Fast and Secure Updatable Encryption August 10, 2020 1 Norwegian - - PowerPoint PPT Presentation

fast and secure updatable encryption
SMART_READER_LITE
LIVE PREVIEW

Fast and Secure Updatable Encryption August 10, 2020 1 Norwegian - - PowerPoint PPT Presentation

Fast and Secure Updatable Encryption August 10, 2020 1 Norwegian University of Science and Technology (NTNU), Norway 2 Bergische Universitt Wuppertal, Germany 1 Colin Boyd 1 Gareth T. Davies 2 Kristian Gjsteen 1 Yao Jiang 1 Table of contents


slide-1
SLIDE 1

Fast and Secure Updatable Encryption

Colin Boyd 1 Gareth T. Davies 2 Kristian Gjøsteen 1 Yao Jiang 1 August 10, 2020

1Norwegian University of Science and Technology (NTNU), Norway 2Bergische Universität Wuppertal, Germany

1

slide-2
SLIDE 2

Table of contents

  • 1. Updatable Encryption
  • 2. Security Properties
  • 3. Relations
  • 4. UE Constructions
  • 5. Summary

2

slide-3
SLIDE 3

Updatable Encryption

slide-4
SLIDE 4

Problem Motivation: Outsourcing

3

Enck0(m) = C0 k0 C0

slide-5
SLIDE 5

Problem Motivation: Outsourcing

3

Deck0(C0) = m0 k0 C0

  • Threats: Key compromise
slide-6
SLIDE 6

Problem Motivation: Outsourcing

3

k0

k1

C0 C1

  • Threats: Key compromise
  • Solution: Key rotation
slide-7
SLIDE 7

Key Rotation: a standard approach

4

k1 k0 C0

slide-8
SLIDE 8

Key Rotation: a standard approach

4

k1 k0 m = Deck0(C0)

slide-9
SLIDE 9

Key Rotation: a standard approach

4

k1 k0 k0 Enck1(m) = C1

slide-10
SLIDE 10

Key Rotation: a standard approach

4

k1 k0 k0 C1 C1

  • Download and re-upload is infeasible

even for moderate storage requirements

slide-11
SLIDE 11

Key Rotation: Updatable Encryption (UE)

5

k1 ∆1 k0

C0 ∆1 C1

  • Key Homomorphic PRFs and their Applications

Boneh, Lewi, Montgomery, Raghunathan; CRYPTO ’13 (+ ePrint 2015/220)

slide-12
SLIDE 12

Key Rotation: Updatable Encryption (UE)

5

  • Client only ever needs to store one key
  • fresh encryptions, updated ciphertexts and tokens should all reveal

nothing about plaintext

k1 ∆1 k0

C0 ∆1 C1

  • Key Homomorphic PRFs and their Applications

Boneh, Lewi, Montgomery, Raghunathan; CRYPTO ’13 (+ ePrint 2015/220)

slide-13
SLIDE 13

What Is Realistic?

  • Security properties: confjdentiality and integrity
  • What an attacker can possibly do?
  • What is the right security notion for UE?
  • Users do encryption, then server(s) update ciphertexts

for millions of users

  • Encryption and update must be effjcient

6

  • Updatable Encryption with Post-Compromise Security

Lehmann, Tackmann; Eurocrypt ’18

slide-14
SLIDE 14

Security Properties

slide-15
SLIDE 15

Epoch-based Corruptions

1 2 3 4 5 6 7 … n ∆1 ∆2 ∆3 ∆4 ∆5 ∆6 ∆7 … k0 k1 k2 k3 k4 k5 k6 k7 … kn C0 C1 C2 C3 C4 C5 C6 C7 … Cn

7

  • Directly obtained information:
  • Adversary adaptively corrupts keys and tokens
  • Adversary can asks for ciphertexts
  • Inferred information (Assume bi-directionality):
  • Ci+1 and ∆i+1 is enough to compute Ci
  • ki+1 and ∆i+1 is enough to compute ki
  • ki and ki+1 is enough to compute ∆i+1
  • Adversary can use this information to trivially win a security game!
slide-16
SLIDE 16

Confidentiality: a motivating example

8

k0 Enck0(Contact A) = C0 C0

slide-17
SLIDE 17

Confidentiality: a motivating example

8

C0

∆1

k0

k1 ∆1 ∆1

C′

slide-18
SLIDE 18

Confidentiality: a motivating example

8

k1

C0 ∆1 C′

slide-19
SLIDE 19

Confidentiality: a motivating example

8

k1

C′ Enck1(Contact B) = C1 C1 C1 C′

  • Which ciphertext is the newest?
  • How many ciphertexts are recently added?
slide-20
SLIDE 20

Prior notions: Indistinguishability of Encryptions (IND-ENC)

9

  • Updatable Encryption with Post-Compromise Security

Lehmann, Tackmann; Eurocrypt ’18

AIND-ENC m0, m1 ˜ C˜

e b

$

← − {0, 1} ˜ C˜

e ← Enc(mb)

b′ O.Enc O.Dec O.Next

e → e + 1

O.Corr O.Upd O.Upd˜ C

m Ce Ce m (e, key/token) ke/∆e C Ce ˜ C ˜ Ce

  • Challenger checks for trivial wins

Only in CCA games does an adversary have access to O.Dec

slide-21
SLIDE 21

Prior notions: Indistinguishability of Updates (IND-UPD)

10

  • Updatable Encryption with Post-Compromise Security

Lehmann, Tackmann; Eurocrypt ’18

AIND-UPD C0, C1 ˜ C˜

e b

$

← − {0, 1} ˜ C˜

e ← Upd(Cb)

b′ O.Enc O.Dec O.Next

e → e + 1

O.Corr O.Upd O.Upd˜ C

m Ce Ce m (e, key/token) ke/∆e C Ce ˜ C ˜ Ce

  • Challenger checks for trivial wins

Only in CCA games does an adversary have access to O.Dec

slide-22
SLIDE 22

What else do we want to achieve?

11

  • None of the prior notions capture our journalist motivating example.
  • Can we fjnd a notion captures a ciphertext freshly created is

indistinguishable from an updated ciphertext?

slide-23
SLIDE 23

A New Notion for Updatable Encryption (IND-UE)

12

AIND-UE m, C˜

e-1

˜ C˜

e b

$

← − {0, 1} if b = 0 : ˜ C˜

e ← Enc(m)

if b = 1 : ˜ C˜

e ← Upd(C˜ e−1)

b′ O.Enc O.Dec O.Next

e → e + 1

O.Corr O.Upd O.Upd˜ C

m Ce Ce m (e, key/token) ke/∆e C Ce ˜ C ˜ Ce

  • Challenger checks for trivial wins

Scheme that leaks epoch number of original upload can be IND-ENC and IND-UPD but not IND-UE

IND-ENC + IND-UPD ⇏ IND-UE

Only in CCA games does an adversary have access to O.Dec

slide-24
SLIDE 24

Ciphertext integrity

13

AINT-CTXT ˜ C˜

e m′ ← Dec(˜ C˜

e)

if m′ ̸= ⊥ : A wins if m′ = ⊥ : A loses

O.Enc O.Next

e → e + 1

O.Corr O.Upd

m Ce (e, key/token) ke/∆e C Ce

  • Challenger checks for trivial wins∗
  • CPA + CTXT =

⇒ CCA?

  • (R)CCA secure updatable encryption with integrity protection

Klooß, Lehmann and Rupp; Eurocrypt ’19

slide-25
SLIDE 25

Relations

slide-26
SLIDE 26

Relations among IND-ENC, IND-UPD and IND-UE

14

randIND-UE-CPA IND-ENC-CPA randIND-UPD-CPA IND-ENC-CPA +randIND-UPD-CPA \ detIND-UE-CPA IND-ENC-CPA detIND-UPD-CPA IND-ENC-CPA +detIND-UPD-CPA \ \ detIND-UE-CCA IND-ENC-CPA detIND-UPD-CCA IND-ENC-CCA +detIND-UPD-CCA \

slide-27
SLIDE 27

Relations among CPA, CTXT and CCA

15

CPA + CTXT = ⇒ CCA for UE IND-ENC-CPA + INT-CTXT = ⇒ IND-ENC-CCA det IND-UPD-CPA + INT-CTXT = ⇒ det IND-UPD-CCA det IND-UE-CPA + INT-CTXT = ⇒ det IND-UE-CCA

slide-28
SLIDE 28

UE Constructions

slide-29
SLIDE 29

Secure Homomorphic Ideal-cipher Nonce-based Encryption (SHINE)

16

SHINE.Enc : N||m π Expk1 C C = π(N||m)k1 SHINE.Dec : N||m N||m = π−1(C1/k1) π−1 Exp1/k1 C

slide-30
SLIDE 30

Secure Homomorphic Ideal-cipher Nonce-based Encryption (SHINE)

16

SHINE.Upd : N||m π Expk1 C1 C1 = π(N||m)k1 Exp∆2 C2 C2 = π(N||m)k2 ∆2 = k2/k1 N||m π−1 Exp1/k2

slide-31
SLIDE 31

OK, but is it secure?

17

  • How can we embed the challenge, with deterministic

updates and adaptive security?

  • Partition epoch set into air-gapped segments (‘fjrewalls’)
  • Updatable Encryption with Post-Compromise Security

Lehmann, Tackmann; Eurocrypt ’18

  • (R)CCA secure updatable encryption with integrity protection

Klooß, Lehmann and Rupp; Eurocrypt ’19

slide-32
SLIDE 32

Firewalls: cryptographic separation

1 2 3 4 5 6 7 … n ∆1 ∆2 ∆3 ∆4 ∆5 ∆6 ∆7 … k0 k1 k2 k3 k4 k5 k6 k7 … kn C0 C1 C2 C3 C4 C5 C6 C7 … Cn

18

k5 k6 k2 ∆4 ∆3 ∆5

  • Firewalls (insulated region) defjnition:
  • No key inside fjrewalls is corrupted
  • Tokens ‘on’ the fjrewalls are not corrupted
  • All tokens inside fjrewalls are corrupted
  • Separate keys, tokens and ciphertexts using fjrewalls
slide-33
SLIDE 33

OK, but is it secure?

19

  • How can we embed the challenge, with deterministic

updates and adaptive security?

  • Partition epoch set into air-gapped segments (‘fjrewalls’)
  • Hybrid argument across insulated regions
  • Embed the challenge in the i-th insulated region.
  • Updatable Encryption with Post-Compromise Security

Lehmann, Tackmann; Eurocrypt ’18

  • (R)CCA secure updatable encryption with integrity protection

Klooß, Lehmann and Rupp; Eurocrypt ’19

slide-34
SLIDE 34

Hybrid argument across insulated regions

1 2 3 4 5 6 7 . . . n ∆1 ∆2 ∆3 ∆4 ∆5 ∆6 ∆7 . . . k0 k1 k2 k3 k4 k5 k6 k7 . . . kN C0 C1 C2 C3 C4 C5 C6 C7 . . . CN

20

1st 2nd 3rd Nth k7 k6 k2 L tw tw L L L tw L L ∆1 ∆5 ∆7

  • Game 0
slide-35
SLIDE 35

Hybrid argument across insulated regions

1 2 3 4 5 6 7 . . . n ∆1 ∆2 ∆3 ∆4 ∆5 ∆6 ∆7 . . . k0 k1 k2 k3 k4 k5 k6 k7 . . . kN C0 C1 C2 C3 C4 C5 C6 C7 . . . CN

20

1st 2nd 3rd Nth k7 k6 k2 L tw tw L L L tw R R ∆1 ∆5 ∆7

  • Game 1
slide-36
SLIDE 36

Hybrid argument across insulated regions

1 2 3 4 5 6 7 . . . n ∆1 ∆2 ∆3 ∆4 ∆5 ∆6 ∆7 . . . k0 k1 k2 k3 k4 k5 k6 k7 . . . kN C0 C1 C2 C3 C4 C5 C6 C7 . . . CN

20

1st 2nd 3rd Nth k7 k6 k2 L tw tw L L R tw R R ∆1 ∆5 ∆7

  • Game 2
slide-37
SLIDE 37

Hybrid argument across insulated regions

1 2 3 4 5 6 7 . . . n ∆1 ∆2 ∆3 ∆4 ∆5 ∆6 ∆7 . . . k0 k1 k2 k3 k4 k5 k6 k7 . . . kN C0 C1 C2 C3 C4 C5 C6 C7 . . . CN

20

1st 2nd 3rd Nth k7 k6 k2 L tw tw R R R tw R R ∆1 ∆5 ∆7

  • Game 3
slide-38
SLIDE 38

Hybrid argument across insulated regions

1 2 3 4 5 6 7 . . . n ∆1 ∆2 ∆3 ∆4 ∆5 ∆6 ∆7 . . . k0 k1 k2 k3 k4 k5 k6 k7 . . . kN C0 C1 C2 C3 C4 C5 C6 C7 . . . CN

20

1st 2nd 3rd Nth k7 k6 k2 R tw tw R R R tw R R ∆1 ∆5 ∆7

  • Game N
slide-39
SLIDE 39

OK, but is it secure?

21

SHINE is det IND-UE-CPA Secure

Assuming DDH, and in the ideal cipher model

slide-40
SLIDE 40

SHINE0

22

SHINE0.Enc : N||m||0t π Expk1 C SHINE0.Dec : N′||m′||Z = 0t? π−1 Exp1/k1 C

slide-41
SLIDE 41

OK, but is it secure?

23

SHINE is det IND-UE-CPA Secure

Assuming DDH, and in the ideal cipher model

SHINE is INT-CTXT Secure

Assuming CDH, and in the ideal cipher model

SHINE is det IND-UE-CCA Secure

Assuming DDH and CDH, and in the ideal cipher model

slide-42
SLIDE 42

OK, but is it secure?

24

IND INT BLMR+ (weak,UE,CPA) ✘ RISE (rand,UE,CPA) ✘ NYUAE (rand, ENC, RCCA) (rand, UPD, RCCA) PTXT E&M (det, ENC, CCA) (det, UPD, CCA) CTXT SHINE0 (det, UE, CCA) CTXT MirrorSHINE (det, UE, CCA) CTXT OCBSHINE (det, UE, CCA) CTXT

(xx, yy, atk) represents the best possible xxIND-yy-atk notion that each scheme can achieve.

slide-43
SLIDE 43

OK, but is it effjcient?

25

|M| |C| Enc (Upd) BLMR+ n|G| (n + 1)|G| nE RISE 1|G| 2|G| 2E NYUAE 1|G1| (58|G1|, 44|G2|) (110E,90E) E&M 1|G| 3|G| 3E SHINE0[CPA] (1 − γ)|G| 1|G| 1E SHINE0 (1 − 2γ)|G| 3|G| 3E MirrorSHINE (1 − γ)|G| 2|G| 2E OCBSHINE n|G| (n + 2)|G| (n + 2)E

E = Exponentiation

γ represents the bit-size of the used nonce as a proportion of the group element bit-size. BLMR+ and OCBSHINE support encryption of arbitrary size messages (of n blocks), with |M| ≈ n|G|.

slide-44
SLIDE 44

Summary

slide-45
SLIDE 45

Summary

26

  • New notion, IND-UE, that implies past notions
  • Generic composition result
  • New scheme, SHINE, that meets detIND-UE-CCA and INT-CTXT
  • A greater understanding of the proof techniques
  • in particular in the context of deterministic updates
slide-46
SLIDE 46

Thank you for your attention! Questions?

27