computations on encrypted data for the cloud
play

Computations on Encrypted Data for the Cloud David Pointcheval - PowerPoint PPT Presentation

Computations on Encrypted Data for the Cloud David Pointcheval CNRS - ENS - INRIA Secure Cloud Services and Storage Workshop Oslo, Norway - September 10th, 2017 The Cloud David Pointcheval Introduction 2 / 17 Anything from Anywhere One


  1. Computations on Encrypted Data for the Cloud David Pointcheval CNRS - ENS - INRIA Secure Cloud Services and Storage Workshop Oslo, Norway - September 10th, 2017

  2. The Cloud David Pointcheval Introduction 2 / 17

  3. Anything from Anywhere One can store Documents to share Pictures to edit Databases to query and access from everywhere David Pointcheval Introduction 3 / 17

  4. Security Requirements As from a local hard drive/server, one expects Storage guarantees Privacy guarantees confidentiality of the data anonymity of the users obliviousness of the queries/processing How to proceed? David Pointcheval Introduction 4 / 17

  5. Confidentiality vs Sharing & Computations Classical Encryption allows to protect data the provider stores them without knowing them nobody can access them either, except the owner How to share the data? How to compute on the data? David Pointcheval Some Approaches 5 / 17

  6. Broadcast Encryption [Fiat-Naor - Crypto ‘94] No computations! The sender chooses a target set Users get all-or-nothing about the data David Pointcheval Some Approaches 6 / 17

  7. Fully Homomorphic Encryption [Rivest-Adleman-Dertouzos - FOCS ’78] [Gentry - STOC ’09] FHE allows any computations on encrypted data But the result is encrypted as the inputs! No sharing! AND ENOT OR EOR EAND NOT Encrypted Encrypted Inputs Circuit Outputs Circuit NOT ENOT Inputs Outputs AND EOR OR EAND David Pointcheval Some Approaches 7 / 17

  8. Functional Encryption [Boneh-Sahai-Waters - TCC ‘11] Result in clear The authority generates functional decryption keys DK f 
 according to functions f From C = Encrypt ( x ) , Decrypt ( DK f, C ) outputs f ( x ) This allows controlled sharing of data David Pointcheval Functional Encryption 8 / 17

  9. Functional Encryption is Powerful Functional Encryption allows access control: with f id ( x || y ) = ( if y = id, then x , else ⊥ ): identity-based encryption with f G ( x || y ) = ( if y ∈ G, then x , else ⊥ ): broadcast encryption Functional Encryption allows computations: any function f : in theory, with iO (Indistinguishable Obfuscation) concrete functions: inner product David Pointcheval Functional Encryption 9 / 17

  10. FE: Concrete Case English CS Math Student English CS Math Student English CS Math Student English CS Math Student Name Written Spoken Theory Practice Algebra Analysis Name Written Spoken Theory Practice Algebra Analysis Name Written Spoken Theory Practice Algebra Analysis Name Written Spoken Theory Practice Algebra Analysis Year 1 Year 1 Year 1 Year 1 Year 2 Year 2 Year 2 Year 2 Year 3 Year 3 Year 3 Year 3 Name English CS Math Name Total English CS Math Name English CS Math Name Avg Name Total Student English CS Math Class English CS Math Class Total Name English CS Math Name Avg Name Avg English CS Math Student English CS Math Year 1 Year 1 Name English CS Math Name Name Avg Class Name Total Avg Student English CS Math Year 1 Year 1 Name Written Spoken Theory Practice Algebra Analysis Class Name Avg Student Year 1 Year 1 Year 1 Year 1 Name Written Spoken Theory Practice Algebra Analysis Year 2 Year 2 Year 1 Year 1 Name Written Spoken Theory Practice Algebra Analysis Written Spoken Theory Practice Algebra Analysis Year 2 Year 2 3Years Written Spoken Theory Practice Algebra Analysis Year 2 Year 2 Year 2 Year 2 Total 3Years Year 3 Year 3 Year 2 Year 2 Avg 3Years 3Years Year 3 Year 3 Total Avg 3Years Year 3 Year 3 Year 3 Year 3 Avg Year 3 Year 3 For each student: transcript with all the grades Access to partial information for each student And even global grades for the class David Pointcheval Functional Encryption 10 / 17

  11. FE: Inner Product [Abdalla-Bourse-De Caro-P. - PKC ’15 - EPrint 2015/017] Cells of derived tables are linear combinations 
 of the grades from the main table: a i · − → � a i,j b j = − → c i = b j − → : vector of the private grades, encrypted in the main table b − → : vector of the public coefficients for the cell c i , defines f i a i With ElGamal encryption: computations modulo p if grades, coefficients, and classes small enough: DLog computation David Pointcheval Inner-Product Functional Encryption 11 / 17

  12. FE: Limitations Initial result: selective security [Abdalla-Bourse-De Caro-P. - PKC ’15 - EPrint 2015/017] But improved to adaptive security [Agrawal-Libert-Stehlé - Crypto ’16 - EPrint 2015/608] Anyway: 🙃 one key limits to one function on any vector a malicious player could ask many functional keys 😟 too many keys reveal the plaintexts… 😟 a unique sender can encrypt a vector 🙃 Multi-Input Functional Encryption (MIFE) [Goldwasser-Gordon-Goyal-Jain-Katz-Liu-Sahai-Shi-Zhou - Eurocrypt ’14 - EPrint 2013/727 - EPrint 2013/774] David Pointcheval Inner-Product Functional Encryption 12 / 17

  13. IP-FE: Concrete Security? IP-FE : from c = E ( x ) and dk y , for n -vectors x and y , one gets x . y 😟 n different keys reveal x for the indistinguishability between two sets of vectors, 
 the adversary is not allowed to ask keys that trivially tell them appart. 
 ⇒ if n vectors in the sets, the adversary cannot ask any key! 😟 IP-MIFE : from c 1 = E ( x 1 ), …, c n = E ( x n ) and dk y , one gets x . y 😟 if no ordering: one immediately gets n ! linear relations on x 😟 even with ordering, if public-key encryption: mix-and-match attack David Pointcheval Inner-Product Functional Encryption 13 / 17

  14. IP-FE: Too Many Messages/Keys? IP-FE with Helper: [Dupont-P. - AsiaCCS ’17] from c = E ( x ) and dk y , for n -vectors x and y , one must ask an helper the helper learns as few as possible about the input 
 (possibly the ciphertext, the function, the user, etc) limits the number of answers (according to a bound on the inputs) learns nothing about the output whereas there are additional interactions no much leakage of information to the helper 🙃 more reasonable security model David Pointcheval Improvements 14 / 17

  15. IP-MIFE: Mix-and-Match Attacks? IP-MCFE 
 [Chotard-Phan-P. - Work in progress] Multi-Client Functional Encryption with Private Encryption: Senders have secret encryption keys ek i 
 to generate c i = E ( i , 𝛍 , x i ) for a label 𝛍 From c 1 , …, c n , for the same label 𝛍 , and sk y , one gets x . y Multi-User Inputs Mix-and-match attacks avoided by private encryption 🙃 More reasonable security model David Pointcheval Improvements 15 / 17

  16. FE: More Applications The Graal in Privacy: Machine Learning on Encrypted Data One has access to a HUGE encrypted labeled training data Functional Encryption outputs the prediction function in clear No information leaked about the training data? No more than in the prediction function… 
 but the latter may leak a lot about training data 
 with model inversion attacks 
 [Fredrickson-Lantz-Jha-Lin-Page-Ristenpart - Usenix Security ’14] even just from black-box prediction queries! David Pointcheval Improvements 16 / 17

  17. Conclusion Functional Encryption Ideal functionalities on encrypted data But unlimited access In practice The ideal functionality leaks a lot! Queries should remain under some control Or answers should be noisy (differential privacy) David Pointcheval 17 / 17

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend