Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran - - PowerPoint PPT Presentation

adaptively secure succinct garbled ram with persistent
SMART_READER_LITE
LIVE PREVIEW

Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran - - PowerPoint PPT Presentation

Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti, Yilei Chen, Justin Holmgren, Mariana Raykova DIMACS workshop MIT Media Lab June 8~10, 2016 1 : June 11, 2016, Boston, heavy snow. 2 : June 11, 2016, Boston, heavy


slide-1
SLIDE 1

1

Adaptively Secure Succinct Garbled RAM with Persistent Memory

Ran Canetti, Yilei Chen, Justin Holmgren, Mariana Raykova DIMACS workshop MIT Media Lab June 8~10, 2016

slide-2
SLIDE 2

2

: June 11, 2016, Boston, heavy snow.

slide-3
SLIDE 3

3

: June 11, 2016, Boston, heavy snow. Alice finds a quasi-polynomial time algorithm for factoring.

slide-4
SLIDE 4

4

: June 11, 2016, Boston, heavy snow. Alice finds a quasi-polynomial time algorithm for factoring.

Alice

slide-5
SLIDE 5

5

: June 11, 2016, Boston, heavy snow. Alice finds a quasi-polynomial time algorithm for factoring. : Instead of submitting to STOC, she thinks it’s cool to write a program and show off to her friends.

slide-6
SLIDE 6

6

> Factoring.hs RSA2048

slide-7
SLIDE 7

7

> Factoring.hs RSA2048 Running time 7 hrs 34 mins 25195908475…20720357 = 83990...4079279 x 3091701...723883 Next question

slide-8
SLIDE 8

8

: It is slow on her laptop (quasi-polynomial time, you know) … cannot fit into a party.

slide-9
SLIDE 9

9

: It is slow on her laptop (quasi-polynomial time, you know) … cannot fit into a party. : So she turns to cloud, but clouds are big brothers

slide-10
SLIDE 10

10

: It is slow on her laptop (quasi-polynomial time, you know) … cannot fit into a party. : So she turns to cloud, but clouds are big brothers : She heard that one can delegate the computation in a way that the server learns only the output of the computation but nothing else

slide-11
SLIDE 11

11

“My friends and NSA will be shocked by the runtime without learning anything other than the output”

slide-12
SLIDE 12

12

“The algorithm has huge preprocessing, stores lots of non- zero points on the Zeta function ...” “My friends and NSA will be shocked by the runtime without learning anything other than the output”

slide-13
SLIDE 13

13

“The algorithm has huge preprocessing, stores lots of non- zero points on the Zeta function ...” “My friends and NSA will be shocked by the runtime without learning anything other than the output” “Wait ... the audiences already know too much.”

slide-14
SLIDE 14

14

> sudo apt-get install FHE

slide-15
SLIDE 15

15

> sudo apt-get install FHE > FHE Factoring.hs

slide-16
SLIDE 16

16

> sudo apt-get install FHE > FHE Factoring.hs Turning the program into circuits ...

slide-17
SLIDE 17

17

> sudo apt-get install FHE > FHE Factoring.hs Turning the program into circuits ... ^C

slide-18
SLIDE 18

18

> sudo apt-get install FHE > FHE Factoring.hs Turning the program into circuits ... ^C > > sudo apt-get install Yao > Yao Factoring.hs

slide-19
SLIDE 19

19

> sudo apt-get install FHE > FHE Factoring.hs Turning the program into circuits ... ^C > > sudo apt-get install Yao > Yao Factoring.hs Still turning the program into circuits ...

#Yao

slide-20
SLIDE 20

20

> sudo apt-get install FHE > FHE Factoring.hs Turning the program into circuits ... ^C > > sudo apt-get install Yao > Yao Factoring.hs Still turning the program into circuits ... ^C^C^C^C^C^C^C >

slide-21
SLIDE 21

21

> sudo apt-get install GRAM_Lu_Ostrovsky > GRAM_Lu_Ostrovsky Factoring.hs

slide-22
SLIDE 22

22

> sudo apt-get install GRAM_Lu_Ostrovsky > GRAM_Lu_Ostrovsky Factoring.hs Warning: Program size as big as the running time, continue (y) or not (n)

slide-23
SLIDE 23

23

> sudo apt-get install GRAM_Lu_Ostrovsky > GRAM_Lu_Ostrovsky Factoring.hs Warning: Program size as big as the running time, continue (y) or not (n) n >

slide-24
SLIDE 24

24

> sudo apt-get install PRAM

slide-25
SLIDE 25

25

> sudo apt-get install PRAM > PRAM Factoring.hs

slide-26
SLIDE 26

26

> sudo apt-get install PRAM > PRAM Factoring.hs Done -> PRAM_Factoring

slide-27
SLIDE 27

27

> sudo apt-get install PRAM > PRAM Factoring.hs Done -> PRAM_Factoring > PRAM_Factoring RSA2048

slide-28
SLIDE 28

28

> sudo apt-get install PRAM > PRAM Factoring.hs Done -> PRAM_Factoring > PRAM_Factoring RSA2048 Warning: cannot adaptively choose functions or inputs, security at user’s own risk, continue (y) or not (n)

slide-29
SLIDE 29

29

> sudo apt-get install PRAM > PRAM Factoring.hs Done -> PRAM_Factoring > PRAM_Factoring RSA2048 Warning: cannot adaptively choose functions or inputs, security at user’s own risk, continue (y) or not (n) n

slide-30
SLIDE 30

30

“Don’t turn into circuits, don’t blow up too much” “Adaptively pick integers” “Huge amount of preprocessed data reusable”

slide-31
SLIDE 31

31

Garbling/randomized encoding for RAM with persistent memory

slide-32
SLIDE 32

32

Garbling/randomized encoding for RAM with persistent memory msk Gen =>

slide-33
SLIDE 33

33

Garbling/randomized encoding for RAM with persistent memory D0 msk Gen => msk + => G(D0)

slide-34
SLIDE 34

34

Garbling/randomized encoding for RAM with persistent memory D0 msk Gen => msk + => G(D0) P1 msk + => G(P1)

slide-35
SLIDE 35

35

Garbling/randomized encoding for RAM with persistent memory D0 msk Gen => msk + => G(D0) P1 msk + => G(P1) G(P1) Eval G(D0) => P1(D0)

slide-36
SLIDE 36

36

Garbling/randomized encoding for RAM with persistent memory D0 msk Gen => msk + => G(D0) P1 msk + => G(P1) G(P1) Eval G(D0) => G(D1) P1(D0) Persistency

slide-37
SLIDE 37

37

Garbling/randomized encoding for RAM with persistent memory D0 msk Gen => msk + => G(D0) P1 msk + => G(P1) G(P1) Eval G(D0) => G(D1) P1(D0) P2 msk + => G(P2) Persistency

slide-38
SLIDE 38

38

Garbling/randomized encoding for RAM with persistent memory D0 msk Gen => msk + => G(D0) P1 msk + => G(P1) G(P1) Eval G(D0) => G(D1) P1(D0) P2 msk + => G(P2) G(P2) Eval G(D1) => G(D2) P2(D1) ... Persistency

slide-39
SLIDE 39

39

Garbling/randomized encoding for RAM with persistent memory D0 G(D0) P1 G(P1) Succinct

slide-40
SLIDE 40

40

Garbling/randomized encoding for RAM with persistent memory ? ? P1(D0) Adaptively simulation secure

slide-41
SLIDE 41

41

Garbling/randomized encoding for RAM with persistent memory ? => G(D0) ? => G(P1) G(P1) G(D0) <= G(D1) P1(D0) Adaptively simulation secure

slide-42
SLIDE 42

42

Garbling/randomized encoding for RAM with persistent memory ? => G(D0) ? => G(P1) G(P1) G(D0) <= G(D1) P1(D0) ? G(D1) P2(D1) Adaptively simulation secure

slide-43
SLIDE 43

43

Garbling/randomized encoding for RAM with persistent memory ? => G(D0) ? => G(P1) G(P1) G(D0) <= G(D1) P1(D0) ? => G(P2) G(P2) G(D1) <= G(D2) P2(D1) Adaptively simulation secure

slide-44
SLIDE 44

44

Theorem

slide-45
SLIDE 45

45

[Main Theorem] Adaptively secure succinct garbled RAM with persistent memory from indistinguishability obfuscation for circuits, and poly-to-1 collision-resistant hash function.

slide-46
SLIDE 46

46

Starring

slide-47
SLIDE 47

47

Indistinguishability Obfuscator

slide-48
SLIDE 48

48

iO[ F0 ] ≈ iO[ F1 ]

if F0 and F1 have identical functionality Indistinguishability Obfuscator for circuits Candidate constructions:

[Garg-Gentry-Halevi-Raykova-Sahai-Waters ‘13], [Barak-Garg-Kalai-Paneth-Sahai ‘14], [Brakerski-Rothblum ‘14], [Pass-Seth-Telang ‘14], [Zimmerman ‘15], [Applebaum-Brakerski ‘15], [Ananth-Jain ‘15], [Bitansky-Vaikuntanathan ‘15], [Gentry-Gorbunov-Halevi ‘15], [Lin ‘16], …

Cryptanalyses:

[Cheon-Han-Lee-Ryu-Stehle ‘15], [Coron et al ‘15], [Miles-Sahai-Zhandry ‘16], ...

Defined by [Barak-Goldreich-Impagliazzo-Rudich-Sahai-Vadhan-Yang ‘01]

Security:

slide-49
SLIDE 49

49

Poly-to-one Collision Resistant Hash function

slide-50
SLIDE 50

50

Poly-to-one collision resistant hash functions H is collision resistant + each image has at most poly preimages. [Thm] Exists for constant c, assuming Factoring or Discrete-log is hard.

slide-51
SLIDE 51

51

The rest of the talk:

  • 1. The main idea of the construction.
  • 2. The technical heart: adaptively-enforceable accumulator.
  • 3. Wrap up, and the easiest ways to think of our scheme.
slide-52
SLIDE 52

52

Starting point: Canetti-Holmgren’s selective secure scheme.

slide-53
SLIDE 53

53

Starting point: Canetti-Holmgren’s selective secure scheme. High-level idea of the Canetti-Holmgren construction: Garble the CPU-step circuit, encrypt and authenticate the intermediate states, memories.

slide-54
SLIDE 54

54

You never know how hard it is to use iO before actually play with it.

[ said Justin Holmgren, June 22, 2015, sunny ]

slide-55
SLIDE 55

55

Starting point: Canetti-Holmgren’s selective secure scheme. High-level idea of the Canetti-Holmgren construction: Garble the CPU-step circuit, encrypt and authenticate the intermediate states, memories. Canetti-Holmgren scheme details: Fixed-transcript => Fixed-access => Fixed-address => Fully secure

slide-56
SLIDE 56

56

Starting point: Canetti-Holmgren’s selective secure scheme. High-level idea of the Canetti-Holmgren construction: Garble the CPU-step circuit, encrypt and authenticate the intermediate states, memories. Canetti-Holmgren scheme details: Fixed-transcript => Fixed-access => Fixed-address => Fully secure

Indistinguishable as long as transc = (q, op) are the same. [KLW-technique]

slide-57
SLIDE 57

57

Starting point: Canetti-Holmgren’s selective secure scheme. High-level idea of the Canetti-Holmgren construction: Garble the CPU-step circuit, encrypt and authenticate the intermediate states, memories. Canetti-Holmgren scheme details: Fixed-transcript => Fixed-access => Fixed-address => Fully secure

Indistinguishable as long as transc = (q, op) are the same. [KLW-technique] q can be different [encrypt the state]

slide-58
SLIDE 58

58

Starting point: Canetti-Holmgren’s selective secure scheme. High-level idea of the Canetti-Holmgren construction: Garble the CPU-step circuit, encrypt and authenticate the intermediate states, memories. Canetti-Holmgren scheme details: Fixed-transcript => Fixed-access => Fixed-address => Fully secure

Indistinguishable as long as transc = (q, op) are the same. [KLW-technique] q can be different [encrypt the state] Memory content can be different [encrypt the data]

slide-59
SLIDE 59

59

Starting point: Canetti-Holmgren’s selective secure scheme. High-level idea of the Canetti-Holmgren construction: Garble the CPU-step circuit, encrypt and authenticate the intermediate states, memories. Canetti-Holmgren scheme details: Fixed-transcript => Fixed-access => Fixed-address => Fully secure

Indistinguishable as long as transc = (q, op) are the same. [KLW-technique] q can be different [encrypt the state] Memory content can be different [encrypt the data] Hide access pattern. [oram]

slide-60
SLIDE 60

60

Starting point: Canetti-Holmgren’s selective secure scheme. High-level idea of the Canetti-Holmgren construction: Garble the CPU-step circuit, encrypt and authenticate the intermediate states, memories. Canetti-Holmgren scheme details: Fixed-transcript => Fixed-access => Fixed-address => Fully secure

Indistinguishable as long as transc = (q, op) are the same. [KLW-technique] q can be different [encrypt the state] Memory content can be different [encrypt the data] Hide access pattern. [oram]

slide-61
SLIDE 61

61

Canetti-Holmgren (ITCS16)

slide-62
SLIDE 62

62

Canetti-Holmgren (ITCS16) + Zoom-in the core step:

slide-63
SLIDE 63

63

Canetti-Holmgren (ITCS16) + Zoom-in the core step: Koppula-Lewko-Waters (STOC15) (iO-friendly) Iterator (iO-friendly) Accumulator (iO-friendly) Splittable signature

slide-64
SLIDE 64

64

Canetti-Holmgren (ITCS16) + Zoom-in the core step: Koppula-Lewko-Waters (STOC15) (iO-friendly) Iterator (iO-friendly) Accumulator (iO-friendly) Splittable signature

What is written in eprint 2015/1074

Accumulator iO-friendly Merkle-tree

slide-65
SLIDE 65

65

Canetti-Holmgren (ITCS16) + Zoom-in the core step: Koppula-Lewko-Waters (STOC15) (iO-friendly) Iterator (iO-friendly) Accumulator (iO-friendly) Splittable signature

What is written in eprint 2015/1074

Accumulator iO-friendly Merkle-tree

i n i t i a l i z e

G(D0)

slide-66
SLIDE 66

66

Canetti-Holmgren (ITCS16) + Zoom-in the core step: Koppula-Lewko-Waters (STOC15) (iO-friendly) Iterator (iO-friendly) Accumulator (iO-friendly) Splittable signature

What is written in eprint 2015/1074

Accumulator iO-friendly Merkle-tree

i n i t i a l i z e A u t h e n t i c a t e

G(D0) G(Pi+1) key

slide-67
SLIDE 67

67

Canetti-Holmgren (ITCS16) + Zoom-in the core step: Koppula-Lewko-Waters (STOC15) (iO-friendly) Iterator (iO-friendly) Accumulator (iO-friendly) Splittable signature

What is written in eprint 2015/1074

Accumulator iO-friendly Merkle-tree

i n i t i a l i z e A u t h e n t i c a t e update

G(D0) G(Pi+1) G(Di+1) key

slide-68
SLIDE 68

68

Canetti-Holmgren (ITCS16) + Zoom-in the core step: ++ Zoom-in the accumulator

slide-69
SLIDE 69

69

Canetti-Holmgren (ITCS16) + Zoom-in the core step: ++ Zoom-in the accumulator Properties needed for the Accumulator

  • Normal property like a Merkle-tree.

#Merkletree

slide-70
SLIDE 70

70

Canetti-Holmgren (ITCS16) + Zoom-in the core step: ++ Zoom-in the accumulator Properties needed for the Accumulator

  • Normal property like a Merkle-tree.

#Merkletree

slide-71
SLIDE 71

71

Canetti-Holmgren (ITCS16) + Zoom-in the core step: ++ Zoom-in the accumulator Properties needed for the Accumulator

  • Normal property like a Merkle-tree.

#Merkletree

slide-72
SLIDE 72

72

Canetti-Holmgren (ITCS16) + Zoom-in the core step: ++ Zoom-in the accumulator Properties needed for the Accumulator

  • Normal property like a Merkle-tree.

#Merkletree

slide-73
SLIDE 73

73

Canetti-Holmgren (ITCS16) + Zoom-in the core step: ++ Zoom-in the accumulator Properties needed for the Accumulator

  • Normal property like a Merkle-tree.
  • Enforcement (iO-friendly property):

there’s only one preimage x* of the current root value y*.

#Merkletree

y* x*

slide-74
SLIDE 74

74

Canetti-Holmgren (ITCS16) + Zoom-in the core step: ++ Zoom-in the accumulator Properties needed for the Accumulator

  • Normal property like a Merkle-tree.
  • Enforcement (iO-friendly property):

there’s only one preimage x* of the current root value y*.

Impossible information theoretically.

#Merkletree

y* x*

slide-75
SLIDE 75

75

Canetti-Holmgren (ITCS16) + Zoom-in the core step: ++ Zoom-in the accumulator Properties needed for the Accumulator

  • Normal property like a Merkle-tree.
  • Enforcement (iO-friendly property):

there’s only one preimage x* of the current root value y*.

Impossible information theoretically. KLW’s computational enforcement: Normal.Gen( )->H Enforce.Gen( x*, y*)->H*, H ≈ H*

#Merkletree

y* x*

slide-76
SLIDE 76

76

Canetti-Holmgren (ITCS16) + Zoom-in the core step: ++ Zoom-in the accumulator Properties needed for the Accumulator

  • Normal property like a Merkle-tree.
  • Enforcement (iO-friendly property):

there’s only one preimage x* of the current root value y*.

Impossible information theoretically. KLW’s computational enforcement: Normal.Gen( )->H Enforce.Gen( x*, y*)->H*, H ≈ H* Alternatively: SSB hashing => [Ananth-Chen-Chung-Lin-Lin]

#Merkletree

y* x*

slide-77
SLIDE 77

77

Selective Enforcing Adaptive Enforcing

slide-78
SLIDE 78

78

Selective Enforcing Adaptive Enforcing

x* <= Adversary

slide-79
SLIDE 79

79

Gen( ) => H

Selective Enforcing Adaptive Enforcing

Enforcing(x*, y*) => H* x* <= Adversary

slide-80
SLIDE 80

80

Gen( ) => H

Selective Enforcing Adaptive Enforcing

Enforcing(x*, y*) => H* Gen( ) => H x* <= Adversary

slide-81
SLIDE 81

81

Gen( ) => H

Selective Enforcing Adaptive Enforcing

Enforcing(x*, y*) => H* Gen( ) => H x* <= Adversary(H) x* <= Adversary

slide-82
SLIDE 82

82

Gen( ) => H

Selective Enforcing Adaptive Enforcing

Enforcing(x*, y*) => H* Gen( ) => H Enforcing(x*, y*) => H* x* <= Adversary(H) x* <= Adversary

slide-83
SLIDE 83

83

( … wait, what?)

Gen( ) => H

Selective Enforcing Adaptive Enforcing

Enforcing(x*, y*) => H* Gen( ) => H Enforcing(x*, y*) => H* x* <= Adversary(H) x* <= Adversary

slide-84
SLIDE 84

84

#Mindblowing

slide-85
SLIDE 85

85

Fact I Can separate the key

slide-86
SLIDE 86

86 What is written in eprint 2015/1074

Accumulator iO-friendly Merkle-tree

i n i t i a l i z e A u t h e n t i c a t e update

G(D0) G(Pi+1) G(Di+1) key key hk vk = +

slide-87
SLIDE 87

87 What is written in eprint 2015/1074

Accumulator iO-friendly Merkle-tree

i n i t i a l i z e A u t h e n t i c a t e update

G(D0) G(Pi+1) G(Di+1) key key hk vk = + hk vk hk

slide-88
SLIDE 88

88

Adaptive Enforcing hk

slide-89
SLIDE 89

89

Adaptive Enforcing

x* <= Adversary( hk )

hk

slide-90
SLIDE 90

90

Adaptive Enforcing

x* <= Adversary( hk )

hk vk vk*(x*)

slide-91
SLIDE 91

91

Fact II If you believe diO ...

slide-92
SLIDE 92

92

Adaptive Enforcing key hk vk = +

slide-93
SLIDE 93

93

Adaptive Enforcing key hk vk = + hk always_hk_Gen( ) -> hk := CRHF key h

slide-94
SLIDE 94

94

Adaptive Enforcing

x* <= Adversary(H)

key hk vk = + hk always_hk_Gen( ) -> hk := CRHF key h

slide-95
SLIDE 95

95

Adaptive Enforcing

x* <= Adversary(H)

key hk vk = + hk vk always_hk_Gen( ) -> hk := CRHF key h normal_vk_Gen( ) -> vk vk(x,y) = diO( if h(x)=y, output 1; else: output 0 )

slide-96
SLIDE 96

96

Adaptive Enforcing

x* <= Adversary(H)

key hk vk = + hk vk vk*(x*) always_hk_Gen( ) -> hk := CRHF key h normal_vk_Gen( ) -> vk vk(x,y) = diO( if h(x)=y, output 1; else: output 0 ) enforce_vk_Gen( x*, y* ) -> vk* vk*(x,y) = diO( if y!=y* and h(x)=y, output 1; Elseif y=y* and x=x*, output 1; Else: output 0 )

slide-97
SLIDE 97

97

Fact III: If you don’t believe diO, can still do this with iO.

slide-98
SLIDE 98

98

From iO + preimage-bounded CRHF: c-to-1 CRHF can be constructed from discrete-log or factoring

slide-99
SLIDE 99

99

From iO + preimage-bounded CRHF: c-to-1 CRHF can be constructed from discrete-log or factoring enforce_vk( x*, y* ) -> vk* vk*(x,y) = diO( if y!=y* and h(x)=y, output 1; Elseif y=y* and x=x*, output 1; Else: output 0 )

slide-100
SLIDE 100

100

From iO + preimage-bounded CRHF: c-to-1 CRHF can be constructed from discrete-log or factoring enforce_vk( x*, y* ) -> vk* vk*(x,y) = diO( if y!=y* and h(x)=y, output 1; Elseif y=y* and x=x*, output 1; Else: output 0 ) By diO-iO equivalence lemma [ Boyle-Chung-Pass ‘14 ]: “ If f1 and f2 differ only on polynomially many input-output values, and they are hard to find, then iO(f1) ≈ iO(f2) ”

slide-101
SLIDE 101

101

From iO + preimage-bounded CRHF: c-to-1 CRHF can be constructed from discrete-log or factoring enforce_vk( x*, y* ) -> vk* vk*(x,y) = diO( if y!=y* and h(x)=y, output 1; Elseif y=y* and x=x*, output 1; Else: output 0 ) From shrinking 1 bit to length-halving: Merkle-Damgaard.

slide-102
SLIDE 102

102

Fact IV: Adaptive Enforceable Accumulator done

slide-103
SLIDE 103

103

Rest of the upgrades: Canetti-Holmgren scheme details: Fixed-transcript => Fixed-access => Fixed-address => Fully secure

Indistinguishable as long as transc = (q, op) are the same. [KLW-technique. Assume iO] q can be different [encrypt the state] Memory content can be different [encrypt the data] Hide access pattern. [oram]

slide-104
SLIDE 104

104

Rest of the upgrades: Canetti-Holmgren scheme details: Fixed-transcript => Fixed-access => Fixed-address => Fully secure

Indistinguishable as long as transc = (q, op) are the same. [KLW-technique. Assume iO] q can be different [encrypt the state] Memory content can be different [encrypt the data] Hide access pattern. [oram] + adaptively enforceable accumulator [ from iO+dlog or factoring ]

slide-105
SLIDE 105

105

Rest of the upgrades: Canetti-Holmgren scheme details: Fixed-transcript => Fixed-access => Fixed-address => Fully secure

Indistinguishable as long as transc = (q, op) are the same. [KLW-technique. Assume iO] q can be different [encrypt the state] Memory content can be different [encrypt the data] Hide access pattern. [oram] Need a special property of the ORAM “Strong local randomness”, satisfied by Chung-Pass ORAM. With this property, can “guess” polynomially many addresses. + adaptively enforceable accumulator [ from iO+dlog or factoring ]

slide-106
SLIDE 106

106

Rest of the upgrades: Canetti-Holmgren scheme details: Fixed-transcript => Fixed-access => Fixed-address => Fully secure

Indistinguishable as long as transc = (q, op) are the same. [KLW-technique. Assume iO] q can be different [encrypt the state] Memory content can be different [encrypt the data] Hide access pattern. [oram] Need a special property of the ORAM “Strong local randomness”, satisfied by Chung-Pass ORAM. With this property, can “guess” polynomially many addresses. [Ananth-Chen-Chung-Lin-Lin, eprint 2015/1082] can be viewed as accomplishing this for all the steps. + adaptively enforceable accumulator [ from iO+dlog or factoring ] S S B h a s h [ H u b a c e k

  • W

i c h s ] [ O P W W ]

slide-107
SLIDE 107

107

Summary

  • 1. Adaptively secure garbled RAM with persistent memory.
  • 2. Everything is succinct.
  • 3. Upgrading to delegation with verifiability is almost for free.
  • 4. “Reusability” is natural.
  • 5. New iO-friendly tool: adaptively-enforceable accumulator (from

iO+Preimage-bounded-CRHF)

slide-108
SLIDE 108

108

Scenes

slide-109
SLIDE 109

109

slide-110
SLIDE 110

110

> sudo apt-get install GRAM_Canetti_Holmgren

slide-111
SLIDE 111

111

> sudo apt-get install GRAM_Canetti_Holmgren package indistinguishability_obfuscation not an accepted assumption, security at user’s own risk, continue (y) or not (n)

slide-112
SLIDE 112

112

> sudo apt-get install GRAM_Canetti_Holmgren package indistinguishability_obfuscation not an accepted assumption, security at user’s own risk, continue (y) or not (n) y

slide-113
SLIDE 113

113

> sudo apt-get install GRAM_Canetti_Holmgren package indistinguishability_obfuscation not an accepted assumption, security at user’s own risk, continue (y) or not (n) y > upgrade GRAM_CCHR Done

slide-114
SLIDE 114

114

> sudo apt-get install GRAM_Canetti_Holmgren package indistinguishability_obfuscation not an accepted assumption, security at user’s own risk, continue (y) or not (n) y > upgrade GRAM_CCHR Done > NSAcloud: GRAM_CCHR_Factoring RSA2048

slide-115
SLIDE 115

115

> sudo apt-get install GRAM_Canetti_Holmgren package indistinguishability_obfuscation not an accepted assumption, security at user’s own risk, continue (y) or not (n) y > upgrade GRAM_CCHR Done > NSAcloud: GRAM_CCHR_Factoring RSA2048 Running time 1.0s 25195908475…20720357 = 83990...4079279 x 3091701...723883 Next question