Anonymous IBE, Leakage Resilience and Circular Security from New - - PowerPoint PPT Presentation
Anonymous IBE, Leakage Resilience and Circular Security from New - - PowerPoint PPT Presentation
Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions Zvika Brakerski, Alex Lombardi, Gil Segev, and Vinod Vaikuntanathan Identity-Based Encryption [Sha84, BF03, Coc01] Identity-Based Encryption [Sha84, BF03, Coc01]
Identity-Based Encryption
[Sha84, BF03, Coc01]
Identity-Based Encryption
[Sha84, BF03, Coc01]
Identity-Based Encryption
[Sha84, BF03, Coc01]
To Bob:
Identity-Based Encryption
[Sha84, BF03, Coc01]
To Bob:
Ciphertext may reveal Bob’s identity
Anonymous Identity-Based Encryption
[BCOP04]
To Bob:
Constructions of IBE
Reference Assumption RO? Anonymous? Boneh-Franklin Bilinear Maps Yes Yes Cocks QR Yes No Boneh-Gentry- Hamburg + Crescenzo-Saraswat QR Yes Yes Boneh-Boyen Bilinear Maps No No Boyen-Waters + Gentry Bilinear Maps No Yes Gentry-Peikert- Vaikuntanathan LWE Yes Yes Cash-Hofheinz-Kiltz- Peikert + Agrawal-Boneh- Boyen LWE No Yes
A “Postmodern” Construction of IBE
- [DG17a] Non-black-box construction of IBE from CDH
(implied by both DDH and Factoring)
- New primitive: Chameleon Encryption
A “Postmodern” Construction of IBE
- [DG17a] Non-black-box construction of IBE from CDH
(implied by both DDH and Factoring)
- New primitive: Chameleon Encryption
A “Postmodern” Construction of IBE
Questions
- [DG17a] Non-black-box construction of IBE from CDH
(implied by both DDH and Factoring)
- New primitive: Chameleon Encryption
A “Postmodern” Construction of IBE
Questions
- What about anonymity? [DG] is not anonymous.
- IBE from more assumptions? Generic assumptions?
This Work
- Compactness of IBE (“weak IBE” full IBE)
- Batch Encryption (from which we construct “weak IBE”)
- Blindness (to help obtain Anonymous IBE)
This Work
- Notions/Tools
- Compactness of IBE (“weak IBE” full IBE)
- Batch Encryption (from which we construct “weak IBE”)
- Blindness (to help obtain Anonymous IBE)
This Work
- More from CDH: Anonymous IBE from CDH
- Notions/Tools
- Compactness of IBE (“weak IBE” full IBE)
- Batch Encryption (from which we construct “weak IBE”)
- Blindness (to help obtain Anonymous IBE)
This Work
- More from CDH: Anonymous IBE from CDH
- IBE from More: IBE from a variant of the LPN
assumption
- Notions/Tools
- Compactness of IBE (“weak IBE” full IBE)
- Batch Encryption (from which we construct “weak IBE”)
- Blindness (to help obtain Anonymous IBE)
This Work
- Leakage-Resilient and KDM secure public key
encryption from CDH and LPN
- More from CDH: Anonymous IBE from CDH
- IBE from More: IBE from a variant of the LPN
assumption
- Notions/Tools
- Compactness of IBE (“weak IBE” full IBE)
- Batch Encryption (from which we construct “weak IBE”)
- Blindness (to help obtain Anonymous IBE)
This Work
- Leakage-Resilient and KDM secure public key
encryption from CDH and LPN
- More from CDH: Anonymous IBE from CDH
- IBE from More: IBE from a variant of the LPN
assumption
Also in concurrent work [DGHM18]
* * *
- Notions/Tools
Outline
- Blindness and Anonymous IBE
- Batch Encryption
- A blueprint for constructing IBE
A Blueprint for Constructing IBE
Primitive |mpk| |ct| |sk| Full IBE
A Blueprint for Constructing IBE
(supporting T identities)
“IBE” Schemes
Primitive |mpk| |ct| |sk| Full IBE
A Blueprint for Constructing IBE
(supporting T identities)
“IBE” Schemes
Trivial IBE
Primitive |mpk| |ct| |sk| Full IBE
A Blueprint for Constructing IBE
Weakly Compact IBE
(supporting T identities)
“IBE” Schemes
Trivial IBE
Primitive |mpk| |ct| |sk| Full IBE
A Blueprint for Constructing IBE
- Theorem: Weakly Compact IBE IBE
Weakly Compact IBE
(supporting T identities)
“IBE” Schemes
Trivial IBE
Primitive |mpk| |ct| |sk| Full IBE
A Blueprint for Constructing IBE
- Theorem: Weakly Compact IBE IBE
Weakly Compact IBE
(supporting T identities)
“IBE” Schemes
- Uses ideas from [DG17b] (which obtained
adaptively secure IBE from selectively secure IBE) Trivial IBE
Primitive |mpk| |ct| |sk| Full IBE
A Blueprint for Constructing IBE
- Theorem: Weakly Compact IBE IBE
Weakly Compact IBE
- Theorem: “Batch Encryption” can
compress a Trivial IBE scheme into a Weakly Compact IBE scheme
(supporting T identities)
“IBE” Schemes
- Uses ideas from [DG17b] (which obtained
adaptively secure IBE from selectively secure IBE) Trivial IBE
How to construct IBE
CDH (LWE) LPN
How to construct IBE
CDH (LWE) LPN Batch Encryption
[DG17] (CDH) [this work] (LPN)
Step 1
How to construct IBE
CDH (LWE) LPN Batch Encryption
[DG17] (CDH) [this work] (LPN)
Step 1
wIBE
[this work]
Step 2
How to construct IBE
CDH (LWE) LPN Batch Encryption
[DG17] (CDH) [this work] (LPN)
Step 1
wIBE
[this work]
Step 2
IBE
[this work]
Step 3
Batch Encryption
(taking the “chameleon” out of Chameleon Encryption)
Batch Encryption
(taking the “chameleon” out of Chameleon Encryption)
Batch Encryption
(taking the “chameleon” out of Chameleon Encryption)
- Correctness: for all i.
- Security: computationally hidden from Bob.
Batch Encryption
(taking the “chameleon” out of Chameleon Encryption)
- This is Laconic OT [CDGGMP17] without receiver privacy
Batch Encryption
(taking the “chameleon” out of Chameleon Encryption)
- Why is this notion powerful?
- This is Laconic OT [CDGGMP17] without receiver privacy
Batch Encryption
(taking the “chameleon” out of Chameleon Encryption)
- Why is this notion powerful?
- This is Laconic OT [CDGGMP17] without receiver privacy
Batch Encryption
(taking the “chameleon” out of Chameleon Encryption)
- Simple black box construction of Leakage-Resilient and
KDM secure PKE from Batch Encryption
Constructing Batch Encryption
- CDH/Factoring [DG17].
- Hash function is the standard discrete log CRHF.
- Encryption is essentially El-Gamal
- LWE
- Hash function is the standard SIS CRHF.
- Encryption is essentially Dual Regev
- LPN
- CRHF constructed by [BLVW18, YZWGL17]
- Encryption is “an LPN analogue to Dual Regev”
- Requires noise rate (only quasipolynomially secure)
wIBE from Batch Encryption
wIBE from Batch Encryption
- Question: How do you encrypt without the public key?
(can’t store T public keys)
wIBE from Batch Encryption
- Answer: garble the encryption circuit + Batch Encrypt the
labels (“Deferred Encryption Paradigm”)
- Question: How do you encrypt without the public key?
(can’t store T public keys)
wIBE from Batch Encryption
- Answer: garble the encryption circuit + Batch Encrypt the
labels (“Deferred Encryption Paradigm”)
- Question: How do you encrypt without the public key?
(can’t store T public keys)
wIBE from Batch Encryption
- Answer: garble the encryption circuit + Batch Encrypt the
labels (“Deferred Encryption Paradigm”)
- Question: How do you encrypt without the public key?
(can’t store T public keys)
How to construct IBE
IBE wIBE
(non-black-box)
[this work]
Batch Encryption CDH LPN
[DG17] (CDH) [this work] (LPN)
[this work]
+ Garbled PKE
How to construct Anonymous IBE?
AnonIBE wAnonIBE
“Anonymous” Batch Encryption CDH LPN
How to construct Anonymous IBE?
AnonIBE wAnonIBE
“Anonymous” Batch Encryption CDH LPN
NO
Attack on Anonymity
What is the problem?
In some intermediate decryption steps, Adversary has the correct secret keys.
Attack on Anonymity
What is the problem?
In some intermediate decryption steps, Adversary has the correct secret keys.
Attack on Anonymity
What is the problem?
In some intermediate decryption steps, Adversary has the correct secret keys.
Attack on Anonymity
What is the problem?
In some intermediate decryption steps, Adversary has the correct secret keys.
Learns the first two bits of id
Attack on Anonymity
What is the problem?
In some intermediate decryption steps, Adversary has the correct secret keys.
We need a notion of wIBE security that holds even against authorized users.
Learns the first two bits of id
Blind IBE
A notion of security that holds even against authorized users.
To Bob:
Blind IBE
A notion of security that holds even against authorized users.
- Semantic Security, and
To Bob:
Blind IBE
A notion of security that holds even against authorized users.
- Semantic Security, and
Blind IBE
A notion of security that holds even against authorized users.
- Semantic Security, and
For random m
- *
*We actually allow a relaxation of this definition
Blind IBE
A notion of security that holds even against authorized users.
- Semantic Security, and
For random m
- We build Blind IBE from Blind Batch Encryption
- Reminiscent of weak attribute hiding vs. strong attribute hiding for PE
- *
*We actually allow a relaxation of this definition
Tool: Blind Garbled Circuits
We instantiate all uses of garbled circuits when deferring encryption with Blind Garbled Circuits
Tool: Blind Garbled Circuits
We instantiate all uses of garbled circuits when deferring encryption with Blind Garbled Circuits
- You don’t even know if you evaluated a garbled circuit or ‘evaluated’
a random string (if plain circuit output is random)
Tool: Blind Garbled Circuits
We instantiate all uses of garbled circuits when deferring encryption with Blind Garbled Circuits
- First use of this security property of Point-and-Permute GCs
- Can be constructed from OWFs using “Point-and-Permute” garbled
circuits [BMR90]
- You don’t even know if you evaluated a garbled circuit or ‘evaluated’
a random string (if plain circuit output is random)
Constructing Blind IBE
BIBE wBIBE
(non-black-box)
[this work]
Blind Batch Encryption CDH LPN
[this work] (CDH)
[this work]
+ Blind Garbled PKE
Conclusions
Conclusions
- Weakly Compact IBE is an abstraction which tells us exactly
how IBE is different from PKE
Conclusions
- Batch Encryption is powerful, especially when
combined with garbled circuits
- Weakly Compact IBE is an abstraction which tells us exactly
how IBE is different from PKE
Conclusions
- Batch Encryption is powerful, especially when
combined with garbled circuits
- Weakly Compact IBE is an abstraction which tells us exactly
how IBE is different from PKE
- Blindness is an interesting and useful security property which
captures some notion of security against authorized users
Conclusions
- Batch Encryption is powerful, especially when
combined with garbled circuits
Thank you!
- Weakly Compact IBE is an abstraction which tells us exactly
how IBE is different from PKE
- Blindness is an interesting and useful security property which