Constant-Rate Oblivious Transfer from Noisy Channels
Yuval Ishai Eyal Kushilevitz Rafail Ostrovsky Manoj Prabhakaran Amit Sahai Jürg Wullschleger
Tuesday, August 23, 2011
Constant-Rate Oblivious Transfer from Noisy Channels Yuval I shai - - PowerPoint PPT Presentation
Constant-Rate Oblivious Transfer from Noisy Channels Yuval I shai Eyal K ushilevitz Rafail O strovsky Manoj P rabhakaran Amit S ahai Jrg W ullschleger Tuesday, August 23, 2011 Constant-Rate Oblivious Transfer from Noisy Channels Yuval I shai
Yuval Ishai Eyal Kushilevitz Rafail Ostrovsky Manoj Prabhakaran Amit Sahai Jürg Wullschleger
Tuesday, August 23, 2011
Yuval Ishai Eyal Kushilevitz Rafail Ostrovsky Manoj Prabhakaran Amit Sahai Jürg Wullschleger
Tuesday, August 23, 2011
Tuesday, August 23, 2011
From our point of view, an ideal communication line is a sterile, cryptographically uninteresting entity. Noise,
uncertainty, and confusion. Thus, it is the cryptographer’s natural ally. Claude Crépeau & Joe Kilian, 1988.
Tuesday, August 23, 2011
Tuesday, August 23, 2011
secret communication, without shared keys [W’75]
Tuesday, August 23, 2011
secret communication, without shared keys [W’75]
Tuesday, August 23, 2011
secret communication, without shared keys [W’75]
X0,X1 b Xb
OT
[R’81,W’83]
Tuesday, August 23, 2011
secret communication, without shared keys [W’75]
X0,X1 b Xb
OT
X X⊕b
BSC
[R’81,W’83]
Tuesday, August 23, 2011
secret communication, without shared keys [W’75]
X0,X1 b Xb
OT
X X⊕b
BSC
[R’81,W’83]
Tuesday, August 23, 2011
Tuesday, August 23, 2011
BSC per bit of communication
Tuesday, August 23, 2011
BSC per bit of communication
Tuesday, August 23, 2011
BSC per bit of communication
Tuesday, August 23, 2011
BSC per bit of communication
Tuesday, August 23, 2011
BSC per bit of communication
Tuesday, August 23, 2011
BSC per bit of communication
Tuesday, August 23, 2011
BSC per bit of communication
channels [WW’10])
Tuesday, August 23, 2011
BSC per bit of communication
channels [WW’10])
Tuesday, August 23, 2011
Tuesday, August 23, 2011
honest secure “inner protocol” and an honest-majority secure “outer protocol” using a few string-OTs
Tuesday, August 23, 2011
honest secure “inner protocol” and an honest-majority secure “outer protocol” using a few string-OTs
use noisy channels. Requires inner protocol to be “error tolerant”
Tuesday, August 23, 2011
honest secure “inner protocol” and an honest-majority secure “outer protocol” using a few string-OTs
use noisy channels. Requires inner protocol to be “error tolerant”
Harder to detect cheating in inner- protocol (by partial oblivious monitoring), as there is a noisy channel involved. Will require the inner-protocol to be secure against active corruption
Tuesday, August 23, 2011
honest secure “inner protocol” and an honest-majority secure “outer protocol” using a few string-OTs
use noisy channels. Requires inner protocol to be “error tolerant”
literature [GMW’87+HIKN’08,DI’06+CC’06]
Harder to detect cheating in inner- protocol (by partial oblivious monitoring), as there is a noisy channel involved. Will require the inner-protocol to be secure against active corruption
Tuesday, August 23, 2011
honest secure “inner protocol” and an honest-majority secure “outer protocol” using a few string-OTs
use noisy channels. Requires inner protocol to be “error tolerant”
literature [GMW’87+HIKN’08,DI’06+CC’06]
noisy channel
Harder to detect cheating in inner- protocol (by partial oblivious monitoring), as there is a noisy channel involved. Will require the inner-protocol to be secure against active corruption
Tuesday, August 23, 2011
Tuesday, August 23, 2011
channel)
Tuesday, August 23, 2011
channel)
Previously, known from OT
Tuesday, August 23, 2011
channel)
parameter to get “fuzzy” OT: i.e., with constant security error
Previously, known from OT
Tuesday, August 23, 2011
channel)
parameter to get “fuzzy” OT: i.e., with constant security error
Previously, known from OT
Tuesday, August 23, 2011
channel)
parameter to get “fuzzy” OT: i.e., with constant security error
Previously, known from OT
Tuesday, August 23, 2011
channel)
parameter to get “fuzzy” OT: i.e., with constant security error
A,C B AB+C
OLE
Previously, known from OT
Tuesday, August 23, 2011
channel)
parameter to get “fuzzy” OT: i.e., with constant security error
A,C B AB+C
OLE
Previously, known from OT
Tuesday, August 23, 2011
channel)
parameter to get “fuzzy” OT: i.e., with constant security error
A,C B AB+C
OLE
Previously, known from OT
Tuesday, August 23, 2011
Tuesday, August 23, 2011
(statistical distance between ideal and real executions)
Tuesday, August 23, 2011
(statistical distance between ideal and real executions)
works as F, else (w/ prob σ) surrenders to the adversary
Tuesday, August 23, 2011
(statistical distance between ideal and real executions)
works as F, else (w/ prob σ) surrenders to the adversary
An ε-fuzzy protocol for F is a perfectly secure protocol for F((σ))
Tuesday, August 23, 2011
(statistical distance between ideal and real executions)
works as F, else (w/ prob σ) surrenders to the adversary
An ε-fuzzy protocol for F is a perfectly secure protocol for F((σ))
σ = #rounds.|X||Y|ε
Tuesday, August 23, 2011
(statistical distance between ideal and real executions)
works as F, else (w/ prob σ) surrenders to the adversary
An ε-fuzzy protocol for F is a perfectly secure protocol for F((σ))
protocol gives about (1-σ)n good copies of F (randomly chosen)
σ = #rounds.|X||Y|ε
Tuesday, August 23, 2011
Tuesday, August 23, 2011
Tuesday, August 23, 2011
Tuesday, August 23, 2011
simulator for F((σ))
S
F x y fA ( x , y ) fB ( x , y )
Tuesday, August 23, 2011
simulator for F((σ))
S
F x y fA ( x , y ) fB ( x , y )
S*
F((σ)) x y fA ( x , y ) fB ( x , y )
Tuesday, August 23, 2011
Tuesday, August 23, 2011
Tuesday, August 23, 2011
Tuesday, August 23, 2011
Bob sends his input to Alice, else ⊥
y=1 y=0 1
⊥
1
⊥
½ ½ ½ ½
Tuesday, August 23, 2011
Bob sends his input to Alice, else ⊥
ideal F execution sends ⊥ with probability ½, and else a random bit
y=1 y=0 1
⊥
1
⊥
½ ½ ½ ½
Tuesday, August 23, 2011
Bob sends his input to Alice, else ⊥
ideal F execution sends ⊥ with probability ½, and else a random bit
y=1 y=0 1
⊥
1
⊥
½ ½ ½ ½
Tuesday, August 23, 2011
Bob sends his input to Alice, else ⊥
ideal F execution sends ⊥ with probability ½, and else a random bit
¼ ½
⊥
¼
1 y=1 y=0 1
⊥
1
⊥
½ ½ ½ ½
Tuesday, August 23, 2011
Bob sends his input to Alice, else ⊥
ideal F execution sends ⊥ with probability ½, and else a random bit
¼ ½
⊥
¼
1
½ ¼
⊥
¼
1 y=1 y=0 1
⊥
1
⊥
½ ½ ½ ½
Tuesday, August 23, 2011
Bob sends his input to Alice, else ⊥
ideal F execution sends ⊥ with probability ½, and else a random bit
¼ ½
⊥
¼
1
½ ¼
⊥
¼
1 y=1 y=0 1
⊥
1
⊥
½ ½ ½ ½
Tuesday, August 23, 2011
y=1 y=0 1
⊥
1
⊥
½ ½ ½ ½ ¼ ½
⊥
¼
1
½ ¼
⊥
¼
1
Tuesday, August 23, 2011
y=1 y=0 1
⊥
1
⊥
½ ½ ½ ½ ¼ ½
⊥
¼
1
½ ¼
⊥
¼
1
Tuesday, August 23, 2011
protocol and the given simulation
y=1 y=0 1
⊥
1
⊥
½ ½ ½ ½ ¼ ½
⊥
¼
1
½ ¼
⊥
¼
1
Tuesday, August 23, 2011
protocol and the given simulation
½
⊥
1
½
⊥
1 y=1 y=0 1
⊥
1
⊥
½ ½ ½ ½ ¼ ½
⊥
¼
1
½ ¼
⊥
¼
1
Tuesday, August 23, 2011
protocol and the given simulation
½
⊥
1
½
⊥
1
When F
((1/2))
doesn’t fail
y=1 y=0 1
⊥
1
⊥
½ ½ ½ ½ ¼ ½
⊥
¼
1
½ ¼
⊥
¼
1
Tuesday, August 23, 2011
protocol and the given simulation
½
⊥
1
½
⊥
1
When F
((1/2))
doesn’t fail
y=1 y=0 1
⊥
1
⊥
½ ½ ½ ½ ¼ ½
⊥
¼
1
½ ¼
⊥
¼
1
Tuesday, August 23, 2011
protocol and the given simulation
½
⊥
1
½
⊥
1
½ ½
When F
((1/2))
doesn’t fail
y=1 y=0 1
⊥
1
⊥
½ ½ ½ ½ ¼ ½
⊥
¼
1
½ ¼
⊥
¼
1
Tuesday, August 23, 2011
protocol and the given simulation
½
⊥
1
½
⊥
1
½ ½
When F
((1/2))
doesn’t fail When it fails
y=1 y=0 1
⊥
1
⊥
½ ½ ½ ½ ¼ ½
⊥
¼
1
½ ¼
⊥
¼
1
Tuesday, August 23, 2011
Tuesday, August 23, 2011
Tuesday, August 23, 2011
An ε-fuzzy protocol for F is a perfectly secure protocol for F((σ))
Tuesday, August 23, 2011
An ε-fuzzy protocol for F is a perfectly secure protocol for F((σ))
σ = #rounds.|X||Y|ε
Tuesday, August 23, 2011
An ε-fuzzy protocol for F is a perfectly secure protocol for F((σ))
σ = #rounds.|X||Y|ε
Tuesday, August 23, 2011
An ε-fuzzy protocol for F is a perfectly secure protocol for F((σ))
communication complexity
σ = #rounds.|X||Y|ε
Tuesday, August 23, 2011
An ε-fuzzy protocol for F is a perfectly secure protocol for F((σ))
communication complexity
rate) OLE protocol instantiated with a constant security parameter
σ = #rounds.|X||Y|ε
Tuesday, August 23, 2011
Tuesday, August 23, 2011
Tuesday, August 23, 2011
Bits of (x1-x0,x0) b (in all instances) Bits of (x1-x0)b + x0 = xb Ext(x0) ⊕ s0, Ext(x1) ⊕ s1 Unmask sb
OLE
Tuesday, August 23, 2011
and sends Ext(x0) ⊕ s0 and Ext(x1) ⊕ s1 to Bob
Bits of (x1-x0,x0) b (in all instances) Bits of (x1-x0)b + x0 = xb Ext(x0) ⊕ s0, Ext(x1) ⊕ s1 Unmask sb
OLE
Tuesday, August 23, 2011
and sends Ext(x0) ⊕ s0 and Ext(x1) ⊕ s1 to Bob
may learn more than n/2 bits each of x0 and x1)
Bits of (x1-x0,x0) b (in all instances) Bits of (x1-x0)b + x0 = xb Ext(x0) ⊕ s0, Ext(x1) ⊕ s1 Unmask sb
OLE
Tuesday, August 23, 2011
and sends Ext(x0) ⊕ s0 and Ext(x1) ⊕ s1 to Bob
may learn more than n/2 bits each of x0 and x1)
Bits of (x1-x0,x0) b (in all instances) Bits of (x1-x0)b + x0 = xb Ext(x0) ⊕ s0, Ext(x1) ⊕ s1 Unmask sb
OLE
Tuesday, August 23, 2011
Tuesday, August 23, 2011
Tuesday, August 23, 2011
Tuesday, August 23, 2011
co-ordinate wise mult.
Tuesday, August 23, 2011
fraction of n, Enc2 allows (efficient) decoding up to d errors; also, any d co-ordinates of Enc independent of the message
co-ordinate wise mult.
Tuesday, August 23, 2011
fraction of n, Enc2 allows (efficient) decoding up to d errors; also, any d co-ordinates of Enc independent of the message
n-m(1+δ)-dimensional subspace of Fn
co-ordinate wise mult.
Tuesday, August 23, 2011
fraction of n, Enc2 allows (efficient) decoding up to d errors; also, any d co-ordinates of Enc independent of the message
n-m(1+δ)-dimensional subspace of Fn
appropriate parameters [CC’06,IKOS’09, next talk]
co-ordinate wise mult.
Tuesday, August 23, 2011
Tuesday, August 23, 2011
Enc(x1-x0), Enc2(x0) Enc(b) Enc2((x1-x0)b + x0) Decode xb Ext(x0) ⊕ s0, Ext(x1) ⊕ s1 Unmask sb
OLE ((ε))
Tuesday, August 23, 2011
errors, and since a small fraction of Enc(b) reveals nothing of b
Enc(x1-x0), Enc2(x0) Enc(b) Enc2((x1-x0)b + x0) Decode xb Ext(x0) ⊕ s0, Ext(x1) ⊕ s1 Unmask sb
OLE ((ε))
Tuesday, August 23, 2011
errors, and since a small fraction of Enc(b) reveals nothing of b
extracted strings (even given the other one, and all that he gets in the protocol; relies on the randomization of Enc2(x0))
Enc(x1-x0), Enc2(x0) Enc(b) Enc2((x1-x0)b + x0) Decode xb Ext(x0) ⊕ s0, Ext(x1) ⊕ s1 Unmask sb
OLE ((ε))
Tuesday, August 23, 2011
Tuesday, August 23, 2011
Tuesday, August 23, 2011
Tuesday, August 23, 2011
Tuesday, August 23, 2011
Tuesday, August 23, 2011
from noisy channel (previously, only from an erasure channel)
Tuesday, August 23, 2011
from noisy channel (previously, only from an erasure channel)
Tuesday, August 23, 2011
from noisy channel (previously, only from an erasure channel)
Tuesday, August 23, 2011
from noisy channel (previously, only from an erasure channel)
Tuesday, August 23, 2011