efficient public key cryptography with bounded leakage
play

Efficient Public-Key Cryptography with Bounded Leakage and Tamper - PowerPoint PPT Presentation

Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience Antonio Faonio 1 Daniele Venturi 2 Department of Computer Science, Aarhus University, Aarhus, Denmark Department of Information Engineering and Computer Science,


  1. Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience Antonio Faonio 1 Daniele Venturi 2 Department of Computer Science, Aarhus University, Aarhus, Denmark Department of Information Engineering and Computer Science, University of Trento, Trento, Italy December 8, 2016 1/14

  2. (Provable Secure) Crypto before Physical Attacks P1 P2 2/14

  3. Crypto with Physical Attacks P1 P2 ) ) ) ) ) ) ) ) Leak Attacks [Koc96], 3/14

  4. Crypto with Physical Attacks P1 P2 ) ) ) ) ) ) ) ) Leak Attacks [Koc96], Tampering Attacks [BDL97] 3/14

  5. (Minimal) Related Works Memory Circuit [GLMMR04] [IPSW06] Restricted Bounded [DPW10,BK03] [DFMV13] 4/14

  6. (Minimal) Related Works Memory Circuit [GLMMR04] [IPSW06] Restricted Bounded [DPW10,BK03] [DFMV13] Definitions of Bounded-Tamper (and Leakage) Resilience, Identification Scheme and Signatures (ROM), CCA-Secure PKE. 4/14

  7. Our Contributions BTL Signature Scheme. Example. The Imp. result of [GLMMR03] does not hold. 5/14

  8. Our Contributions BTL Signature Scheme. Example. The Imp. result of [GLMMR03] does not hold. BLT CCA Public Key Encryption. Naor-Yung paradigm, what about Cramer-Shoup? 5/14

  9. Introduction BLT-CCA PKE Section 2 BLT-CCA PKE 6/14 Antonio Faonio, Daniele Venturi Efficient Public-Key Cryptography with Bounded Leakage and Tamp

  10. ( t , ℓ )-BLT IND-CCA PKE: c m 7/14

  11. ( t , ℓ )-BLT IND-CCA PKE: ppar c c m m ... A leaks before challenge ℓ bits; A instantiates before challenge t oracles (for ℓ + t � | sk | − ω (log k )) 7/14

  12. The Scheme of [QL13]: Building Blocks 8/14

  13. The Scheme of [QL13]: Building Blocks ǫ -Hash Proof System Complete: For c ∈ V , Pub pk ( c , w ) = Λ sk ( c ). Sound: For c ∈ C \ V ,any pk = µ ( sk ): � H ∞ ( K := Λ sk ( c ) | pk ) � − log ǫ Set Membership Problem. 8/14

  14. The Scheme of [QL13]: Building Blocks ǫ -Hash Proof System Complete: For c ∈ V , Pub pk ( c , w ) = Λ sk ( c ). Sound: For c ∈ C \ V ,any pk = µ ( sk ): � H ∞ ( K := Λ sk ( c ) | pk ) � − log ǫ Set Membership Problem. δ -extractor � H ∞ ( X | Z ) � δ , we have ( Z , S , Ext( X , S )) ≈ ( Z , S , U ) 8/14

  15. The Scheme of [QL13]: Building Blocks, Pt.2 ℓ -(OT-)Lossy Filter LF φ : T × X → Y 9/14

  16. The Scheme of [QL13]: Building Blocks, Pt.2 ℓ -(OT-)Lossy Filter LF φ : T × X → Y tag 9/14

  17. The Scheme of [QL13]: Building Blocks, Pt.2 ℓ -(OT-)Lossy Filter LF φ : T × X → Y tag tag 9/14

  18. The Scheme of [QL13]: Building Blocks, Pt.2 ℓ -(OT-)Lossy Filter LF φ : T × X → Y tag tag Losiness: |{•}| � 2 ℓ ∈ { 0 , 1 } ∗ × T c tag tag Indistinghuishable: 9/14

  19. The Scheme of [QL13]: Building Blocks, Pt.2 ℓ -(OT-)Lossy Filter LF φ : T × X → Y tag tag Losiness: |{•}| � 2 ℓ ∈ { 0 , 1 } ∗ × T c tag tag Indistinghuishable: Evasiviness: It is hard to forge t ∗ c lossy even given one lossy tag. 9/14

  20. The Scheme of [QL13]: m C K Ext S 10/14

  21. The Scheme of [QL13]: m m C C K K Ext Ext S S 10/14

  22. The Scheme of [QL13]: m m m C C C K K K Ext Ext Ext S S S H ∞ ( K ∗ | pk , C ∗ , L ) � − log ε − | L | 10/14

  23. The Scheme of [QL13]: m m m C C C K K K Ext Ext Ext S S S H ∞ ( K ∗ | pk , C ∗ , L ) � − log ε − | L | H ∞ ( K ∗ | pk , C ∗ , L , Π ) � − log ε − | L | − ℓ 10/14

  24. Reduce Tampering to Leakage aux aux = L ( sk ) Interact unbounded with Dec T ( sk ) , while aux small and bounded . 11/14

  25. aux 12/14

  26. aux Let ˜ sk = T ( sk ), leak µ ( ˜ sk ) (( C , S , Φ) , t c , Π) 12/14

  27. aux Let ˜ sk = T ( sk ), leak µ ( ˜ sk ) (( C , S , Φ) , t c , Π) C ∈ V ( C , µ ( ˜ sk )) fully define K . Execute Decryption. 12/14

  28. aux Let ˜ sk = T ( sk ), leak µ ( ˜ sk ) (( C , S , Φ) , t c , Π) C ∈ V ( C , µ ( ˜ sk )) fully define K . Execute Decryption. C �∈ V Depend on H ∞ (Λ ˜ sk ( C ) | View = v ). If big then output ⊥ ; If small then leak ˜ sk and run Dec ˜ sk . 12/14

  29. aux Let ˜ sk = T ( sk ), leak µ ( ˜ sk ) (( C , S , Φ) , t c , Π) C ∈ V ( C , µ ( ˜ sk )) fully define K . Execute Decryption. C �∈ V Depend on H ∞ (Λ ˜ sk ( C ) | View = v ). If big then output ⊥ ; If small then leak ˜ sk and run Dec ˜ sk . Yeah, but what do big and small even mean? 12/14

  30. aux Let ˜ sk = T ( sk ), leak µ ( ˜ sk ) (( C , S , Φ) , t c , Π) C ∈ V ( C , µ ( ˜ sk )) fully define K . Execute Decryption. C �∈ V Depend on H ∞ (Λ ˜ sk ( C ) | View = v ). If big then output ⊥ ; If small then leak ˜ sk and run Dec ˜ sk . Yeah, but what do big and small even mean? I would tell you, if I had time.. 12/14

  31. Mathemagical!! β = s − log ε , s = log | SK | α = log | PK | We pay approx α + β bits of leakage for each tampering oracle. s t = α + β 13/14

  32. Mathemagical!! β = s − log ε , s = log | SK | α = log | PK | We pay approx α + β bits of leakage for each tampering oracle. s t = α + β We can instantiate the HPS using RSI. 13/14

  33. Introduction BLT-CCA PKE Open Problems Is the tampering rate O (1 / k ) inherent? A better Hash Proof System? 14/14 Antonio Faonio, Daniele Venturi Efficient Public-Key Cryptography with Bounded Leakage and Tamp

  34. Introduction BLT-CCA PKE Open Problems Is the tampering rate O (1 / k ) inherent? A better Hash Proof System? Thank You! 14/14 Antonio Faonio, Daniele Venturi Efficient Public-Key Cryptography with Bounded Leakage and Tamp

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend