Cryptography for Cloud Security
Mohsen Toorani
Department of Informatics, University of Bergen Simula@UiB
Coins Winter School Finse, Norway May 12, 2017
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 1 / 58
Cryptography for Cloud Security Mohsen Toorani Department of - - PowerPoint PPT Presentation
Cryptography for Cloud Security Mohsen Toorani Department of Informatics, University of Bergen Simula@UiB Coins Winter School Finse, Norway May 12, 2017 Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 1 / 58 Our
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 1 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 2 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 3 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 4 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 4 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 5 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 6 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 7 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 8 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 9 / 58
1 Construct a useful “Somewhat Homomorphic Encryption” scheme 2 Modify your SHE scheme and make it bootstrappable if it is not 3 Bootstrappable SHE −
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 10 / 58
mod n)+1.)
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 11 / 58
mod n)+1.)
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 11 / 58
mod n)+1.)
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 11 / 58
mod n)+1.)
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 11 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 12 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 13 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 14 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 15 / 58
1 Construct a Symmetric Somewhat Homomorphic Encryption
2 By a simple transformation, convert it to a Public-key Somewhat
3 Use Gentry’s techniques to have a public-key FHE
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 16 / 58
2 ⇒ (c1 + c2 mod p) mod 2 ≡ m1 + m2(mod2)
2 ⇒ (c1c2 mod p) mod 2 ≡ m1m2(mod2)
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 17 / 58
Scheme Year Underlying Problems Asymptotic Runtime Concrete Runtime Gentry: A Fully Homomorphic Encryption Scheme 2009 BDDP + SSSP O(λ3.5) per gate for ciphertext refreshing NA van Dijk, Gentry, Halevi, Vaikuntanathan: FHE over the Integers 2010 AGCD + SSSP Public key size: O(λ10), no gate cost given NA Smart, Vercauteren: FHE with Relatively Small Key and Cipher- text Sizes 2010 PCP + SSSP Key generation: O(log n.n2.5) Key generation: several hours even for small pa- rameters, for larger pa- rameters the keys could not be generated Brakerski, Vaikuntanathan: Effi- cient FHE from (standard) LWE 2011 DLWE Evaluation key size: O(λ2C log(λ))
Vaikuntanathan: FHE from Ring-LWE and Security for Key Dependent Messages 2011 PLWE Very cheap key generation, un- known for bootstrapping
Gentry, Vaikun- tanathan: FHE without Bootstrapping 2011 RLWE Per-gate computation overhead O(d3λ log λ) without boot- strapping, O(λ2 log λ) with bootstrapping 36 hours for an AES en- cryption on a supercom- puter
d: Depth of the circuit, n: Dimension of the lattice, C: A very large parameter for ensuring bootstrappability Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 18 / 58
Gentry, Halevi: Implementing Gentry’s Fully-Homomorphic Encryption Scheme 2011 SVP + BDD Key generation: O(log n.n1.5) Bootstrapping: From 30s (for small setting) to 30 min (for large setting) Coron, Naccache, Tibouchi: Public Key Compression and Modulus Switching for FHE
2012 DAGCD + SSSP Public key size: O(λ5 log(λ)), no gate cost given Recryption: 11 min Rohloff, Cousins: A Scalable Im- plementation of Fully Homomor- phic Encryption Built on NTRU 2014 SVP + RLWE
cores with 64-bit security Halevi, Shoup: Bootstrapping for HElib 2015 RLWE
from GF(216) was re- crypted in 5.5 min at se- curity level ≈ 76, single CPU core
Table From: Armknecht et al. [ABCGJRS’15] Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 19 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 20 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 21 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 22 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 23 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 24 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 25 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 26 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 27 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 28 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 29 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 30 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 30 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 30 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 30 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 31 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 32 / 58
u (Cf ) = E −1
K′ u (µu)(cf ) Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 33 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 34 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 35 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 36 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 37 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 38 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 39 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 40 / 58
?
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 41 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 42 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 43 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 44 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 45 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 46 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 46 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 46 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 47 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 47 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 47 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 47 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 48 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 48 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 48 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 49 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 49 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 49 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 49 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 50 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 51 / 58
b
$
← − {0, 1}
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 51 / 58
b
$
← − {0, 1} thr ← DS.Alg(F) ctr ← b
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 51 / 58
b
$
← − {0, 1} thr ← DS.Alg(F) ctr ← b store(): ctr ← ctr + 1 if ctr < thr then sig ← 1 else sig ← 0 return sig
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 51 / 58
b
$
← − {0, 1} thr ← DS.Alg(F) ctr ← b store(): ctr ← ctr + 1 if ctr < thr then sig ← 1 else sig ← 0 return sig
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 51 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 52 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 53 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 53 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 53 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 53 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 53 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 54 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 55 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 56 / 58
Mohsen Toorani Cryptography for Cloud Security Finse Winter School 2017 57 / 58