Cryptographic Reverse Firewall via Malleable Smooth Projective Hash - - PowerPoint PPT Presentation

β–Ά
cryptographic reverse firewall via malleable smooth
SMART_READER_LITE
LIVE PREVIEW

Cryptographic Reverse Firewall via Malleable Smooth Projective Hash - - PowerPoint PPT Presentation

Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions Rongmao Chen, Yi Mu, Guomin Yang , Willy Susilo, Fuchun Guo and Mingwu Zhang Asiacrypt 2016, Hanoi Outline n Background n Cryptographic Reverse Firewall n Part


slide-1
SLIDE 1

Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions

Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo and Mingwu Zhang

Asiacrypt 2016, Hanoi

slide-2
SLIDE 2

Outline

n Background n Cryptographic Reverse Firewall n Part I: Malleable Smooth Projective Hash Function n Part II: CRF Constructions Via Malleable SPHFs

n Unkeyed Message Transmission Protocol n Oblivious Signature-Based Envelope Protocol n Oblivious Transfer Protocol

n Conclusions and Future Work

slide-3
SLIDE 3

Outline

n Background n Cryptographic Reverse Firewall n Part I: Malleable Smooth Projective Hash Function n Part II: CRF Constructions Via Malleable SPHFs

n Unkeyed Message Transmission Protocol n Oblivious Signature-Based Envelope Protocol n Oblivious Transfer Protocol

n Conclusions and Future Work

slide-4
SLIDE 4

Background

q Edward Snowden Revelations q Massive surveillance by intelligence agencies q Undermining security mechanisms

q subverting cryptographic protocols q deploying security weakness in implementations

slide-5
SLIDE 5

Background

q Edward Snowden Revelations q Massive surveillance by intelligence agencies q Undermining security mechanisms

q subverting cryptographic protocols q deploying security weakness in implementations

q Post-Snowden Cryptography

q How to achieve meaningful security for cryptographic protocols in the presence of an adversary that may arbitrarily tamper with the victim’s machine?

slide-6
SLIDE 6

IACR Statement On Mass Surveillance

The membership of the IACR repudiates mass surveillance and the undermining

  • f

cryptographic solutions and standards,Population-wide surveillance threatens democracy and human dignity. We call for expediting research and deployment

  • f

effective techniques to protect personal privacy against governmental and corporate overreach.

  • -Copenhagen, Eurocrypt 2014
slide-7
SLIDE 7

Outline

n Background n Cryptographic Reverse Firewall n Part I: Malleable Smooth Projective Hash Function n Part II: CRF Constructions Via Malleable SPHFs

n Unkeyed Message Transmission Protocol n Oblivious Signature-Based Envelope Protocol n Oblivious Transfer Protocol

n Conclusions and Future Work

slide-8
SLIDE 8

Cryptographic Reverse Firewall [MS15]

p A stateful algorithm 𝒳

p Input: current state 𝜐 and message 𝑛 p Output: updated state πœΜƒ and message 𝑛 %

p A β€œcomposed” party 𝒳 ∘ P

p 𝒳 is applied to the incoming and outgoing messages of party P p the state of 𝒳 is initialized to the public parameters p 𝒳 is called a reverse firewall for P p β€œactive router” between P ’s private network and the

  • utside

𝒳 P

𝑛1 𝑛1 * π‘›π‘œ π‘›π‘œ *

… …

slide-9
SLIDE 9

Cryptographic Reverse Firewall [MS15]

𝒳 P

𝑛1 𝑛1 * π‘›π‘œ π‘›π‘œ *

… …

p Transparent to legitimate traffic

p does not break functionality (Functionality-maintaining)

p 𝒳 shares no secret with P

p we do not trust the firewall (Security-preserving)

p No corrupted implementation of P can leak information through 𝒳 (Exfiltration-resistant) p Stackable reverse firewalls

p composition of multiple reverse firewalls 𝒳 ∘ 𝒳 ∘ β‹― ∘ 𝒳 ∘ P

slide-10
SLIDE 10

p Underlying protocol has some functionality yA yB

Property I: Functionality-Maintaining

π‘›π‘œ

…

𝑛1

p Protocol with 𝒳 has the same functionality

𝑛1 𝑛1 * π‘›π‘œ π‘›π‘œ *

… …

yA yB

slide-11
SLIDE 11

π‘›π‘œ

…

𝑛1

p Protocol with 𝒳 satisfies the same security notions

𝑛1 𝑛1 * π‘›π‘œ π‘›π‘œ *

… …

p Underlying protocol satisfies some security notions

Property II: Security-Preserving

slide-12
SLIDE 12

π‘›π‘œ

…

𝑛1

p Corrupted protocol with 𝒳 remains secure

𝑛1 𝑛1 * π‘›π‘œ π‘›π‘œ *

… …

p Corrupted implementation may break the security

Property II: Security-Preserving

Strong vs Weak Security-Preserving Eavesdropper vs Peer Party

slide-13
SLIDE 13

Property III: Exfiltration-Resistant

p Corrupted implementation of P cannot leak any information to an eavesdropping attacker

β‰ˆ 𝑫

𝑛1 𝑛1 * π‘›π‘œ π‘›π‘œ *

… …

𝑛1 𝑛1 * π‘›π‘œ π‘›π‘œ *

… …

Strong vs Weak Exfiltration-Resistance Eavesdropper vs Peer Party

slide-14
SLIDE 14

Research Goal

The β€œholy grail” would be a full characterization

  • f

functionalities and security properties for which reverse firewall exists.

  • -By Mironov and Stephens-Davidowitz

Eurocrypt 2015 This work: a general approach for designing CRFs for functionalities that are realizable by Smooth Projective Hash Functions

slide-15
SLIDE 15

Outline

n Background n Cryptographic Reverse Firewall n Part I: Malleable Smooth Projective Hash Function n Part II: CRF Constructions Via Malleable SPHFs

n Unkeyed Message Transmission Protocol n Oblivious Signature-Based Envelope Protocol n Oblivious Transfer Protocol

n Conclusions and Future Work

slide-16
SLIDE 16

Smooth Projective Hash Function [CS02]

… … …

ProjHash(pp,hp,C,w) (C, w) X Y Hash(pp,hk,C’) C’ L X/L SPHFSetup(1π‘š)=pp; HashKG(pp)=hk; ProjKG(pp,hk)=hp V’

p Correctness: Hash(pp,hk,C) = ProjHash(pp,hp,C,w); p Smoothness: V’ β‰ˆ S R

$ Y ;

p Hard Subset Membership: L β‰ˆ 𝐷 X/L

Hash(pp,hk,C)

slide-17
SLIDE 17

Our Extension: Malleable SPHF

p Randomness Sampling p SampR(pp) ⟢ 𝑠

% p SampW(pp) ⟢ w *

p Projection Key Updating

p MaulK(pp,hp, 𝑠 % ) ⟢ hp 8 p MaulH(pp,hp, 𝑠 % ,C) ⟢ hv 8

p Element Re-randomization

p ReranE(pp,C, π‘₯ *) ⟢ 𝐷 8 p ReranH(pp,hp,C, π‘₯ *) ⟢ hv 8

slide-18
SLIDE 18

p Property I: Projection Key Malleability

hp hk C Hash hv ProjHash w hv’

=

if exists

Our Extension: Malleable SPHF

slide-19
SLIDE 19

hp hk C Hash hv

Our Extension: Malleable SPHF

p Property I: Projection Key Malleability

slide-20
SLIDE 20

hp

hp 8

MaulK SampR hk C Hash hv 𝑠 %

β‘  hp0 8 β‰ˆ 𝐷 hp1 8

β‘‘ hv βˆ— hv

8 = h

Our Extension: Malleable SPHF

p Property I: Projection Key Malleability

slide-21
SLIDE 21

hp

hp 8

MaulK SampR hk

hk 8

C Hash Hash hv hv’ 𝑠 %

β‘  hp0 8 β‰ˆ 𝐷 hp1 8

β‘‘ hv βˆ— hv

8 = h

Our Extension: Malleable SPHF

p Property I: Projection Key Malleability

slide-22
SLIDE 22

hp

hp 8

MaulK SampR hk

hk 8

C Hash Hash MaulH hv hv’

hv 8 β‘  hp0 8 β‰ˆ 𝐷 hp1 8

β‘‘ hv βˆ— hv

8 = hv’

𝑠 %

Our Extension: Malleable SPHF

p Property I: Projection Key Malleability

slide-23
SLIDE 23

p Property II: Element Re-randomizability

hk Hash hv C

Our Extension: Malleable SPHF

slide-24
SLIDE 24

𝐷 > ReranE SampW hk Hash hv π‘₯ % C β‘  𝐷0 8 β‰ˆ 𝐷 𝐷1 8 β‘‘ hv βˆ— β„Žπ‘€

8 = h

p Property II: Element Re-randomizability

Our Extension: Malleable SPHF

slide-25
SLIDE 25

𝐷 > ReranE SampW hk Hash Hash hv hv’ π‘₯ % C hk hp β‘  𝐷0 8 β‰ˆ 𝐷 𝐷1 8

p Property II: Element Re-randomizability

Our Extension: Malleable SPHF

slide-26
SLIDE 26

𝐷 > ReranE SampW hk Hash Hash ReranH hv hv’

hv 8

π‘₯ % C hp hk β‘  𝐷0 8 β‰ˆ 𝐷 𝐷1 8 β‘‘ hv βˆ— hv

8 = hv’

p Property II: Element Re-randomizability

Our Extension: Malleable SPHF

slide-27
SLIDE 27

𝐷 > ReranE SampW hk Hash Hash ReranH hv hv’

hv 8

π‘₯ % C hp hk β‘  𝐷0 8 β‰ˆ 𝐷 𝐷1 8 β‘‘ hv βˆ— hv

8 = hv’

p Property II: Element Re-randomizability

Our Extension: Malleable SPHF

β‘’ 𝐷 > ∈L iff C ∈L

slide-28
SLIDE 28

p Graded Rings [BCC+13]

p common formalization of cyclic groups, bilinear groups, and multilinear groups p

βˆ€ 𝑏, 𝑐 ∈ π•¬π‘ž, 𝑏⨁𝑐 = 𝑏 + 𝑐, 𝑏⨀𝑐 = 𝑏 L 𝑐

p

βˆ€ 𝑣1, 𝑀1 ∈ 𝔿, 𝑣1⨁𝑀1 = 𝑣1 L 𝑀1, 𝑣1 βŠ– 𝑀1 = 𝑣1 L 𝑀1

PQοΌ›βˆ€ 𝑑 ∈ π•¬π‘ž,

𝑑⨀𝑣1 = 𝑣1

𝑑

p

βˆ€ 𝑣1, 𝑀1 ∈ 𝔿, 𝑣1⨀𝑀1 = 𝑓 𝑣1, 𝑀1 ∈ π”Ώπ‘ˆ (𝑓: 𝔿×𝔿 ⟢ π”Ώπ‘ˆ)

p Generic SPHF via Graded Rings [BCC+13]

p

π›₯: 𝒴 ⟼ 𝔿[Γ—\ , π›ͺ: 𝒴 ⟼ 𝔿QΓ—\

p

𝐷 ∈ β„’ ⟺ βˆƒπ› ∈ π•¬π‘ž

QΓ—[ s. t. , π›ͺ 𝐷 = 𝛍⨀π›₯ 𝐷

p

hk: = 𝜷 = (𝛽1, … , π›½π‘œ)Ξ€ $ ← π•¬π‘ž

\ , hp ∢= 𝛿 𝐷 = π›₯ 𝐷 β¨€πœ· ∈ 𝔿𝑙

p Hash(pp,hk,C) ∢= π›ͺ 𝐷 β¨€πœ· , ProjHash(pp,hp,C,w) ∢=

𝛍⨀ 𝛿 𝐷

A Generic Construction of Malleable SPHF

π›ͺ 𝐷 β¨€πœ· = 𝛍⨀π›₯ 𝐷 β¨€πœ· = 𝛍⨀ 𝛿 𝐷

slide-29
SLIDE 29

p Generic Malleable SPHF via Graded Rings

p MaulK(pp,hp=𝛿 𝐷 , 𝒔

*): hp 8 = 𝛿 𝐷 ⨁π›₯ 𝐷 ⨀ 𝒔 *

p MaulH(pp,hp, 𝒔

*,C): hv 8 = π›ͺ 𝐷 ⨀ 𝒔 *

p ReranK(pp,C, π‘₯

*): 𝐷 8 = π›ͺ 𝐷 ⨁ 𝛍 8⨀π›₯ 𝐷

p ReranH(pp,hp,C, π‘₯

*): hv 8 = 𝛍 8 ⨀ 𝛿 𝐷

A Generic Construction of Malleable SPHF

Theorem

The above construction is a malleable SPHF if the follows hold:

  • π›ͺ: 𝒴 ⟼ 𝔿QΓ—\ is an identity function;
  • π›₯: 𝒴 ⟼ 𝔿[Γ—\ is a constant function;
  • The hard subset membership holds.

pInstantiation from the k-linear assumption

slide-30
SLIDE 30

Outline

n Background n Cryptographic Reverse Firewall n Part I: Malleable Smooth Projective Hash Function n Part II: CRF Constructions Via Malleable SPHFs

n Unkeyed Message Transmission Protocol n Oblivious Signature-Based Envelope Protocol n Oblivious Transfer Protocol

n Conclusions and Future Work

slide-31
SLIDE 31

p Message Transmission Protocol

  • p

q, qr

(C, w)

$

← SampYes(pp) V = ProjHash(pp,hp,C,w) CT = V ⨁ M hk

$

← HashKG(pp) hp ← ProjKG(pp,hk) Input: pp, M Input: pp M’ = CT ⊝ Hash(pp,hk,C) Hash(pp,hk,C)= ProjHash(pp,hp,C,w)

M’= M

Message Transmission Protocol with CRFs

slide-32
SLIDE 32
  • p

q, qr

(C, w)

$

← SampYes(pp) V = ProjHash(pp,hp,C,w) CT = V ⨁ M hk

$

← HashKG(pp) hp ← ProjKG(pp,hk) M’ = CT ⊝ Hash(pp,hk,C)

Message Transmission Protocol with CRFs

p Firewall for

Input: pp, M Input: pp Input: pp Bob’s output message

slide-33
SLIDE 33
  • p

𝑠̃

$

← SampR(pp)

hp 8 ←MaulK(pp,hp, 𝑠

%) (C, w)

$

← SampYes(pp) V = ProjHash(pp,hp

8,C,w)

CT = V ⨁ M hk

$

← HashKG(pp) hp ← ProjKG(pp,hk) M’ = CT ⊝Hash(pp,hk,C)

q, qr

Message Transmission Protocol with CRFs

Input: pp, M Input: pp Input: pp

  • p

*

p Firewall for

slide-34
SLIDE 34

Message Transmission Protocol with CRFs

  • p

Input: pp, M Input: pp 𝑠̃

$

← SampR(pp)

hp 8 ←MaulK(pp,hp, 𝑠

%)

  • p

*

(C, w)

$

← SampYes(pp) V = ProjHash(pp,hp

8,C,w)

CT = V ⨁ M hk

$

← HashKG(pp) hp ← ProjKG(pp,hk) M’ = π·π‘ˆ

8 ⊝Hash(pp,hk,C)

q, qr 8 q, qr βˆ†π‘Š=MaulH(pp,hp,C,𝑠̃)

π·π‘ˆ 8 = CT ⊝ βˆ†π‘Š

π·π‘ˆ 8 = CT ⊝ βˆ†π‘Š = V ⊝ βˆ†π‘Šβ¨ M=Hash(pp,hk,C) ⨁ M

M’ = M

Input: pp

p Firewall for

slide-35
SLIDE 35

Message Transmission Protocol with CRFs

  • p

Input: pp, M Input: pp 𝑠̃

$

← SampR(pp)

hp 8 ←MaulK(pp,hp, 𝑠

%)

  • p

*

(C, w)

$

← SampYes(pp) V = ProjHash(pp,hp

8,C,w)

CT = V ⨁ M hk

$

← HashKG(pp) hp ← ProjKG(pp,hk) M’ = π·π‘ˆ

8 ⊝Hash(pp,hk,C)

q, qr 8 q, qr βˆ†π‘Š=MaulH(pp,hp,C,𝑠̃)

π·π‘ˆ 8 = CT ⊝ βˆ†π‘Š

π·π‘ˆ 8 = CT ⊝ βˆ†π‘Š = V ⊝ βˆ†π‘Šβ¨ M=Hash(pp,hk,C) ⨁ M

M’ = M

Input: pp

Strong Exfiltration-Resistance

p Firewall for

slide-36
SLIDE 36

Alice’s output message

  • p

(C, w)

$

← SampYes(pp) V = ProjHash(pp,hp,C,w) CT = V ⨁ M hk

$

← HashKG(pp) hp ← ProjKG(pp,hk) Input: pp, M Input: pp M’ = CT ⊝Hash(pp,hk,C)

Message Transmission Protocol with CRFs

p Firewall for

q, qr

Input: pp

slide-37
SLIDE 37
  • p

hk

$

← HashKG(pp) hp ← ProjKG(pp,hk) Input: pp, M Input: pp M’ = π·π‘ˆ

8 ⊝Hash(pp,hk,𝐷 v)

Message Transmission Protocol with CRFs

q v , qr 8 q, qr

π‘₯ %

$

← SampW(pp)

𝐷 v =ReranE(pp,C,π‘₯

%)

βˆ†π‘Š=ReranH(pp,hp,C,π‘₯

% )

π·π‘ˆ 8 = CT ⨁ βˆ†π‘Š

Input: pp π·π‘ˆ 8 = CT ⨁ βˆ†π‘Š= V β¨βˆ†π‘Šβ¨ M=Hash(pp,hk,𝐷 v) ⨁ M

M’ = M

p Firewall for

(C, w)

$

← SampYes(pp) V = ProjHash(pp,hp,C,w) CT = V ⨁ M

slide-38
SLIDE 38
  • p

hk

$

← HashKG(pp) hp ← ProjKG(pp,hk) Input: pp, M Input: pp M’ = π·π‘ˆ

8 ⊝Hash(pp,hk,𝐷 v)

Message Transmission Protocol with CRFs

q v , qr 8 q, qr

π‘₯ %

$

← SampW(pp)

𝐷 v =ReranE(pp,C,π‘₯

%)

βˆ†π‘Š=ReranH(pp,hp,C,π‘₯

% )

π·π‘ˆ 8 = CT ⨁ βˆ†π‘Š

Input: pp π·π‘ˆ 8 = CT ⨁ βˆ†π‘Š= V β¨βˆ†π‘Šβ¨ M=Hash(pp,hk,𝐷 v) ⨁ M

M’ = M

Weak Exfiltration-Resistance (against Bob)

p Firewall for

(C, w)

$

← SampYes(pp) V = ProjHash(pp,hp,C,w) CT = V ⨁ M

slide-39
SLIDE 39

Outline

n Background n Cryptographic Reverse Firewall n Part I: Malleable Smooth Projective Hash Function n Part II: CRF Constructions Via Malleable SPHFs

n Unkeyed Message Transmission Protocol n Oblivious Signature-Based Envelope Protocol n Oblivious Transfer Protocol

n Conclusions and Future Work

slide-40
SLIDE 40

p Oblivious Signature-Based Envelope [BPV’12]

qw

  • p, x

hk

$

← HashKG(pp) hp ← ProjKG(pp,hk) V = Hash(pp,hk,𝐷y) Q = V ⨁ P 𝐷y

$

← Encrypt(pp, 𝜏; 𝑠) Input: pp, P, M Input: pp, 𝜏, M V’=ProjHash(pp,hp,𝐷y,r) P’ = Q ⊝ V’ P’ = P iff 𝜏 is a valid signature of predefined message M

Oblivious Signature-Based Envelope with CRFs

π“œ = {valid encryption of 𝝉𝐍}

slide-41
SLIDE 41

qw

  • p, x

hk

$

← HashKG(pp) hp ← ProjKG(pp,hk) V = Hash(pp,hk,𝐷y

8)

Q = V ⨁ P 𝐷y

$

← Encrypt(pp, 𝜏; 𝑠) Input: pp, P, M Input: pp, 𝜏, M V’=ProjHash(pp,hp,𝐷y ,r) P’ = 𝑅 € ⊝ V’

Oblivious Signature-Based Envelope with CRFs

π‘₯ %

$

← SampW(pp)

𝐷y

8 =ReranE(pp,𝐷y,π‘₯

%)

βˆ†π‘Š=ReranH(pp,hp,𝐷y,π‘₯

%)

𝑅 € = Q ⊝ βˆ†π‘Š

Input: pp, M

qw

*

  • p, x

€

p Firewall for

slide-42
SLIDE 42

qw

  • p, x

hk

$

← HashKG(pp) hp ← ProjKG(pp,hk) V = Hash(pp,hk,𝐷y) Q = V ⨁ P 𝐷y

$

← Encrypt(pp, 𝜏; 𝑠) Input: pp, P, M Input: pp, 𝜏, M V’=ProjHash(pp, hp 8,𝐷y,r) P’ = 𝑅 € ⊝ V’

Oblivious Signature-Based Envelope with CRFs

p Firewall for

𝑠̃

$

← SampR(pp)

hp 8 ← ProjMaul(pp,hp,𝑠̃) βˆ†π‘Š=MaulH(pp,hp,𝐷y,𝑠̃) 𝑅 € = 𝑅 ⨁ βˆ†π‘Š

Input: pp, M

  • p

8 , x v

slide-43
SLIDE 43

Oblivious Signature-Based Envelope with CRFs

p Instantiation of OSBE [BPV’12]

p Linear Encryption of Waters Signatures

p We extend the instantiation to be a malleable SPHF

p Follow the Graded-Ring SPFH paradigm

p π›ͺ: 𝒴 ⟼ 𝔿QΓ—\ is not an identity function

slide-44
SLIDE 44

Outline

n Background n Cryptographic Reverse Firewall n Part I: Malleable Smooth Projective Hash Function n Part II: CRF Constructions Via Malleable SPHFs

n Unkeyed Message Transmission Protocol n Oblivious Signature-Based Envelope Protocol n Oblivious Transfer Protocol

n Conclusions and Future Work

slide-45
SLIDE 45

(𝜟, qβ€š)

(Ζ’β€ž, qrβ€ž)…†‑

Λ†

𝜟

$

← SampB(pp)

(𝐷𝑐, 𝒙)

$

← SampI(𝜟,b) Input: pp, M1, M2 Input: pp, 𝑐

π‘Šπ‘ = Ξ»(𝒙)⨀𝛿𝑗 𝑁𝑐 = π·π‘ˆπ‘ βŠ– π‘Šπ‘

Input: pp

Oblivious Transfer with CRFs

𝜟 = (π›₯1, … , π›₯π‘œ) ∈ 𝔿[Γ—\ : Element Basis

1 βˆ’ 𝑐= PairG(𝜟, 𝐷𝑐)

hk0= 𝜷0

$

← π•¬π‘ž\, hp0=𝛿0 = πœŸβ¨€πœ·0 hk1= 𝜷1

$

← π•¬π‘ž\, hp1=𝛿1 = πœŸβ¨€πœ·1 (π‘Šπ‘—)β€žΕ½β€’

Q

← (π·π‘—β¨€πœ·π‘—)β€žΕ½β€’

Q

(π·π‘ˆπ‘—)β€žΕ½β€’

Q

← (π‘Šπ‘—β¨π‘π‘—)β€žΕ½β€’

Q

p OT via Graded Rings (Variant of HK-OT [HK’12])

𝐷

slide-46
SLIDE 46

Oblivious Transfer with CRFs

slide-47
SLIDE 47

(𝜟, qβ€’)

(Ζ’β€ž, qrβ€ž)…†‑

Λ†

𝐷1 8= PairG( 𝜟 8, 𝐷0 8) hk0= 𝜷0

$

← π•¬π‘ž\, hp0=𝛿0 = 𝜟 8β¨€πœ·0 hk1= 𝜷1

$

← π•¬π‘ž\, hp1=𝛿1 = 𝜟 8β¨€πœ·1 (π‘Šπ‘—)β€žΕ½β€’

Q

← (𝐷𝑗 v β¨€πœ·π‘—)β€žΕ½β€’

Q

(π·π‘ˆπ‘—)β€žΕ½β€’

Q

← (π‘Šπ‘—β¨π‘π‘—)β€žΕ½β€’

Q

𝜟

$

← SampB(pp)

(𝐷0, 𝒙)

$

← SampI(𝜟,b) Input: pp, M1, M2 Input: pp, 𝑐

π‘Šπ‘ = Ξ»(𝒙)⨀𝛿𝑗 𝑁𝑐 = π·π‘ˆπ‘ 8 βŠ– π‘Šπ‘ 𝑻 v $ ← SampS(pp) 𝜟 v ← 𝜟 ⨀𝑻 v, 𝐷‒

β€˜ ← 𝐷0 ⨀𝑻

v 𝒙 %

$

← SampW(pp) 𝐷 ← Ξ» 𝒙 % β¨€πœŸ v 𝐷0 8 ← 𝐷‒

β€˜ ⨁𝐷 ( 𝜟 8 , qβ€’ 8)

Input: pp

Oblivious Transfer with CRFs

(βˆ†π‘Šπ‘—)β€žΕ½β€’

Q

← (Ξ»(𝒙 %)⨀𝛿𝑗)β€žΕ½β€’

Q

(π·π‘ˆπ‘— 8 )β€žΕ½β€’

Q

← (π·π‘ˆπ‘—β¨βˆ†π‘Šπ‘—)β€žΕ½β€’

Q (Ζ’β€ž, qrβ€ž 8 )…†‑

Λ†

𝑻 v : Basis Transformation Matrix

p Firewall for

slide-48
SLIDE 48

(𝜟, qβ€’)

𝜟

$

← SampB(pp)

(𝐷0, 𝒙)

$

← SampI(𝜟,b) Input: pp, M1, M2 Input: pp, 𝑐

π‘Šπ‘ = Ξ» 𝒙 ⨀ 𝛿𝒄 * 𝑁𝑐 = π·π‘ˆπ‘ 8 βŠ– π‘Šπ‘

Input: pp

Oblivious Transfer with CRFs

𝐷1= PairG(𝜟, 𝐷0) hk0= 𝜷0

$

← π•¬π‘ž\, hp0=𝛿0 = πœŸβ¨€πœ·0 hk1= 𝜷1

$

← π•¬π‘ž\, hp1=𝛿1 = πœŸβ¨€πœ·1 (π‘Šπ‘—)β€žΕ½β€’

Q

← (π·π‘—β¨€πœ·π‘—)β€žΕ½β€’

Q

(π·π‘ˆπ‘—)β€žΕ½β€’

Q

← (π‘Šπ‘—β¨π‘π‘—)β€žΕ½β€’

Q (Ζ’β€ž, qrβ€ž)…†‑

Λ†

( ƒ𝒋 *, qrβ€ž 8 )…†‑

Λ†

p Firewall for

π’”πŸ *

$

← SampR(pp) π’”πŸ *

$

← SampR(pp) ( 𝛿𝒋 *)β€žΕ½β€’

Q

← (𝛿𝑗 ⨁(πœŸβ¨€ 𝒔𝒋 *))β€žΕ½β€’

Q

(βˆ†π‘Šπ‘—)β€žΕ½β€’

Q

← (𝐷𝑗⨀ 𝒔𝒋 *)β€žΕ½β€’

Q

(π·π‘ˆπ‘— 8 )β€žΕ½β€’

Q

← (π·π‘ˆπ‘—β¨βˆ†π‘Šπ‘—)β€žΕ½β€’

Q

slide-49
SLIDE 49

Instantiations of OT with CRFs

p OT-CRF construction in [MS15] p A more efficient variant p A more general construction based on k-linear assumption

slide-50
SLIDE 50

Outline

n Background n Cryptographic Reverse Firewall n Part I: Malleable Smooth Projective Hash Function n Part II: CRF Constructions Via Malleable SPHFs

n Unkeyed Message Transmission Protocol n Oblivious Signature-Based Envelope Protocol n Oblivious Transfer Protocol

n Conclusions and Future Work

slide-51
SLIDE 51

+ CRFs + CRFs

Mathematical Structure Building Blocks Cryptographic Protocols

+ CRFs SPHF Malleable SPHF Graded Rings Oblivious Transfer MTP, OSBE …

Conclusions and Future Work

MPC…

? ?

Other Structures

slide-52
SLIDE 52

Thank you!