Constant-Rate Oblivious Transfer from Noisy Channels Yuval I shai - - PowerPoint PPT Presentation

constant rate oblivious transfer from noisy channels
SMART_READER_LITE
LIVE PREVIEW

Constant-Rate Oblivious Transfer from Noisy Channels Yuval I shai - - PowerPoint PPT Presentation

Constant-Rate Oblivious Transfer from Noisy Channels Yuval I shai Eyal K ushilevitz Rafail O strovsky Manoj P rabhakaran Amit S ahai Jrg W ullschleger Tuesday, August 23, 2011 Constant-Rate Oblivious Transfer from Noisy Channels Yuval I shai


slide-1
SLIDE 1

Constant-Rate Oblivious Transfer from Noisy Channels

Yuval Ishai Eyal Kushilevitz Rafail Ostrovsky Manoj Prabhakaran Amit Sahai Jürg Wullschleger

Tuesday, August 23, 2011

slide-2
SLIDE 2

Constant-Rate Oblivious Transfer from Noisy Channels

Yuval Ishai Eyal Kushilevitz Rafail Ostrovsky Manoj Prabhakaran Amit Sahai Jürg Wullschleger

Tuesday, August 23, 2011

slide-3
SLIDE 3

Noisy Channel & Crypto

Tuesday, August 23, 2011

slide-4
SLIDE 4

Noisy Channel & Crypto

From our point of view, an ideal communication line is a sterile, cryptographically uninteresting entity. Noise,

  • n the other hand, breeds disorder,

uncertainty, and confusion. Thus, it is the cryptographer’s natural ally. Claude Crépeau & Joe Kilian, 1988.

Tuesday, August 23, 2011

slide-5
SLIDE 5

Noisy Channel & Crypto

Tuesday, August 23, 2011

slide-6
SLIDE 6

Noisy Channel & Crypto

  • Wyner’s wire-tap channel: information-theoretically

secret communication, without shared keys [W’75]

Tuesday, August 23, 2011

slide-7
SLIDE 7

Noisy Channel & Crypto

  • Wyner’s wire-tap channel: information-theoretically

secret communication, without shared keys [W’75]

  • Oblivious Transfer from noisy channel [CK’88]

Tuesday, August 23, 2011

slide-8
SLIDE 8

Noisy Channel & Crypto

  • Wyner’s wire-tap channel: information-theoretically

secret communication, without shared keys [W’75]

  • Oblivious Transfer from noisy channel [CK’88]

X0,X1 b Xb

OT

[R’81,W’83]

Tuesday, August 23, 2011

slide-9
SLIDE 9

Noisy Channel & Crypto

  • Wyner’s wire-tap channel: information-theoretically

secret communication, without shared keys [W’75]

  • Oblivious Transfer from noisy channel [CK’88]

X0,X1 b Xb

OT

X X⊕b

BSC

[R’81,W’83]

Tuesday, August 23, 2011

slide-10
SLIDE 10

Noisy Channel & Crypto

  • Wyner’s wire-tap channel: information-theoretically

secret communication, without shared keys [W’75]

  • Oblivious Transfer from noisy channel [CK’88]
  • OT is complete for secure computation [K’88]

X0,X1 b Xb

OT

X X⊕b

BSC

[R’81,W’83]

Tuesday, August 23, 2011

slide-11
SLIDE 11

Constant Rate

Tuesday, August 23, 2011

slide-12
SLIDE 12

Constant Rate

  • cf. Shannon’s Channel Coding Theorem: O(1) many uses of

BSC per bit of communication

Tuesday, August 23, 2011

slide-13
SLIDE 13

Constant Rate

  • cf. Shannon’s Channel Coding Theorem: O(1) many uses of

BSC per bit of communication

  • How many uses of BSC per OT instance?

Tuesday, August 23, 2011

slide-14
SLIDE 14

Constant Rate

  • cf. Shannon’s Channel Coding Theorem: O(1) many uses of

BSC per bit of communication

  • How many uses of BSC per OT instance?
  • [CK’88] O(k11) to get a security error of 2-k

Tuesday, August 23, 2011

slide-15
SLIDE 15

Constant Rate

  • cf. Shannon’s Channel Coding Theorem: O(1) many uses of

BSC per bit of communication

  • How many uses of BSC per OT instance?
  • [CK’88] O(k11) to get a security error of 2-k
  • [C’97] O(k3)

Tuesday, August 23, 2011

slide-16
SLIDE 16

Constant Rate

  • cf. Shannon’s Channel Coding Theorem: O(1) many uses of

BSC per bit of communication

  • How many uses of BSC per OT instance?
  • [CK’88] O(k11) to get a security error of 2-k
  • [C’97] O(k3)
  • [CMW’04] O(k2+ε)

Tuesday, August 23, 2011

slide-17
SLIDE 17

Constant Rate

  • cf. Shannon’s Channel Coding Theorem: O(1) many uses of

BSC per bit of communication

  • How many uses of BSC per OT instance?
  • [CK’88] O(k11) to get a security error of 2-k
  • [C’97] O(k3)
  • [CMW’04] O(k2+ε)
  • [HIKN’08] O(1) for semi-honest security

Tuesday, August 23, 2011

slide-18
SLIDE 18

Constant Rate

  • cf. Shannon’s Channel Coding Theorem: O(1) many uses of

BSC per bit of communication

  • How many uses of BSC per OT instance?
  • [CK’88] O(k11) to get a security error of 2-k
  • [C’97] O(k3)
  • [CMW’04] O(k2+ε)
  • [HIKN’08] O(1) for semi-honest security
  • Goal: To get O(1) (Can’t do better even given free noiseless

channels [WW’10])

Tuesday, August 23, 2011

slide-19
SLIDE 19

Constant Rate

  • cf. Shannon’s Channel Coding Theorem: O(1) many uses of

BSC per bit of communication

  • How many uses of BSC per OT instance?
  • [CK’88] O(k11) to get a security error of 2-k
  • [C’97] O(k3)
  • [CMW’04] O(k2+ε)
  • [HIKN’08] O(1) for semi-honest security
  • Goal: To get O(1) (Can’t do better even given free noiseless

channels [WW’10])

  • r more general noisy channels

Tuesday, August 23, 2011

slide-20
SLIDE 20

Overview

Tuesday, August 23, 2011

slide-21
SLIDE 21

Overview

  • Plan: use IPS construction [IPS’08] to compile a semi-

honest secure “inner protocol” and an honest-majority secure “outer protocol” using a few string-OTs

Tuesday, August 23, 2011

slide-22
SLIDE 22

Overview

  • Plan: use IPS construction [IPS’08] to compile a semi-

honest secure “inner protocol” and an honest-majority secure “outer protocol” using a few string-OTs

  • A modified compiler so that the inner-protocol can

use noisy channels. Requires inner protocol to be “error tolerant”

Tuesday, August 23, 2011

slide-23
SLIDE 23

Overview

  • Plan: use IPS construction [IPS’08] to compile a semi-

honest secure “inner protocol” and an honest-majority secure “outer protocol” using a few string-OTs

  • A modified compiler so that the inner-protocol can

use noisy channels. Requires inner protocol to be “error tolerant”

Harder to detect cheating in inner- protocol (by partial oblivious monitoring), as there is a noisy channel involved. Will require the inner-protocol to be secure against active corruption

  • f a small fraction
  • f channel instances

Tuesday, August 23, 2011

slide-24
SLIDE 24

Overview

  • Plan: use IPS construction [IPS’08] to compile a semi-

honest secure “inner protocol” and an honest-majority secure “outer protocol” using a few string-OTs

  • A modified compiler so that the inner-protocol can

use noisy channels. Requires inner protocol to be “error tolerant”

  • Constant-rate inner and outer protocols from

literature [GMW’87+HIKN’08,DI’06+CC’06]

Harder to detect cheating in inner- protocol (by partial oblivious monitoring), as there is a noisy channel involved. Will require the inner-protocol to be secure against active corruption

  • f a small fraction
  • f channel instances

Tuesday, August 23, 2011

slide-25
SLIDE 25

Overview

  • Plan: use IPS construction [IPS’08] to compile a semi-

honest secure “inner protocol” and an honest-majority secure “outer protocol” using a few string-OTs

  • A modified compiler so that the inner-protocol can

use noisy channels. Requires inner protocol to be “error tolerant”

  • Constant-rate inner and outer protocols from

literature [GMW’87+HIKN’08,DI’06+CC’06]

  • A constant-rate construction for string-OT from

noisy channel

Harder to detect cheating in inner- protocol (by partial oblivious monitoring), as there is a noisy channel involved. Will require the inner-protocol to be secure against active corruption

  • f a small fraction
  • f channel instances

Tuesday, August 23, 2011

slide-26
SLIDE 26

String-OT

Tuesday, August 23, 2011

slide-27
SLIDE 27

String-OT

  • t-bit string-OT with O(t)+poly(k) communication (over a noisy

channel)

Tuesday, August 23, 2011

slide-28
SLIDE 28

String-OT

  • t-bit string-OT with O(t)+poly(k) communication (over a noisy

channel)

Previously, known from OT

  • like and erasure channels [BCW’03,IMN’06]

Tuesday, August 23, 2011

slide-29
SLIDE 29

String-OT

  • t-bit string-OT with O(t)+poly(k) communication (over a noisy

channel)

  • Can use current constructions with a constant security

parameter to get “fuzzy” OT: i.e., with constant security error

Previously, known from OT

  • like and erasure channels [BCW’03,IMN’06]

Tuesday, August 23, 2011

slide-30
SLIDE 30

String-OT

  • t-bit string-OT with O(t)+poly(k) communication (over a noisy

channel)

  • Can use current constructions with a constant security

parameter to get “fuzzy” OT: i.e., with constant security error

  • Challenge: change constant security error to negligible error

Previously, known from OT

  • like and erasure channels [BCW’03,IMN’06]

Tuesday, August 23, 2011

slide-31
SLIDE 31

String-OT

  • t-bit string-OT with O(t)+poly(k) communication (over a noisy

channel)

  • Can use current constructions with a constant security

parameter to get “fuzzy” OT: i.e., with constant security error

  • Challenge: change constant security error to negligible error
  • String-OT from fuzzy OT (or fuzzy OLE, in fact)

Previously, known from OT

  • like and erasure channels [BCW’03,IMN’06]

Tuesday, August 23, 2011

slide-32
SLIDE 32

String-OT

  • t-bit string-OT with O(t)+poly(k) communication (over a noisy

channel)

  • Can use current constructions with a constant security

parameter to get “fuzzy” OT: i.e., with constant security error

  • Challenge: change constant security error to negligible error
  • String-OT from fuzzy OT (or fuzzy OLE, in fact)

A,C B AB+C

OLE

Previously, known from OT

  • like and erasure channels [BCW’03,IMN’06]

Tuesday, August 23, 2011

slide-33
SLIDE 33

String-OT

  • t-bit string-OT with O(t)+poly(k) communication (over a noisy

channel)

  • Can use current constructions with a constant security

parameter to get “fuzzy” OT: i.e., with constant security error

  • Challenge: change constant security error to negligible error
  • String-OT from fuzzy OT (or fuzzy OLE, in fact)
  • First, reinterpret fuzzy OLE as a perfect “shaky” OLE

A,C B AB+C

OLE

Previously, known from OT

  • like and erasure channels [BCW’03,IMN’06]

Tuesday, August 23, 2011

slide-34
SLIDE 34

String-OT

  • t-bit string-OT with O(t)+poly(k) communication (over a noisy

channel)

  • Can use current constructions with a constant security

parameter to get “fuzzy” OT: i.e., with constant security error

  • Challenge: change constant security error to negligible error
  • String-OT from fuzzy OT (or fuzzy OLE, in fact)
  • First, reinterpret fuzzy OLE as a perfect “shaky” OLE
  • Next, use shaky OLE to get string-OT

A,C B AB+C

OLE

Previously, known from OT

  • like and erasure channels [BCW’03,IMN’06]

Tuesday, August 23, 2011

slide-35
SLIDE 35

Fuzzy and Shaky

Tuesday, August 23, 2011

slide-36
SLIDE 36

Fuzzy and Shaky

  • Fuzzy protocol: realizes F with a constant security error ε

(statistical distance between ideal and real executions)

Tuesday, August 23, 2011

slide-37
SLIDE 37

Fuzzy and Shaky

  • Fuzzy protocol: realizes F with a constant security error ε

(statistical distance between ideal and real executions)

  • Shaky functionality: F((σ)) flips a σ-biased coin, and if heads, then

works as F, else (w/ prob σ) surrenders to the adversary

Tuesday, August 23, 2011

slide-38
SLIDE 38

Fuzzy and Shaky

  • Fuzzy protocol: realizes F with a constant security error ε

(statistical distance between ideal and real executions)

  • Shaky functionality: F((σ)) flips a σ-biased coin, and if heads, then

works as F, else (w/ prob σ) surrenders to the adversary

  • Theorem

An ε-fuzzy protocol for F is a perfectly secure protocol for F((σ))

Tuesday, August 23, 2011

slide-39
SLIDE 39

Fuzzy and Shaky

  • Fuzzy protocol: realizes F with a constant security error ε

(statistical distance between ideal and real executions)

  • Shaky functionality: F((σ)) flips a σ-biased coin, and if heads, then

works as F, else (w/ prob σ) surrenders to the adversary

  • Theorem

An ε-fuzzy protocol for F is a perfectly secure protocol for F((σ))

σ = #rounds.|X||Y|ε

Tuesday, August 23, 2011

slide-40
SLIDE 40

Fuzzy and Shaky

  • Fuzzy protocol: realizes F with a constant security error ε

(statistical distance between ideal and real executions)

  • Shaky functionality: F((σ)) flips a σ-biased coin, and if heads, then

works as F, else (w/ prob σ) surrenders to the adversary

  • Theorem

An ε-fuzzy protocol for F is a perfectly secure protocol for F((σ))

  • As a composition theorem: Running n copies of an ε-fuzzy

protocol gives about (1-σ)n good copies of F (randomly chosen)

σ = #rounds.|X||Y|ε

Tuesday, August 23, 2011

slide-41
SLIDE 41

Fuzzy to Shaky

Tuesday, August 23, 2011

slide-42
SLIDE 42

Fuzzy to Shaky

  • “Statistical security to Perfect security”

Tuesday, August 23, 2011

slide-43
SLIDE 43

Fuzzy to Shaky

  • “Statistical security to Perfect security”
  • Works for UC-security (as well as standalone security)

Tuesday, August 23, 2011

slide-44
SLIDE 44

Fuzzy to Shaky

  • “Statistical security to Perfect security”
  • Works for UC-security (as well as standalone security)
  • Given a simulator for F with error ε, build a perfect

simulator for F((σ))

S

F x y fA ( x , y ) fB ( x , y )

Tuesday, August 23, 2011

slide-45
SLIDE 45

Fuzzy to Shaky

  • “Statistical security to Perfect security”
  • Works for UC-security (as well as standalone security)
  • Given a simulator for F with error ε, build a perfect

simulator for F((σ))

S

F x y fA ( x , y ) fB ( x , y )

S*

F((σ)) x y fA ( x , y ) fB ( x , y )

Tuesday, August 23, 2011

slide-46
SLIDE 46

Fuzzy→Shaky: Example

Tuesday, August 23, 2011

slide-47
SLIDE 47

Fuzzy→Shaky: Example

  • A degenerate functionality F

Tuesday, August 23, 2011

slide-48
SLIDE 48

Fuzzy→Shaky: Example

  • A degenerate functionality F
  • Takes a bit from Bob as input; no output

Tuesday, August 23, 2011

slide-49
SLIDE 49

Fuzzy→Shaky: Example

  • A degenerate functionality F
  • Takes a bit from Bob as input; no output
  • A fuzzy protocol: With probability ½

Bob sends his input to Alice, else ⊥

y=1 y=0 1

1

½ ½ ½ ½

Tuesday, August 23, 2011

slide-50
SLIDE 50

Fuzzy→Shaky: Example

  • A degenerate functionality F
  • Takes a bit from Bob as input; no output
  • A fuzzy protocol: With probability ½

Bob sends his input to Alice, else ⊥

  • For corrupt Alice, simulator in the

ideal F execution sends ⊥ with probability ½, and else a random bit

y=1 y=0 1

1

½ ½ ½ ½

Tuesday, August 23, 2011

slide-51
SLIDE 51

Fuzzy→Shaky: Example

  • A degenerate functionality F
  • Takes a bit from Bob as input; no output
  • A fuzzy protocol: With probability ½

Bob sends his input to Alice, else ⊥

  • For corrupt Alice, simulator in the

ideal F execution sends ⊥ with probability ½, and else a random bit

y=1 y=0 1

1

½ ½ ½ ½

Tuesday, August 23, 2011

slide-52
SLIDE 52

Fuzzy→Shaky: Example

  • A degenerate functionality F
  • Takes a bit from Bob as input; no output
  • A fuzzy protocol: With probability ½

Bob sends his input to Alice, else ⊥

  • For corrupt Alice, simulator in the

ideal F execution sends ⊥ with probability ½, and else a random bit

¼ ½

¼

1 y=1 y=0 1

1

½ ½ ½ ½

Tuesday, August 23, 2011

slide-53
SLIDE 53

Fuzzy→Shaky: Example

  • A degenerate functionality F
  • Takes a bit from Bob as input; no output
  • A fuzzy protocol: With probability ½

Bob sends his input to Alice, else ⊥

  • For corrupt Alice, simulator in the

ideal F execution sends ⊥ with probability ½, and else a random bit

¼ ½

¼

1

½ ¼

¼

1 y=1 y=0 1

1

½ ½ ½ ½

Tuesday, August 23, 2011

slide-54
SLIDE 54

Fuzzy→Shaky: Example

  • A degenerate functionality F
  • Takes a bit from Bob as input; no output
  • A fuzzy protocol: With probability ½

Bob sends his input to Alice, else ⊥

  • For corrupt Alice, simulator in the

ideal F execution sends ⊥ with probability ½, and else a random bit

  • Simulation error = ¼

¼ ½

¼

1

½ ¼

¼

1 y=1 y=0 1

1

½ ½ ½ ½

Tuesday, August 23, 2011

slide-55
SLIDE 55

y=1 y=0 1

1

½ ½ ½ ½ ¼ ½

¼

1

½ ¼

¼

1

Fuzzy→Shaky: Example

Tuesday, August 23, 2011

slide-56
SLIDE 56
  • Simulator for F((1/2)) in two parts:

y=1 y=0 1

1

½ ½ ½ ½ ¼ ½

¼

1

½ ¼

¼

1

Fuzzy→Shaky: Example

Tuesday, August 23, 2011

slide-57
SLIDE 57
  • Simulator for F((1/2)) in two parts:
  • A part “dominated” both by the

protocol and the given simulation

y=1 y=0 1

1

½ ½ ½ ½ ¼ ½

¼

1

½ ¼

¼

1

Fuzzy→Shaky: Example

Tuesday, August 23, 2011

slide-58
SLIDE 58
  • Simulator for F((1/2)) in two parts:
  • A part “dominated” both by the

protocol and the given simulation

½

1

½

1 y=1 y=0 1

1

½ ½ ½ ½ ¼ ½

¼

1

½ ¼

¼

1

Fuzzy→Shaky: Example

Tuesday, August 23, 2011

slide-59
SLIDE 59
  • Simulator for F((1/2)) in two parts:
  • A part “dominated” both by the

protocol and the given simulation

½

1

½

1

When F

((1/2))

doesn’t fail

y=1 y=0 1

1

½ ½ ½ ½ ¼ ½

¼

1

½ ¼

¼

1

Fuzzy→Shaky: Example

Tuesday, August 23, 2011

slide-60
SLIDE 60
  • Simulator for F((1/2)) in two parts:
  • A part “dominated” both by the

protocol and the given simulation

  • The “remainder” to make it perfect

½

1

½

1

When F

((1/2))

doesn’t fail

y=1 y=0 1

1

½ ½ ½ ½ ¼ ½

¼

1

½ ¼

¼

1

Fuzzy→Shaky: Example

Tuesday, August 23, 2011

slide-61
SLIDE 61
  • Simulator for F((1/2)) in two parts:
  • A part “dominated” both by the

protocol and the given simulation

  • The “remainder” to make it perfect

½

1

½

1

½ ½

When F

((1/2))

doesn’t fail

y=1 y=0 1

1

½ ½ ½ ½ ¼ ½

¼

1

½ ¼

¼

1

Fuzzy→Shaky: Example

Tuesday, August 23, 2011

slide-62
SLIDE 62
  • Simulator for F((1/2)) in two parts:
  • A part “dominated” both by the

protocol and the given simulation

  • The “remainder” to make it perfect

½

1

½

1

½ ½

When F

((1/2))

doesn’t fail When it fails

y=1 y=0 1

1

½ ½ ½ ½ ¼ ½

¼

1

½ ¼

¼

1

Fuzzy→Shaky: Example

Tuesday, August 23, 2011

slide-63
SLIDE 63

Fuzzy to Shaky

Tuesday, August 23, 2011

slide-64
SLIDE 64

Fuzzy to Shaky

  • Much more complicated when Alice has an input or output

Tuesday, August 23, 2011

slide-65
SLIDE 65

Fuzzy to Shaky

  • Much more complicated when Alice has an input or output
  • Theorem

An ε-fuzzy protocol for F is a perfectly secure protocol for F((σ))

Tuesday, August 23, 2011

slide-66
SLIDE 66

Fuzzy to Shaky

  • Much more complicated when Alice has an input or output
  • Theorem

An ε-fuzzy protocol for F is a perfectly secure protocol for F((σ))

σ = #rounds.|X||Y|ε

Tuesday, August 23, 2011

slide-67
SLIDE 67

Fuzzy to Shaky

  • Much more complicated when Alice has an input or output
  • Theorem

An ε-fuzzy protocol for F is a perfectly secure protocol for F((σ))

  • Holds for any deterministic function F

σ = #rounds.|X||Y|ε

Tuesday, August 23, 2011

slide-68
SLIDE 68

Fuzzy to Shaky

  • Much more complicated when Alice has an input or output
  • Theorem

An ε-fuzzy protocol for F is a perfectly secure protocol for F((σ))

  • Holds for any deterministic function F
  • Simulator’s description is exponential in the fuzzy protocol’s

communication complexity

σ = #rounds.|X||Y|ε

Tuesday, August 23, 2011

slide-69
SLIDE 69

Fuzzy to Shaky

  • Much more complicated when Alice has an input or output
  • Theorem

An ε-fuzzy protocol for F is a perfectly secure protocol for F((σ))

  • Holds for any deterministic function F
  • Simulator’s description is exponential in the fuzzy protocol’s

communication complexity

  • But for us, this is a constant: fuzzy OLE is a (non-constant

rate) OLE protocol instantiated with a constant security parameter

σ = #rounds.|X||Y|ε

Tuesday, August 23, 2011

slide-70
SLIDE 70

Shaky OLE to String-OT

Tuesday, August 23, 2011

slide-71
SLIDE 71

Shaky OLE to String-OT

  • (Non-shaky) OLE to String-OT:

Tuesday, August 23, 2011

slide-72
SLIDE 72

Shaky OLE to String-OT

  • (Non-shaky) OLE to String-OT:

Bits of (x1-x0,x0) b (in all instances) Bits of (x1-x0)b + x0 = xb Ext(x0) ⊕ s0, Ext(x1) ⊕ s1 Unmask sb

OLE

Tuesday, August 23, 2011

slide-73
SLIDE 73

Shaky OLE to String-OT

  • (Non-shaky) OLE to String-OT:
  • Alice “extracts” fewer than n/2 bits from each of x0 and x1

and sends Ext(x0) ⊕ s0 and Ext(x1) ⊕ s1 to Bob

Bits of (x1-x0,x0) b (in all instances) Bits of (x1-x0)b + x0 = xb Ext(x0) ⊕ s0, Ext(x1) ⊕ s1 Unmask sb

OLE

Tuesday, August 23, 2011

slide-74
SLIDE 74

Shaky OLE to String-OT

  • (Non-shaky) OLE to String-OT:
  • Alice “extracts” fewer than n/2 bits from each of x0 and x1

and sends Ext(x0) ⊕ s0 and Ext(x1) ⊕ s1 to Bob

  • But with shaky OLE, Alice may learn Bob’s input b (and Bob

may learn more than n/2 bits each of x0 and x1)

Bits of (x1-x0,x0) b (in all instances) Bits of (x1-x0)b + x0 = xb Ext(x0) ⊕ s0, Ext(x1) ⊕ s1 Unmask sb

OLE

Tuesday, August 23, 2011

slide-75
SLIDE 75

Shaky OLE to String-OT

  • (Non-shaky) OLE to String-OT:
  • Alice “extracts” fewer than n/2 bits from each of x0 and x1

and sends Ext(x0) ⊕ s0 and Ext(x1) ⊕ s1 to Bob

  • But with shaky OLE, Alice may learn Bob’s input b (and Bob

may learn more than n/2 bits each of x0 and x1)

  • Fix: using a constant-rate encoding of x0, x1 and b

Bits of (x1-x0,x0) b (in all instances) Bits of (x1-x0)b + x0 = xb Ext(x0) ⊕ s0, Ext(x1) ⊕ s1 Unmask sb

OLE

Tuesday, August 23, 2011

slide-76
SLIDE 76

Shaky OLE to String-OT

Tuesday, August 23, 2011

slide-77
SLIDE 77

Shaky OLE to String-OT

  • Const. rate encodings Enc:Fm→Fn and Enc2:Fm→Fn such that:

Tuesday, August 23, 2011

slide-78
SLIDE 78

Shaky OLE to String-OT

  • Const. rate encodings Enc:Fm→Fn and Enc2:Fm→Fn such that:
  • Enc(A) * Enc(B) + Enc2(C) ∈ Enc2(AB+C)

Tuesday, August 23, 2011

slide-79
SLIDE 79

Shaky OLE to String-OT

  • Const. rate encodings Enc:Fm→Fn and Enc2:Fm→Fn such that:
  • Enc(A) * Enc(B) + Enc2(C) ∈ Enc2(AB+C)

co-ordinate wise mult.

Tuesday, August 23, 2011

slide-80
SLIDE 80

Shaky OLE to String-OT

  • Const. rate encodings Enc:Fm→Fn and Enc2:Fm→Fn such that:
  • Enc(A) * Enc(B) + Enc2(C) ∈ Enc2(AB+C)
  • Error-correcting & Secret-sharing: For d = a (small) constant

fraction of n, Enc2 allows (efficient) decoding up to d errors; also, any d co-ordinates of Enc independent of the message

co-ordinate wise mult.

Tuesday, August 23, 2011

slide-81
SLIDE 81

Shaky OLE to String-OT

  • Const. rate encodings Enc:Fm→Fn and Enc2:Fm→Fn such that:
  • Enc(A) * Enc(B) + Enc2(C) ∈ Enc2(AB+C)
  • Error-correcting & Secret-sharing: For d = a (small) constant

fraction of n, Enc2 allows (efficient) decoding up to d errors; also, any d co-ordinates of Enc independent of the message

  • Enc2 is sufficiently randomizing: Enc2(A) is uniform over an

n-m(1+δ)-dimensional subspace of Fn

co-ordinate wise mult.

Tuesday, August 23, 2011

slide-82
SLIDE 82

Shaky OLE to String-OT

  • Const. rate encodings Enc:Fm→Fn and Enc2:Fm→Fn such that:
  • Enc(A) * Enc(B) + Enc2(C) ∈ Enc2(AB+C)
  • Error-correcting & Secret-sharing: For d = a (small) constant

fraction of n, Enc2 allows (efficient) decoding up to d errors; also, any d co-ordinates of Enc independent of the message

  • Enc2 is sufficiently randomizing: Enc2(A) is uniform over an

n-m(1+δ)-dimensional subspace of Fn

  • Instantiated from an “MPC-friendly code” (a.k.a codex) of

appropriate parameters [CC’06,IKOS’09, next talk]

co-ordinate wise mult.

Tuesday, August 23, 2011

slide-83
SLIDE 83

Shaky OLE to String-OT

Tuesday, August 23, 2011

slide-84
SLIDE 84

Shaky OLE to String-OT

Enc(x1-x0), Enc2(x0) Enc(b) Enc2((x1-x0)b + x0) Decode xb Ext(x0) ⊕ s0, Ext(x1) ⊕ s1 Unmask sb

OLE ((ε))

Tuesday, August 23, 2011

slide-85
SLIDE 85

Shaky OLE to String-OT

  • Secure against Alice, since Bob can correct a constant fraction of

errors, and since a small fraction of Enc(b) reveals nothing of b

Enc(x1-x0), Enc2(x0) Enc(b) Enc2((x1-x0)b + x0) Decode xb Ext(x0) ⊕ s0, Ext(x1) ⊕ s1 Unmask sb

OLE ((ε))

Tuesday, August 23, 2011

slide-86
SLIDE 86

Shaky OLE to String-OT

  • Secure against Alice, since Bob can correct a constant fraction of

errors, and since a small fraction of Enc(b) reveals nothing of b

  • Secure against Bob, since he knows nothing of at least one of the

extracted strings (even given the other one, and all that he gets in the protocol; relies on the randomization of Enc2(x0))

Enc(x1-x0), Enc2(x0) Enc(b) Enc2((x1-x0)b + x0) Decode xb Ext(x0) ⊕ s0, Ext(x1) ⊕ s1 Unmask sb

OLE ((ε))

Tuesday, August 23, 2011

slide-87
SLIDE 87

Summary

Tuesday, August 23, 2011

slide-88
SLIDE 88

Summary

  • Constant rate OT from BSC (and in fact, any noisy channel that gives OT)

Tuesday, August 23, 2011

slide-89
SLIDE 89

Summary

  • Constant rate OT from BSC (and in fact, any noisy channel that gives OT)
  • Using (a slightly modified) IPS compiler [IPS’08] to compile:

Tuesday, August 23, 2011

slide-90
SLIDE 90

Summary

  • Constant rate OT from BSC (and in fact, any noisy channel that gives OT)
  • Using (a slightly modified) IPS compiler [IPS’08] to compile:
  • “Outer protocol” [DI’06+CC’06] for n instances of OT

Tuesday, August 23, 2011

slide-91
SLIDE 91

Summary

  • Constant rate OT from BSC (and in fact, any noisy channel that gives OT)
  • Using (a slightly modified) IPS compiler [IPS’08] to compile:
  • “Outer protocol” [DI’06+CC’06] for n instances of OT
  • “Inner protocol” [GMW’87+HIKN’08] for implementing its servers

Tuesday, August 23, 2011

slide-92
SLIDE 92

Summary

  • Constant rate OT from BSC (and in fact, any noisy channel that gives OT)
  • Using (a slightly modified) IPS compiler [IPS’08] to compile:
  • “Outer protocol” [DI’06+CC’06] for n instances of OT
  • “Inner protocol” [GMW’87+HIKN’08] for implementing its servers
  • For “watchlist channels” a new constant-rate protocol for string-OT

from noisy channel (previously, only from an erasure channel)

Tuesday, August 23, 2011

slide-93
SLIDE 93

Summary

  • Constant rate OT from BSC (and in fact, any noisy channel that gives OT)
  • Using (a slightly modified) IPS compiler [IPS’08] to compile:
  • “Outer protocol” [DI’06+CC’06] for n instances of OT
  • “Inner protocol” [GMW’87+HIKN’08] for implementing its servers
  • For “watchlist channels” a new constant-rate protocol for string-OT

from noisy channel (previously, only from an erasure channel)

  • Uses a homomorphic arithmetic encoding scheme

Tuesday, August 23, 2011

slide-94
SLIDE 94

Summary

  • Constant rate OT from BSC (and in fact, any noisy channel that gives OT)
  • Using (a slightly modified) IPS compiler [IPS’08] to compile:
  • “Outer protocol” [DI’06+CC’06] for n instances of OT
  • “Inner protocol” [GMW’87+HIKN’08] for implementing its servers
  • For “watchlist channels” a new constant-rate protocol for string-OT

from noisy channel (previously, only from an erasure channel)

  • Uses a homomorphic arithmetic encoding scheme
  • Relies on “fuzzy to shaky” security

Tuesday, August 23, 2011

slide-95
SLIDE 95

Summary

  • Constant rate OT from BSC (and in fact, any noisy channel that gives OT)
  • Using (a slightly modified) IPS compiler [IPS’08] to compile:
  • “Outer protocol” [DI’06+CC’06] for n instances of OT
  • “Inner protocol” [GMW’87+HIKN’08] for implementing its servers
  • For “watchlist channels” a new constant-rate protocol for string-OT

from noisy channel (previously, only from an erasure channel)

  • Uses a homomorphic arithmetic encoding scheme
  • Relies on “fuzzy to shaky” security

Thank You!

Tuesday, August 23, 2011