advanced tools from modern cryptography
play

Advanced Tools from Modern Cryptography Lecture 12 MPC: UC-secure - PowerPoint PPT Presentation

Advanced Tools from Modern Cryptography Lecture 12 MPC: UC-secure OT UC-Secure OT UC-secure OT is impossible (even against PPT adversaries) in the plain model (i.e., without the help of another functionality) But possible from simple


  1. Advanced Tools from 
 Modern Cryptography Lecture 12 MPC: UC-secure OT

  2. UC-Secure OT UC-secure OT is impossible (even against PPT adversaries) in the “plain model” (i.e., without the help of another functionality) But possible from simple setups e.g., noisy channel (without computational assumptions) e.g., random coins (needs computational assumptions) Today: from Common random string Like random coins, but reusable across multiple sessions

  3. An OT Protocol (passive corruption) Using (a special) encryption PKE in which one can sample a public-key without knowing secret-key c 1- b inscrutable to a 
 ( SK b , PK b ) ← KeyGen passive corrupt receiver Sample PK 1- b Sender learns nothing 
 about b c 0 = Enc(x 0, PK 0 ) c 1 = Enc(x 1, PK 1 ) PK 0 , PK 1 x b =Dec ( c b ;SK b ) b c 0 ,c 1 x 0 x 1 x 0 ,x 1 b F x b x b

  4. Towards Active Security Should not let the receiver pick PK 0 and PK 1 independently! (PK 0 ,PK 1 ) tied together, in which at most one can be decrypted (PK 0 ,PK 1 ,SK) ← Gen(b) s.t. check(PK 0 ,PK 1 ) = True (PK 0 ,PK 1 ) hides b. SK decrypts Enc(m;PK b ), but not Enc(m;PK 1-b ) But a simulator should be able to extract b from (PK 0 ,PK 1 ) (if Receiver corrupt) and m from Enc(m;PK 1-b ) (if Sender corrupt) Scheme will use a common random string Q (to be generated by a trusted party) During simulation Simulator can generate (Q,T) where T is a Trapdoor that can be used for extraction

  5. Towards Active Security Need: (PK 0 ,PK 1 ,SK) ← Gen(Q,b) s.t. check(PK 0 ,PK 1 ,Q) = True. (PK 0 ,PK 1 ) hides b. Enc(m;PK c ) hides m for some c (even if (PK 0 ,PK 1 ) maliciously generated). Simulator should have trapdoors. Suppose two different types of setups possible such that: 
 Type 1 setup: For honest (PK 0 ,PK 1 ), b statistically hidden. 
 Trapdoor decrypts both Enc(m;PK 0 ) and Enc(m;PK 1 ). 
 Type 2 setup: Honest Enc(m;PK c ) statistically hides m for some c. 
 Trapdoor extracts a “lossy” c from any (PK 0 ,PK 1 ). 
 Type 1 setup ≈ Type 2 setup (computationally) (PK 0 ,PK 1 ) computationally hides b in Type 2 setup too. 
 Enc(m;PK c ) hides m for some c in Type 1 setup too. Simulation when Sender corrupt: Use Type 1 setup Simulation when Receiver corrupt: Use Type 2 setup

  6. Dual-Mode Encryption (DME) Algorithms: Setup Dec , Setup Ext , Gen, Check, Enc, Dec Q from Setup Dec and Setup Ext indistinguishable If (PK 0 ,PK 1 ,SK) ← Gen(Q,b), then Check(PK 0 ,PK 1 ,Q)=True, and 
 Dec(Enc(x,PK b ), SK) = x If PK lossy, then Enc(x,PK) statistically hides x Two more algorithms required to exist by security property: 
 FindLossy and TrapKeyGen Given trapdoor from Setup Ext , and a pair PK 0 , PK 1 which passes the Check, FindLossy can find a lossy PK out of the two Given trapdoor from Setup Dec , TrapKeyGen can generate PK 0 , PK 1 which will pass the Check, along with decryption keys SK 0 , SK 1

  7. OT from DME Protocol could use either Setup Dec or Setup Ext ( PK 0 ,PK 1 , SK) ←
 Gen ( Q , b ) F Setup Q Q If Check ( PK 0 ,PK 1 , Q ) : 
 c 0 = Enc ( x 0, PK 0 ) c 1 = Enc ( x 1, PK 1 ) PK 0 , PK 1 x b =Dec ( c b ;SK ) b c 0 ,c 1 x 0 x 1 x 0 ,x 1 b F x b x b

  8. 
 
 OT from DME Simulation for corrupt sender: 
 0. ( Q , T ) ← Setup Dec , send Q. 
 1. Send ( PK 0 , PK 1 , SK 0 , SK 1 ) ← TrapKeyGen( T ) 
 2. On getting ( c 0 , c 1 ), extract ( x 0 , x 1 ) using ( SK 0 , SK 1 ) and send to F OT For corrupt receiver: 
 0. ( Q , T ) ← Setup Ext , send Q. 
 1. On getting ( PK 0 , PK 1 ), send b :=1-FindLossy( PK 0 , PK 1 , T ) to F OT , get x b 
 ( PK 0 ,PK 1 , SK) ←
 Gen ( Q , b ) 2. Send c b = Enc( x b , PK b ) and c 1- b = Enc(0, PK 1- b ) F Setup Q Q If Check ( PK 0 ,PK 1 , Q ) : 
 c 0 = Enc ( x 0, PK 0 ) c 1 = Enc ( x 1, PK 1 ) PK 0 , PK 1 x b =Dec ( c b ;SK ) b c 0 ,c 1 x 0 x 1 x 0 ,x 1 b F x b x b

  9. Smooth Projective Hash (SPH) Encode μ μ * Project � * � Hash* Hash � * � If μ ∈ M 0 
 If μ ∉ M 0 
 ≈ μ ∉ M 0 μ ∈ M 0 β = β * β random

  10. Smooth Projective Hash (SPH) Public parameters � . Trapdoor parameters τ . Messages μ ∈ M. Efficient Encode � : μ ↦ μ *, a group homom. M → M* Subgroup M 0 ⊆ M. Given τ and μ *, can efficiently check if μ ∈ M 0 Hash key � with efficient Project � : � ↦ � * Efficient Hash( μ *, � ) and Hash*( μ , � *) s.t. ∀ μ , for random � : If μ ∈ M 0 , then Hash( μ *, � ) = Hash*( μ , � *) If μ ∉ M 0 , Hash( μ *, � ) statistically close to uniform, even given � * Distributions { μ *} μ ← M0 ≈ { μ *} μ ← M\M0 Hash output is in a group too

  11. Groups A set G (for us finite, unless otherwise specified) and a “group operation” * that is associative, has an identity, is invertible, and (for us) commutative Examples: Z = (integers, +) (this is an infinite group), 
 Z N = (integers modulo N, + mod N), 
 G n = (Cartesian product of a group G, coordinate-wise operation) Order of a group G: |G| = number of elements in G For any a ∈ G, a |G| = a * a * ... * a (|G| times) = identity Finite Cyclic group (in multiplicative notation): there 
 g 0 g 1 g N-1 g 2 g N-2 .. is one element g such that G = {g 0 , g 1 , g 2 , ... g |G|-1 } g 3 . . . Prototype: Z N (additive group), with g=1. 
 . Corresponds to arithmetic in the exponent.

  12. Decisional Diffie-Hellman (DDH) Assumption Assumption about a distribution of finite cyclic groups and generators {(G, g, g x , g y , g xy )} (G,g) ← Gen ; x,y ← [|G|] ≈ {(G, g, g x , g y , g r )} (G,g) ← Gen ; x,y,r ← [|G|] Note: Requires that it is hard to find x from g x Typically, G required to be a prime-order group. So arithmetic in the exponent is in a field. Formulation equivalent to DDH in prime-order groups: {(G, g, g a , g b , g au , g bu )} (G,g),a,b,u ≈ {(G, g, g a , g b , g au , g bv )} (G,g),a,b,u,v If can distinguish the above, then can break DDH: 
 map (G, g, g x , g y , h) ↦ (G, g, g a , g x , g y.a , h)

  13. SPH from DDH Assumption Encode μ μ * Project � * � Hash* Hash � * � If μ ∈ M 0 
 If μ ∉ M 0 
 ≈ μ ∉ M 0 μ ∈ M 0 β = β * β random SPH from DDH assumption on a prime order group G {(G, g, g a , g b , g au , g bu )} (G,g),a,b,u ≈ {(G, g, g a , g b , g au , g bv )} (G,g),a,b,u,v � = (G,g,g a ,g b ), τ = (a,b) 
 � = (s,t) and � * = g as+bt . 
 μ = (u,v) and μ * = (g a.u , g b.v ). μ ∈ M 0 iff u=v. 
 Hash( μ *, � ) = g a.u.s ⋅ g b.v.t and Hash*( μ , � *) = g (as+bt).u

  14. DME from SPH PK SK Encode μ μ * rand. Project � * � Hash* Hash � * � If μ ∈ M 0 
 If μ ∉ M 0 
 ≈ μ ∉ M 0 μ ∈ M 0 Mask β = β * β random SPH gives a PKE scheme, with Hash as Enc, Hash* as Dec How to check that at least one of two PKs μ 0 *, μ 1 * is lossy? Lossy means not in M 0 * Setup contains μ * ∉ M 0 *, and require that μ 0 * ⋅ μ 1 * = μ *

  15. DME from SPH Setup: Sample SPH params ( � , τ ). Let μ← M. Let Q=( μ *, � ), T=( μ , τ ) Setup Dec : μ ∈ M 0 . Setup Ext : μ ∉ M 0 . Gen(Q,b): (PK 0 ,PK 1 ) = ( μ 0 *, μ 1 *) where μ b ← M 0 and μ 1-b * = μ * μ b * -1 
 Check (PK 0 ,PK 1 ,Q): check μ 0 * ⋅ μ 1 * = μ *. If μ ∉ M 0 , given ( μ 0 *, μ 1 *) s.t. μ 0 * ⋅ μ 1 * = μ *, at least one of μ 0 , μ 1 not in M 0 . Can find using τ . (FindLossy) If μ ∈ M 0 , using μ can find ( μ 0 , μ 1 ) s.t. μ 0 * ⋅ μ 1 * = μ * and both μ 0 , μ 1 ∈ M 0 (TrapKeyGen) Enc(x, μ b *): ( � *, x ⋅ Hash( μ b *, � ) ) where � random x assumed to be in the group of Hash output Dec(c, μ b ) where c=( � *, � ) and μ b ∈ M 0 : Ouput � .(Hash*( μ b , � *)) -1

  16. OT from DME Protocol could use either Setup Dec or Setup Ext ( PK 0 ,PK 1 , SK) ←
 Gen ( Q , b ) F Setup Q Q If Check ( PK 0 ,PK 1 , Q ) : 
 c 0 = Enc ( x 0, PK 0 ) c 1 = Enc ( x 1, PK 1 ) PK 0 , PK 1 x b =Dec ( c b ;SK ) b c 0 ,c 1 x 0 x 1 x 0 ,x 1 b F x b x b

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend