Download presentation
Presentation is loading. Please wait.
1
Rishab Goyal Venkata Koppula Brent Waters
Separating IND-CPA and Circular Security for Unbounded Length Key Cycles Rishab Goyal Venkata Koppula Brent Waters
2
Key Dependent Message Security [BlackRogawayShrimpton02]
Plaintexts dependent on secret key Encrypted Storage Systems (e.g., BitLocker) Anonymous Credential Systems [CamenischLysyanskaya01] Gentry’s Bootstrapping [Gentry09] .... Semantic (IND-CPA) security might not be sufficient Let’s start by talking about …
3
n-Circular Encryption [CamenischLysyanskya01]
All-or-Nothing Sharing Credentials PK1 PK2 . . . PKn Secret SK1 SK2 . . . SKn The most common example where we see key dependent messages in practice is … “A user who allows a friend to use one of her credentials once, gives him the ability to use all of her credentials, i.e., taking over her identity. “ EncPK1(SK2) . . . EncPKn-1(SKn) EncPKn(SK1)
4
n-Circular Security BDDH [BonehHamburgHaleviOstrovysky08]
PK1 PK1 . . . . . . +ve Results PKn BDDH [BonehHamburgHaleviOstrovysky08] LWE [ApplebaumCashPeikertSahai09] Extensions [BG10, BHHI10, BGK11, App11, MTY11, BV11, AP12] PKn EncPK1(SK2) EncPK1(0) . . . . . . EncPKn(SK1) EncPKn(0)
5
Does IND-CPA imply n-Circular Security?
6
Negative Results n = 2 Bilinear Groups [AcarBelenkiyBellareCash10, CashGreenHohenberger12] LWE [BishopHohenbergerWaters15] n ≥ 3 Obfuscation [KoppulaRamchenWaters15, MarcedoneOrlandi16] LWE [KoppulaWaters16, AlamatiPeikert16] So, what does this suggest?
7
A Closer Look … iO [KRW15] LWE [AP16, KW16] Theorem. ∀ n, ∃ IND-CPA secure encryption scheme E that is not n-circular secure. For every scheme E, does there exist a parameter n such that it is n-circular secure? So, what does this suggest? These are contrived schemes. This leaves door open for each scheme to have a cycle length property such that it is circular secure for that length. This would mean that every scheme is circular secure for some parameter.
8
A Closer Look … Assuming iO New Theorem. ∃ IND-CPA secure encryption scheme E such that ∀ n, it is not n-circular secure. For every scheme E, does there exist a parameter n such that it is n-circular secure? So, what does this suggest? These are contrived schemes. This leaves door open for each scheme to have a cycle length property such that it is circular secure for that length. This would mean that every scheme is circular secure for some parameter.
9
Indistinguishability Obfuscation [BarakGoldreichImpagliazzoRudichSahaiVadhanYang01]
Compiling functionally equivalent programs to indistinguishable programs ≣ P0 P1 O O O(P0) O(P1)
10
} KRW Counterexample ……… Choose key pair = obfuscation of
Decrypt ct1 as Decrypt ct2 as … Decrypt ctn as If sk1 = m, output ‘Cycle’. } ……… Inputs
11
} Extending KRW ……… Decrypt ct1 as Decrypt ct2 as … Decrypt ctn as
Inputs Decrypt ct1 as Decrypt ct2 as … Decrypt ctn as If sk1 = m, output ‘Cycle’. Want this to work for all cycle lengths. Cycle length not a-priori known or fixed. (Q- How to defend from iO for TMs?) At first thought, it might seem iO for TMs. But it needs leveraging and input size fixed. Cycle length fixed!
12
An Iterative Approach …… …… EncPKn(SK1) 1 EncPK1(SK2) n 2
EncPKn-1(SKn) n - 1 EncPK2(SK3) 3 EncPKn-2(SKn-1) …… …… EncPK3(SK4)
13
An Iterative Approach …… …… EncPKn(SK1) 1 n EncPKn-1(SKn) EncPK1(SK3)
14
An Iterative Approach …… …… EncPKn(SK1) 1 n EncPKn-1(SKn) EncPK1(SK4)
15
An Iterative Approach 1 EncPK1(SK1) At a high level, …
16
Main Idea … Use FHE for cycle reduction Create a 1-cycle tester … … 1
2 n - 1 n 3 … 1 n - 1 n 3 … 1 …
17
Cycle Reduction: FHE Correctness :
18
Cycle Reduction: FHE ………… …………
19
1-Cycle Tester: First Attempt
Choose key pair Compute = obfuscation of Output
20
1-Cycle Tester: First Attempt
Choose key pair Compute = obfuscation of Output Intuitively secure, but how to prove under iO? IND-CPA security provable if VBB obfuscation.
21
1-Cycle Tester: KRW Technique
Choose key pair , string s Compute = obfuscation of Output KRW trick. IND-CPA security provable under iO.
22
1-Cycle Tester: Proof Idea
Choose key pair , string s Compute = obfuscation of Output
23
Putting Together … Needs Fully Homomorphic Encryption!!
Use FHE for cycle reduction Create a 1-cycle tester Needs Fully Homomorphic Encryption!! Leveled HE not sufficient! 1 2 n - 1 n 3 … 1 n - 1 n 3 … 1 … Not known from standard assumption or even iO.
24
An Alternative Approach
1 EncPKn(SK1) EncPK1(SK2) n 2 EncPKn-1(SKn) n - 1 EncPK2(SK3) 3 EncPKn-2(SKn-1) …… …… EncPK3(SK4)
25
An Alternative Approach
1 EncPK1(SK2) 2 EncPKn-1(SK1) n - 1 EncPK2(SK3) 3 EncPKn-2(SKn-1) …… …… EncPK3(SK4)
26
An Alternative Approach
1 EncPK1(SK2) 2 EncPKn-2(SK1) EncPK2(SK3) 3 …… …… EncPK3(SK4)
27
An Alternative Approach
1 EncPK1(SK1) At a high level, …
28
Summarizing … Use FHE for cycle reduction Create a 1-cycle tester
2 n - 1 n 3 … 1 2 n - 1 3 … 1 … Not known from standard assumption or even iO. Leveled HE
29
Conclusions and Open Problems
Stronger circular security counterexample. Assume existence of iO. Can it be based on more standard assumptions? Say why stronger. That is, it says IND-CPA schemes may not be circular secure for any length parameter.
30
Conclusions and Open Problems
Stronger circular security counterexample. Assume existence of iO. Can it be based on more standard assumptions? Yes! Normally a talk ends here. But very recently, we were able to solve this problem under LWE.
31
Lockable Obfuscation [GKoppulaWaters17]
Correctness:
32
Lockable Obfuscation [GKoppulaWaters17]
Security:
33
Our Result [GKoppulaWaters17]
Lockable Obfuscation All poly sized circuits* Secure under LWE Applications Attribute-Based Encryption Predicate Encryption Circular Security Separations (Bit Encryption, Unbounded, …) Random Oracle Uninstantiability (Fujisaki-Okamoto, …) Rejecting Indistinguishability Obfuscator (riO) … ePrint: 2017/274
34
Thank you! Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.