Concurrently Composable Security With Shielded Super-polynomial - - PowerPoint PPT Presentation

concurrently composable security with shielded super
SMART_READER_LITE
LIVE PREVIEW

Concurrently Composable Security With Shielded Super-polynomial - - PowerPoint PPT Presentation

Concurrently Composable Security With Shielded Super-polynomial Simulators B. Broadnax, N. Dttling, G. Hartung, J. Mller-Quade, and M. Nagel Faculty of Computer Science Institute for Theoretical Informatics Research Group for


slide-1
SLIDE 1

1

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Faculty of Computer Science • Institute for Theoretical Informatics • Research Group for Cryptography and Security

Concurrently Composable Security With Shielded Super-polynomial Simulators

  • B. Broadnax, N. Döttling, G. Hartung, J. Müller-Quade, and M. Nagel

KIT – The Research University in the Helmholtz Association

www.kit.edu

slide-2
SLIDE 2

The UC Framework

A Short Introduction

2

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Security framework for cryptographic protocols (by [Can01]) Follows the simulation-based paradigm Interactive distinguisher Z (“environment”) Z A P1 P2 P3

π

Real Z S P1 P2 P3 F Ideal

slide-3
SLIDE 3

The UC Framework

Pros and Cons

3

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Benefits

UC is closed under general protocol composition: strong concurrent security guarantees modular analysis

Limitations

(e. g. [CF01; Can+02; Lin03; Kat07; LPV09; Dac+13])

Very strong: UC requires setup assumptions for many cryptographic tasks

slide-4
SLIDE 4

Relaxed Notions of UC Security

A Brief Overview

4

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

SPS [Pas03]

F P1 P2 S

Super-poly powers for general tasks

Angel-based [PS04; CLP10]

F P1 P2 S Γ

Super-poly powers for specific tasks

slide-5
SLIDE 5

Relaxed Notions of UC Security

A Brief Overview

4

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

SPS [Pas03]

F P1 P2 S

Super-poly powers for general tasks

Angel-based [PS04; CLP10]

F P1 P2 S Γ

Super-poly powers for specific tasks

Multiple-Ideal Query Security and Input Indistinguishability

Not considered here. See, e. g., [GJO10; Gar+12; GJ13; GGJ13; CGJ15].

slide-6
SLIDE 6

Relaxed Notions of UC Security

Pros and Cons

5

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

SPS

[Pas03; BS05; LPV09; LPV12; Gar+12]

+ Meaningful security notion for many cryptographic tasks + Constant-round general MPC in the plain model based on standard poly-time assumptions – Not closed under general composition

Angel-based Security

[PS04; MMY06; CLP10; LP12; KMO14; Kiy14; Goy+15; HV16]

+ Closed under general composition (wrt. pre-chosen Angel) + Implies SPS security + General MPC in the plain model – No known construction of general MPC protocol that is both constant-round and based on standard poly-time assumptions

slide-7
SLIDE 7

Our Contribution

Relaxed Security Notion

6

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

New Security Notion for Concurrently Composable Security

Lies strictly between SPS and Angel-based Security Compatible with UC security Closed under general protocol composition

Implies concurrent security Modular composition via protocols with “strong composition features”

slide-8
SLIDE 8

Our Contribution

Commitment Scheme with Strong Composition Features

7

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Construction of a commitment scheme that is secure in our framework in the plain model provides strong composition features:

  • 1. Can be plugged into large class of UC-secure protocols
  • 2. Composite protocol is secure in our framework

Two constant-round instantiations: based on OWPs black-box based on homomorphic commitment schemes

slide-9
SLIDE 9

Our Contribution

Constant-round (Black-Box) General MPC in the Plain Model

8

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Feasibility result: General MPC in the plain model in a constant number of rounds based on standard poly-time assumptions Two constructions: non-black-box based on ETDPs Conceptually very different alternative to [Gar+12; LPV12] black-box based on PKE with oblivious public-key generation and homomorphic commitment schemes First one

slide-10
SLIDE 10

Our Contribution

Constant-round (Black-Box) General MPC in the Plain Model

8

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Feasibility result: General MPC in the plain model in a constant number of rounds based on standard poly-time assumptions Two constructions: non-black-box based on ETDPs Conceptually very different alternative to [Gar+12; LPV12] black-box based on PKE with oblivious public-key generation and homomorphic commitment schemes First one First one that is

concurrently secure in the plain model black-box constant-round based on standard poly-time assumptions

slide-11
SLIDE 11

Our Contribution

New Blueprint: Building on Weaker Primitives

9

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Constructions based only on parallel CCA-secure commitment schemes (instead of CCA-secure commitment schemes) Ch Adv E v0, v1 ⟨C(vb), R⟩ b’ b ←$ {0, 1}

Only non-adaptive queries

slide-12
SLIDE 12

Our Approach

Shielding Away Super-Poly Resources

10

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

F P1 P2 S

SPS

Super-poly powers for general tasks

F P1 P2 S Γ

Angel- based

Super-poly powers for specific tasks

F P1 P2 O S F O

Shielded Oracles

Super-poly powers for specific tasks with restricted access

slide-13
SLIDE 13

Augmented Environments

11

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Z F O F O F O F O

. . . . . . . . .

π φ

?

Z may invoke poly many F O

F O

slide-14
SLIDE 14

Augmented Environments

11

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Z F O F O F O F O

. . . . . . . . .

π φ

?

Z may invoke poly many F O

F O

Notation:

π ≥F O φ

slide-15
SLIDE 15

Composition Theorem

12

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Augmented environments imply composition with protocols that may be in the F O-hybrid model. π ≥

F O F O

⇒ ρπ ≥

F O ρ

Composition with protocol ρ

F O

slide-16
SLIDE 16

Polynomial Simulatability

Making F O-augmented environments efficient

13

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Main Technique

Replacing super-polynomial entities by polynomial ones Making F O-augmented environments efficient

Intuition

Shielded Oracles “look like poly” from the outside. F O F O M

Super-poly powers are shielded away Polynomial ITM

slide-17
SLIDE 17

Polynomial Simulatability

Making F O-augmented environments efficient

14

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Z π φ

?

M M F O F O

. . . . . .

Z gains no advantage by shielded oracles

Replace F O by M

Augmented environment

slide-18
SLIDE 18

Polynomial Simulatability

Making F O-augmented environments efficient

15

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Z′ π φ

?

Standard poly-time UC environment

slide-19
SLIDE 19

Secure Commitment Scheme

16

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Goal

Construct a protocol Π such that Π ≥

F O

com

F O

com

for a suitable O.

slide-20
SLIDE 20

Secure Commitment Scheme

17

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Necessary Prerequisites for Π

Hiding can be broken with super-poly powers (extractability) Binding can be broken with super-poly powers (equivocality)

slide-21
SLIDE 21

Secure Commitment Scheme

The Big Picture

18

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

F O

com

Π

⟨C, R⟩

F O

com

Tag-based commitment scheme ⟨C, R⟩ as a building block

slide-22
SLIDE 22

Secure Commitment Scheme

Building Block – Tag-based Commitment Scheme ⟨C, R⟩

19

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Immediately Committing super-poly extractable C R . . .

First message determines value

Parallel-CCA secure Ch Adv E v0, v1 ⟨C(vb), R⟩ b’ b ←$ {0, 1}

Only non-adaptive queries

slide-23
SLIDE 23

Secure Commitment Scheme

The Scheme Π

20

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Extractability (in super-poly time)

. . . follows from the extractability of ⟨C, R⟩.

Equivocality (in super-poly time)

. . . using the transformation of [DS13]: Receiver of Π commits to equivocation trapdoor at the beginning.

slide-24
SLIDE 24

Secure Commitment Scheme

Definition of the Shielded Oracle O

21

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Corrupted Sender

O plays role of honest receiver Fcom O

v Π-messages of corrupted sender Π-messages of honest receiver Extract committed value v

slide-25
SLIDE 25

Secure Commitment Scheme

Definition of the Shielded Oracle O

22

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Corrupted Receiver

O plays role of sender Fcom O

“OK” Π-messages of corrupted receiver Commit to 0 (Can be opened arbitrarily in unveil phase) Extract equivocation trapdoor

slide-26
SLIDE 26

Secure Commitment Scheme

Security Statement

23

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Theorem

If ⟨C, R⟩ is immediately committing and parallel-CCA-secure, then Π ≥

F O

com

F O

com

slide-27
SLIDE 27

Secure Commitment Scheme

Proof Idea – Discrepancy

24

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Let the sender be corrupted. Environment commits to value v but unveils different value w Output of receiver in real model: w Output of receiver in ideal model: v (value extracted by O) Environment can distinguish Z Fcom O

v

“unveil” Π-messages unveiling to w ̸= v v

slide-28
SLIDE 28

Secure Commitment Scheme

Proof Idea – A Possible Attack Strategy

25

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Z O Fcom Π F O

com

?

Challenge Protocol

with corrupted sender

Session

with corrupted receiver

O can equivoke Need some form of non-malleability to prevent attack

slide-29
SLIDE 29

Secure Commitment Scheme

Proof Idea

26

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

To show

Z cannot cause a discrepancy (except with negligible probability)

Proof by contradiction

Assume F O

com-augmented environment can cause a discrepancy:

Make environment efficient

(interacting with only one F O

com-session with a corrupted sender)

Proof that no efficient environment can cause a discrepancy

slide-30
SLIDE 30

Secure Commitment Scheme

Making the Environment Efficient

27

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

“Carefully” replace F O

com-sessions with the real protocol Π in a specific order

Non-uniform reduction to parallel-CCA-security of ⟨C, R⟩ Z Π Π F O

com

F O

com

. . . . . .

Replace F O

com by Π

This talk is too short to contain the proof.

slide-31
SLIDE 31

Modular Composition Theorem for Π

Composing with constant-round UC-secure protocols

28

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

If ⟨C, R⟩ has additional property (“r-non-adaptively robust”) as well as ρFcom constant-round and

ρFcom

Commit Phase Compute Phase

=

then

ρFcom ≥

UC

G ⇒ ∃ shielded oracle O′ : ρΠ ≥

GO′ GO′

slide-32
SLIDE 32

Modular Composition Theorem for Π

Composing with constant-round UC-secure protocols

28

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

If ⟨C, R⟩ has additional property (“r-non-adaptively robust”) as well as ρFcom constant-round and

ρFcom

Commit Phase Compute Phase

=

Any (poly-round) protocol can be compiled into one

  • beying this structure

then

ρFcom ≥

UC

G ⇒ ∃ shielded oracle O′ : ρΠ ≥

GO′ GO′

slide-33
SLIDE 33

Secure Commitment Scheme

Constant-round Instantiations of Π

29

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

⟨C, R⟩ can be instantiated with a modified version of the 8-round protocol in [Goy+14] . . . . . . using OWPs Constant-round protocol based on OWPs. . . . using a verifiable perfectly binding homomorphic commitment scheme Constant-round black-box protocol

Π

⟨C, R⟩ = [Goy+14]

Underlying Commitment

Blum commitment

  • r

verifiable perfectly binding homomorphic commitment

slide-34
SLIDE 34

Modular Composition Theorem for Π

Constant-round Instantiations of Π

30

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Constant-round Instantiations of Π

Πr = instantiation of Π based on OWPs ΠBB

r

= black-box instantiation of Π based on verifiable perfectly binding homomorphic commitment schemes (Instantiated with a r-non-adaptively robust modified version of [Goy+14])

slide-35
SLIDE 35

Constant-round (Black-box) General MPC

31

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

UC-secure Protocol Secure in Our Framework (in the Plain Model)

ρFcom

+

Πr ρΠr

[Can+02; IPS08] Constant-round, based on ETDPs Constant-round, based on ETDPs

slide-36
SLIDE 36

Constant-round (Black-box) General MPC

31

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

UC-secure Protocol Secure in Our Framework (in the Plain Model)

ρFcom

+

Πr ρΠr ρFcom

+

ΠBB

r

ρΠBB

r [Can+02; IPS08] Constant-round, based on ETDPs Constant-round, based on ETDPs [HV15] Constant-round, black-box, based on PKE with oblivious public-key generation Constant-round, black-box, based on cryptographic primitives with polynomial hardness

slide-37
SLIDE 37

The End

Take Away Messages

32

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

New universally composable security framework Secure commitment scheme with modular composition property Constant-round black-box general MPC based on standard assumptions All results based only on parallel-CCA-secure commitments

Thank You

F P1 P2 O S F O

Super-poly powers for specific tasks with restricted access

slide-38
SLIDE 38

Bibliography

33

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

[BS05] Boaz Barak and Amit Sahai. “How to play almost any mental game

  • ver the net – concurrent composition via super-polynomial

simulation.” In: 46st Annual IEEE Symposium on Foundations of Computer Science. FOCS ’05. IEEE. 2005, pp. 543–552. [Can+02] Ran Canetti et al. “Universally Composable Two-party and Multi-party Secure Computation.” In: Proceedings of the 34th Annual ACM Symposium on Theory of Computing. STOC ’02. ACM, 2002,

  • pp. 494–503.

[Can01] Ran Canetti. “Universally Composable Security: A New Paradigm for Cryptographic Protocols.” In: 42th Annual IEEE Symposium on Foundations of Computer Science. FOCS ’01. IEEE. 2001,

  • pp. 136–145.

[CF01] Ran Canetti and Marc Fischlin. “Universally composable commitments.” In: Advances in Cryptology – CRYPTO 2001: 21st Annual International Cryptology Conference, Proceedings. Springer, 2001, pp. 19–40.

slide-39
SLIDE 39

Bibliography (cont.)

34

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

[CGJ15] Ran Canetti, Vipul Goyal, and Abhishek Jain. “Concurrent Secure Computation with Optimal Query Complexity.” In: Advances in Cryptology – CRYPTO 2015: 35th Annual Cryptology Conference,

  • Proceedings. Springer, 2015, pp. 43–62.

[CLP10] Ran Canetti, Huijia Lin, and Rafael Pass. “Adaptive hardness and composable security in the plain model from standard assumptions.” In: 51st Annual IEEE Symposium on Foundations of Computer

  • Science. FOCS ’10. IEEE. 2010, pp. 541–550.

[Dac+13] Dana Dachman-Soled et al. “Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable Commitments.” In: Advances in Cryptology – ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer, 2013, pp. 316–336.

slide-40
SLIDE 40

Bibliography (cont.)

35

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

[DS13] Ivan Damgård and Alessandra Scafuro. “Unconditionally secure and universally composable commitments from physical assumptions.” In: Advances in Cryptology – ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer, 2013, pp. 100–119. [Gar+12] Sanjam Garg et al. “Concurrently Secure Computation in Constant Rounds.” In: Advances in Cryptology – EUROCRYPT 2012: 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer, 2012, pp. 99–116. [GGJ13] Vipul Goyal, Divya Gupta, and Abhishek Jain. “What Information Is Leaked under Concurrent Composition?” In: Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Proceedings. Springer, 2013, pp. 220–238.

slide-41
SLIDE 41

Bibliography (cont.)

36

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

[GJ13] Vipul Goyal and Abhishek Jain. “On Concurrently Secure Computation in the Multiple Ideal Query Model.” In: Advances in Cryptology – EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer, 2013, pp. 684–701. [GJO10] Vipul Goyal, Abhishek Jain, and Rafail Ostrovsky. “Password-Authenticated Session-Key Generation on the Internet in the Plain Model.” In: Advances in Cryptology – CRYPTO 2010: 30th Annual Cryptology Conference, Proceedings. Springer, 2010,

  • pp. 277–294.

[Goy+14] Vipul Goyal et al. “An Algebraic Approach to Non-malleability.” In: 55th Annual IEEE Symposium on Foundations of Computer Science. FOCS ’14. IEEE. 2014, pp. 41–50.

slide-42
SLIDE 42

Bibliography (cont.)

37

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

[Goy+15] Vipul Goyal et al. “Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma.” In: Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015,

  • Proceedings. Springer, 2015, pp. 260–289.

[HV15] Carmit Hazay and Muthuramakrishnan Venkitasubramaniam. “On Black-Box Complexity of Universally Composable Security in the CRS Model.” In: Advances in Cryptology – ASIACRYPT 2015: 21st International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part II. Springer, 2015,

  • pp. 183–209.

[HV16] Carmit Hazay and Muthuramakrishnan Venkitasubramaniam. “Composable Adaptive Secure Protocols without Setup under Polytime Assumptions.” In: Theory of Cryptography: 14th Theory of Cryptography Conference, TCC 2016-B, Proceedings. Printed version not yet published. 2016.

slide-43
SLIDE 43

Bibliography (cont.)

38

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

[IPS08] Yuval Ishai, Manoj Prabhakaran, and Amit Sahai. “Founding Cryptography on Oblivious Transfer – Efficiently.” In: Advances in Cryptology – CRYPTO 2008: 28th Annual International Cryptology Conference, Proceedings. Springer, 2008, pp. 572–591. [Kat07] Jonathan Katz. “Universally Composable Multi-party Computation Using Tamper-Proof Hardware.” In: Advances in Cryptology – EUROCRYPT 2007: 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer, 2007, pp. 115–128. [Kiy14] Susumu Kiyoshima. “Round-Efficient Black-Box Construction of Composable Multi-Party Computation.” In: Advances in Cryptology – CRYPTO 2014: 34th Annual Cryptology Conference, Proceedings. Springer, 2014, pp. 351–368.

slide-44
SLIDE 44

Bibliography (cont.)

39

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

[KMO14] Susumu Kiyoshima, Yoshifumi Manabe, and Tatsuaki Okamoto. “Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol.” In: Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014, Proceedings. Springer, 2014,

  • pp. 343–367.

[Lin03] Yehuda Lindell. “General Composition and Universal Composability in Secure Multi-party Computation.” In: 44th Annual IEEE Symposium

  • n Foundations of Computer Science. FOCS ’03. IEEE. 2003,
  • pp. 394–403.

[LP12] Huijia Lin and Rafael Pass. “Black-Box Constructions of Composable Protocols without Set-Up.” In: Advances in Cryptology – CRYPTO 2012: 32nd Annual Cryptology Conference, Proceedings. Springer, 2012, pp. 461–478.

slide-45
SLIDE 45

Bibliography (cont.)

40

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

[LPV09] Huijia Lin, Rafael Pass, and Muthuramakrishnan Venkitasubramaniam. “A Unified Framework for Concurrent Security: Universal Composability from Stand-alone Non-malleability.” In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing. STOC ’09. ACM, 2009, pp. 179–188. [LPV12] Huijia Lin, Rafael Pass, and Muthuramakrishnan Venkitasubramaniam. “A Unified Framework for UC from Only OT.” In: Advances in Cryptology – ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security,

  • Proceedings. Springer, 2012, pp. 699–717.

[MMY06] Tal Malkin, Ryan Moriarty, and Nikolai Yakovenko. “Generalized Environmental Security from Number Theoretic Assumptions.” In: Theory of Cryptography: 3rd Theory of Cryptography Conference, TCC 2006, Proceedings. Springer, 2006, pp. 343–359.

slide-46
SLIDE 46

Bibliography (cont.)

41

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

[Pas03] Rafael Pass. “Simulation in Quasi-Polynomial Time, and Its Application to Protocol Composition.” In: Advances in Cryptology – EUROCRYPT 2003: 22nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer, 2003, pp. 160–176. [PS04] Manoj Prabhakaran and Amit Sahai. “New Notions of Security: Achieving Universal Composability Without Trusted Setup.” In: Proceedings of the 36th Annual ACM Symposium on Theory of

  • Computing. STOC ’04. ACM, 2004, pp. 242–251.
slide-47
SLIDE 47

42

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Appendix

slide-48
SLIDE 48

Constant-round Commitment Scheme

The Scheme Π (Reminiscent of [DS13])

43

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Commit Phase

C R Input v ∈ {0, 1} I ←$ {0, 1}n ⟨C(I), R⟩ Compute shares: si,0 ←$ {0, 1}, i ∈ [n] si,1 := si,0 ⊕ v, i ∈ [n] ⟨C(si,b), R⟩

  • i ∈ [n], b ∈ {0, 1}
slide-49
SLIDE 49

Constant-round Commitment Scheme

The Scheme Π

44

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Unveil Phase

C R si,b

  • i ∈ [n], b ∈ {0, 1}
  • Check

s1,0 ⊕ s1,1 = . . . = sn,0 ⊕ sn,1, else abort Unveil(I) Unveil(si,Ii )

  • i ∈ [n]
  • If unveil valid, output

w = s1,0 ⊕ s1,1

slide-50
SLIDE 50

Constant-round Commitment Scheme

The Scheme Π

45

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Equivocation Trapdoor Index set I serves as trapdoor

C R Compute “fake shares”: ti,Ii := si,Ii , i ∈ [n] ti,¬Ii := si,¬Ii ⊕ 1, i ∈ [n] ti,b

  • i ∈ [n], b ∈ {0, 1}
  • Check . . .

Unveil(I) Unveil(ti,Ii )

  • i ∈ [n]
  • If unveil valid, output

w = t1,0 ⊕ t1,1 = v ⊕ 1

slide-51
SLIDE 51

Constant-round Commitment Scheme

Definition of the Shielded Oracle O

46

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Corrupted Sender

Fcom O

  • 1. Extract si,b
  • 2. vi := si,0 ⊕ si,1
  • 3. Send most frequent vi, if unique.

Otherwise send 0.

⟨C(I), R⟩ ⟨C(si,b), R⟩

slide-52
SLIDE 52

Constant-round Commitment Scheme

Definition of the Shielded Oracle O

47

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Corrupted Receiver

Fcom O “OK” ⟨C(I), R⟩

In commit phase:

  • 1. Extract I
  • 2. Commit to shares of 0

In unveil phase: If v = 0 send real shares,

  • therwise send fake shares
slide-53
SLIDE 53

Constant-round Commitment Scheme

Proof Idea – Discrepancy

48

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Let the sender be corrupted. Z Π ⟨C(si,b), R⟩

“OK”

Z Fcom O

v

v ⟨C(si,b), R⟩ “OK”

Commit Phase Real Ideal

slide-54
SLIDE 54

Constant-round Commitment Scheme

Proof Idea – Discrepancy

48

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Let the sender be corrupted. Z Π

ti,Ii = si,Ii ti,¬Ii = si,¬Ii ⊕ 1 w = v ⊕ 1

Z Fcom O

v

“unveil” ti,Ii = si,Ii ti,¬Ii = si,¬Ii ⊕ 1

v

Unveil Phase Real Ideal

w ̸= v

slide-55
SLIDE 55

Constant-round Commitment Scheme

Proof Idea

49

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

  • W. l. o. g.: Consider at most one F O

com with a corrupted sender

Iteratively replace all F O

com with a corrupted receiver by Π,

starting with the last session F O

com

F O

com

F O

com

F O

com

Π Π

. . . . . .

Corrupted Receiver Corrupted Receiver Corrupted Sender Corrupted Receiver Corrupted Receiver Corrupted Receiver

Z Replacement

Order by first message

slide-56
SLIDE 56

Constant-round Commitment Scheme

Proof Idea

50

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Non-uniform reduction to parallel-CCA security of ⟨C, R⟩ F O

com

F O

com

F O

com

Π/F O

com

Π Π

. . . . . .

Corrupted Receiver Corrupted Receiver Corrupted Sender Corrupted Receiver Challenge Corrupted Receiver Corrupted Receiver

Replacement

Order by first message

Advice

includes equivocation information for corrupted receivers and possibly extraction information for corrupted sender

pCCA-oracle required for corrupted sender session

slide-57
SLIDE 57

Modular Composition Theorem for Π

51

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Next Goal

Want to plug Π into UC-secure protocols Composite protocol secure in our framework Allows to re-use existing UC results

slide-58
SLIDE 58

Modular Composition Theorem for Π

Commit-Compute Protocols

52

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

ρFcom

Commit Phase Compute Phase

=

Any (poly-round) protocol can be compiled into one obeying this structure

(using randomized commitments)

slide-59
SLIDE 59

Modular Composition Theorem for Π

The Theorem

53

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Let ρFcom be a commit-compute protocol and Π as before. ρFcom

UC-environment has non-adaptive access to the decommitment oracle E of ⟨C, R⟩

E-pCCA

G ⇒ ∃ shielded oracle O′ : ρΠ ≥

GO′ GO′

This talk is too short to contain the proof.

slide-60
SLIDE 60

Modular Composition Theorem for Π

Composing with any constant-round UC-secure protocol

54

May 1st, 2017

  • B. Broadnax - Concurrently Composable Security With Shielded Super-polynomial Simulators

Faculty of Computer Science Institute for Theoretical Informatics Research Group for Cryptography and Security

Given any constant-round ρFcom ≥UC G. Compile ρFcom Additionally require ⟨C, R⟩ to be r-non-adaptively robust

(for sufficiently large r)

ρFcom/G Z E ρFcom/G Z′

Only non-adaptive queries

constant-round ITM constant-round ITM