctness! But output should be 1 But since the protocol is correct……

Impossibility of i.t. MPC with n=2 for multiplication of bits P0P0 P1P1 b 0 = 0 b1b1 m0m0 m1m1 m2m2 m3m3 m 2i m 2i T (b 0, b 1 ) Adversary’s algorithm to find b 1 : 1. Try to find a randomness r 1 so that T (b 0, b 1 ) is consistent with (b 0 =1, r 1 ) 2. If found output b 1 = 0 else output b 1 = 1

OT is impossible information theoretically. We get something for free x1x1 P1P1 P2P2 x2x2 1-out-of-2 OT 0 x1x1 x2x2 x1x2x1x2

Secure Computation with Dishonest Majority Boolean Circuit (AND (  ), NOT( ), XOR (+)) Arithmetic Circuit over finite field (Addition (+) and Multiplication (  )) x1x1 x2x2 x3x3 x4x4 +  f(x 1, x 2, x 3, x 4 ); inputs are field elements  x1x1 x2x2 x3x3 x4x4 f(x 1, x 2, x 3, x 4 ); inputs are bits + OT Homomorphic / Semi-homomorphic Encryption Constant Round Protocols No Constant Round Protocols  

1-out-of-2 Oblivious Transfer S Message Transfer: R m S R m0m1m0m1 b mbmb m S does not know b R does not know m 1-b 1-out-of-2 OT m0m0 m1m1 b mbmb

Ideal Functionality for OT.mbmb m0m1m0m1 b

OT from CPA-secure PKE with Public Key Samplability [EvenGoldreichLempel85] >> A public-key encryption scheme is a collection of 3 PPT algorithms  = (Gen, Enc, Dec) Gen 1n1n pk, sk  {0, 1} n Syntax: (pk, sk)  Gen(1 n ) Enc m  Mc pk Syntax: c  Enc pk (m) Randomized algo Dec cm sk Syntax: m:= Dec sk (c) Except with a negligible probability over (pk, sk) output by Gen(1 n ), we require the following for every (legal) plaintext m Dec sk (Enc pk (m)):= m Randomized Algo Deterministic (w.l.o.g)

CPA Security  = (Gen, Enc, Dec) I can break  Let me verify m 0, m 1, |m 0 |=|m 1 | Gen(1 n ) b  {0, 1} c  Enc pk (m b ) b’  {0, 1} (Attacker’s guess about encrypted message) Game Output b = b’ attacker won b  b’ attacker lost Indistinguishability experiment PubK (n) A,  cpa PPT A pk, sk pk In the real-world, everyone including the attacker will have the public key pk  is CPA-secure if for every PPT attacker A taking part in the above experiment, the probability that A wins the experiment is at most negligibly better than ½ ½ + negl(n) Pr PubK (n) A,  cpa = 1 

PKE with Public Key Samplability >> A public-key encryption scheme is a collection of 5 PPT algorithms  = (Gen, Enc, Dec, oGen, fGen) oGen 1n1n pk, rSyntax: (pk, r)  oGen(1 n ) fGen pk: (pk,sk)  Gen(1 n ) r’ Syntax: r’  fGen(pk) (pk,r’) and (pk,r) looks indistinguishable

Key Samplability  = (Gen, Enc, Dec, oGen, fGen) I can break  b  {0, 1} b’  {0, 1} Game Output b = b’ attacker won b  b’ attacker lost Indistinguishability experiment PubK (n) A,  ksamp PPT A (pk, sk)  Gen(1 n ) r  fGen(pk) (pk,r)  is key-samplable if for every PPT attacker A taking part in the above experiment, the probability that A wins the experiment is at most negligibly better than ½ ½ + negl(n) Pr PubK (n) A,  ksamp = 1  (pk, r)  oGen(1 n )

ElGamal PKE Enc pk (m) c 1 = g y for random y c 2 = h y.. m c= (c 1,c 2 ) Dec sk (c) c 2 / (c 1 ) x = c 2. [(c 1 ) x ] -1 Gen(1 n ) (G, o, q, g) h = g x. For random x pk= (G,o,q,g,h), sk = x

1-out-of-2 Oblivious Transfer S R m0m1m0m1 b S does not know b R does not know m 1-b (pk b, sk b )  Gen(1 n ) (pk 1-b, r 1-b )  oGen(1 n ) (pk 0,pk 1 ) c 0  Enc pk0 (m 0 ) c 1  Enc pk1 (m 1 ) (c 0,c 1 ) m b  Dec skb (m b )

Security for the Receiver S R m0m1m0m1 b (pk b, sk b )  Gen(1 n ) (pk 1-b, r 1-b )  oGen(1 n ) (pk 0,pk 1 ) c 0  Enc pk0 (m 0 ) c 1  Enc pk1 (m 1 ) (c 0,c 1 ) m b  Dec skb (m b ) View S Real (m 0,m 1,b,k ) = {m 0,m 1,pk 0,pk 1,r S 0,r S 1 } S SIM S m0m1m0m1 m0m1m0m1 (pk 0, sk 0 )  Gen(1 n ) (pk 1, sk 1 )  Gen(1 n ) (pk 0,pk 1 ) c 0  Enc pk0 (m 0 ) c 1  Enc pk1 (m 1 ) (c 0,c 1 ) View S Ideal (m 0,m 1,b,k ) = {m 0,m 1,pk 0,pk 1, r S 0,r S 1 } = {m 0,m 1,pk b,pk 1-b, r S 0,r S 1 } Easy Reduction to ksamp security of the PKE!!

Indistinguishability of Real and Ideal View Theorem. If  is ksamp-secure, then our OT provides receiver security according to real world/ideal world paradigm. Proof: Assume OT does not provide receiver security D, p(n): ½ + 1/p(n) Pr D(View S Real (m 0,m 1,b,k) =1) - > D A (pk,r) b’  {0, 1} (pk,r) by oGen or (Gen,fGen) m 0,m 1,pk 0,pk 1,r S 0,r S 1 m 0,m 1 (pk b, sk b )  Gen(1 n ) D(View S Ideal (m 0,m 1,b,k) =1) {m 0,m 1,pk b,pk 1-b,r S 0,r S 1 } pk 1-b = pk r S 0,r S 1 b’  {0, 1} If b is guessed correctly, then A emulates Real/Idea View -> A breaks ksamp security with non-negligible advantage (PKE is not ksamp-secure) -> Contradiction

Security for the Sender S R m0m1m0m1 b (pk b, sk b )  Gen(1 n ) (pk 1-b, r 1-b )  oGen(1 n ) (pk 0,pk 1 ) c 0  Enc pk0 (m 0 ) c 1  Enc pk1 (m 1 ) (c 0,c 1 ) m b  Dec skb (m b ) View R Real (m 0,m 1,b,k ) = {b,m b,pk b,r b,pk 1-b, r 1-b, c 0,c 1 } SIM R bmbbmb b (pk 0,pk 1 ) c b  Enc pkb (m b ) c 1-b  Enc pk 1-b (0 k ) (c 0,c 1 ) R (pk b, sk b )  Gen(1 n ) (pk 1-b, r 1-b )  oGen(1 n ) m b  Dec skb (m b ) View R Ideal (m 0,m 1,b,k ) = {b,m b,pk b,r b,pk 1-b, r 1-b, c b,c 1-b } Reduction to CPA does not work as c 1-b is encrypted using a public key generated by oGen NOT Gen

Security proof via Hybrid Arguments View R Real (m 0,m 1,b,k ) = {b,m b,pk b,r b,pk 1-b, r 1-b, c b,c 1-b } View R Ideal (m 0,m 1,b,k ) = {b,m b,pk b,r b,pk 1-b, r 1-b, c b,c 1-b } View R Hybrid1 (m 0,m 1,b,k ) = {b,m b,pk b,r b,pk 1-b, r 1-b, c b,c 1-b } (pk b, sk b )  Gen(1 n ) (pk 1-b, r 1-b )  oGen(1 n ) (pk b, sk b )  Gen(1 n ) (pk 1-b, r 1-b )  oGen(1 n ) (pk b, sk b )  Gen(1 n ) (pk 1-b, sk 1-b )  Gen(1 n ) c b  Enc pkb (m b ) c 1-b  Enc pk 1-b (0 k ) c b  Enc pkb (m 0 ) c 1-b  Enc pk1-b (m 1-b ) r 1-b  fGen(pk 1-b ) c b  Enc pkb (m b ) c 1-b  Enc pk 1-b (m 1-b ) View R Hybrid2 (m 0,m 1,b,k ) = {b,m b,pk b,r b,pk 1-b, r 1-b, c b,c 1-b } (pk b, sk b )  Gen(1 n ) (pk 1-b, sk 1-b )  Gen(1 n ) r 1-b  fGen(pk 1-b ) c b  Enc pkb (m b ) c 1-b  Enc pk 1-b (0 k )  ksamp security  CPA security  ksamp security 

More OTs CT3 [PVW08] A Framework for Efficient and Composable Oblivious Transfer

GMW87 [GMW87]: How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority. STOC 1987.STOC Over Binary circuits

(n,n) - Secret Sharing for Semi-honest Adversaries Secret x is (n,n) if x2x2 x3x3 x n x1x1 … P1P1 P2P2 PnPn P3P3 x = x 1 + x 2 + ….. + x n ; shares are random; all are bits; + is + mod 2 Linearity is satisfied!!

GMW87 x1x1 x2x2 x3x3 x4x4   y 

1.(n, n)- secret share each input  y Find (n, n)-sharing of each intermediate value XOR gate: Non-Interactive P0P0 P1P1 x0x0 x1x1 y0y0 y1y1 y y=y0 + y1y=y0 + y1 x=x 0 + x 1 x + y =( x 0 + y 0 ) + ( x 1 + y 1 ) x  

GMW87 1.(n, n)- secret share each input  y Find (n, n)-sharing of each intermediate value NOT gate: Non-Interactive (One party flips the bit) P0P0 P1P1 x0x0 x1x1 x= x 0 + x 1  

GMW87 1.(n, n)- secret share each input  y Find (n, n)-sharing of each intermediate value XOR gate: Non-Interactive NOT gate: Non-Interactive (One party flips the bit) AND gate: Interactive (OT)  

GMW87- AND Gate Evaluation P0P0 P1P1 x0x0 x1x1 y0y0 y1y1 y   y=y0 + y1y=y0 + y1 x=x 0 + x 1 x  y = ( x 0 +x 1 )  ( y 0 + y 1 ) = x 0  y 0 + x 0  y 1 + y 0  x 1 + x 1  y 1 x  1-out-of-2 OT 0 x0x0 y1y1 x0y1x0y1 1-out-of-2 OT y0y0 y0x1y0x1 0 x1x1 x 0  y 0 + y 0  x 1 x 0  y 1 + x 1  y 1 Leaks information from the partial product !!

GMW87- AND Gate Evaluation P0P0 P1P1 x0x0 x1x1 y0y0 y1y1 y   y=y0 + y1y=y0 + y1 x=x 0 + x 1 x  y = ( x 0 +x 1 )  ( y 0 + y 1 ) = x 0  y 0 + x 0  y 1 + y 0  x 1 + x 1  y 1 x  1-out-of-2 OT r0r0 r 0 + x 0 y1y1 1-out-of-2 OT y0y0 r 1 + y 0  x 1 r1r1 r 1 + x 1 x 0  y 0 + r 0 + (r 1 + y 0  x 1 ) (r 0 + x 0  y 1 )+ r 1 + x 1  y 1 r 0 + x 0  y 1

GMW87 1.(n, n)- secret share each input  y Find (n, n)-sharing of each intermediate value XOR gate: Non-Interactive NOT gate: Non-Interactive (One party flips the bit) AND gate: Interactive (OT)   3. Reconstruct y by exchanging the shares

Extension to Multiparty and 2 party Security Proof On the board.