fast cryptographic primitives circular secure encryption
play

Fast Cryptographic Primitives & Circular-Secure Encryption - PowerPoint PPT Presentation

Fast Cryptographic Primitives & Circular-Secure Encryption Based on Hard Learning Problems Benny Applebaum, David Cash, Chris Peikert, Amit Sahai Princeton University, Georgia Tech, SRI international, UCLA CRYPTO 2009 Learning Noisy Linear


  1. Fast Cryptographic Primitives & Circular-Secure Encryption Based on Hard Learning Problems Benny Applebaum, David Cash, Chris Peikert, Amit Sahai Princeton University, Georgia Tech, SRI international, UCLA CRYPTO 2009

  2. Learning Noisy Linear Functions Learning Parity with Noise (LPN) Problem: find s n n ∈ Z 2 ∈ ∈ ∈ a i b i =<a i ,s>+noise s m = + A x b ε ε ε ε n s ∈ ∈ ∈ Z 2 ∈ iid noise vector of rate ε ε ε ε e.g., ε ε ε =1/4 ε • Extension to larger moduli: Learning-with-Errors (LWE) [Reg05] : - Z q where q(n)=poly(n) is typically prime - Gaussian noise w/mean 0 and std ≈ sqrt(q) (q-1)/2 -(q-1)/2 0

  3. Learning Noisy Linear Functions Problem: find s n s m = + A x b ε ε ε ε • Assumption: LWE/LPN is computationally hard for all m=poly(n) • Well studied in Coding Theory/Learning Theory/ Crypto [GKL93,BFKL93, Chab94,Kearns98,BKW00,HB01,JW05,Lyu05,FGKP06,KS06,PW08,GPV08,PVW08…] • Pros: - Reduction from worst-case Lattice problems [Reg05,Peik09] - Hardness of search problem - So far resists sub-exp & quantum attacks

  4. Why LWE/LPN ? • Problem has simple algebraic structure: “almost linear” function - exploited by [BFKL94, AIK07, D-TK-L09] rare • Computable by simple (bit) operations (low hardware complexity) combination - exploited by [HB01,AIK04,JW05] • Message of this talk: Very useful combination s + = A x b ε ε ε ε

  5. Main Results This talk: • Fast circular secure encryption schemes - Symmetric encryption from LPN - Public-key encryption from LWE • Fast pseudorandom objects from LPN - Pseudorandom generator G:{0,1} n → {0,1} 2n in quasi-linear time - Oblivious weak randomized pseudorandom function

  6. Encryption Scheme • Security: Even if Adv gets information cannot break scheme. - CPA [GM82] :given oracle to E key () can’t distinguish E k (m 1 ) from E k (m 2 ) • What if Adv sees E k (msg) where msg depends on the key (KDM attack)? -E.g., E key (key) or E key (f(key)) or E k1 (k 2 ) and E k2 (k 1 ) randomness message ciphertext Enc Dec message key key

  7. KDM / circular security F-KDM Security [BlackRogawayShrimpton02] : Adv gets E k (f(k)) for f ∈ F Circular security [CamenischLysyanskaya01] : Adv gets E k1 (k 2 ), E k2 (k 3 )…, E ki (k 1 ) Can we achieve KDM/circular security? • many recent works [BRS02, HK07, BPS07, BHHO08, CCS08, BDU08, HU08,HH08] • natural question also arises in: - disk encryption or key-management systems [BHHO08]: Yes, we can ! - anonymous credential systems via key cycles [CL01] - axiomatic security [AdaoBanaHerzogScedrov05] - Gentry’s fully homomorphic scheme [Gen09] • non-trivial to achieve: - some ciphers become insecure under KDM attacks (e.g.,AES in LRW mode) - random oracle constructions are problematic [HofheintzUnruh08,HaleviKrawczyk07] - can’t get KDM from trapdoor permutation in a black-box way [HaitnerHolenstein08]

  8. BHHO Scheme vs. Our Scheme • [BonehHaleviHamburgOstrovsky08] First circular public-key scheme from DDH - Get “clique” security + KDM for affine functions - But large computational/communication overhead - t-bit message: Time : t exponentiations (compare to El-Gamal) Communication : t group elements • Our schemes: circular encryption under LPN/LWE - Get “clique” security + KDM for affine functions - Proofs of security follow the [BHHO08] approach - Circular security comes “for free” from standard schemes - Efficiency comparable to standard LWE/LPN schemes - t-bit message: Time : symmetric case: t·polylog(t); t 2 ·polylog(t) public-key: Communication : O(t) bits.

  9. Symmetric Scheme from LPN

  10. Symmetric Scheme • Let G be a good linear error-correcting code with decoder for noise ε +0.1 Enc s (mes; A, err)= (A, As+err + G·mes) Dec s (A,y)= decoder(y-As) • Natural scheme originally from [GilbertRobshawSeurin08] - independently discovered by [A08,DodisTauman-KalaiLovet09] • Also obtain amortized version with quasilinear implementation (See paper) randomness randomness key message s u + + A A err G , Good Error-Correcting-Code

  11. Clique Security Enc s (mes; A, err)= (A, As+err + G·mes ) Dec s (A,y)= decoder(y-As) Thm. Scheme is circular (clique) secure and KDM w/r to affine functions Proof: • Useful properties: - Plaintext homomorphic: Given E s (u) and v can compute E s (u+v) (A, As+err ) +G ⋅ (u+v) +G ⋅ u +G ⋅ v

  12. Clique Security Enc s (mes; A, err)= (A, As+err + G·mes ) Dec s (A,y)= decoder(y-As) Thm. Scheme is circular (clique) secure and KDM w/r to affine functions Proof: • Useful properties: - Plaintext homomorphic: Given E s (u) and v can compute E s (v+u) - Key homomorphic: Given E s (u) and r can compute E s+r (u) (A, +err+Gu ) A ⋅ (s+r) A ⋅ s +A ⋅ r

  13. Clique Security Enc s (mes; A, err)= (A, As+err + G·mes ) Dec s (A,y)= decoder(y-As) Thm. Scheme is circular (clique) secure and KDM w/r to affine functions Proof: • Useful properties: - Plaintext homomorphic: Given E s (u) and v can compute E s (v+u) - Key homomorphic: Given E s (u) and r can compute E s+r (u) - Self referential: Given E s (0) can compute E s (s) (A , As +err) -G = (A’ , +err) (A’+G)s As = (A’ , A’s +err + Gs) = E s (s)

  14. Clique Security Enc s (mes; A, err)= (A, As+err + G·mes ) Dec s (A,y)= decoder(y-As) Thm. Scheme is circular (clique) secure and KDM w/r to affine functions Proof: • Useful properties: - Plaintext homomorphic: Given E s (u) and v can compute E s (v+u) - Key homomorphic: Given E s (u) and r can compute E s+r (u) - Self referential: Given E s (0) can compute E s (s) • Suppose that Adv break clique security (can ask for E Si (S k ) for all 1 ≤ i,k ≤ t) • Construct B that breaks standard CPA security (w/r to single key S). • B simulates Adv: choose t offsets ∆ 1 ,…, ∆ t and pretend that S i =S+ ∆ i - Simulate E si (S k ): get E s (0) → E s (S) → E s+ ∆ i (S) → E s+ ∆ i (S+ ∆ k )

  15. Public-key Scheme from LWE

  16. Regev’s Scheme - [GPV-PVW08] variant n × m , b ∈ Z q m • Public-key: A ∈ Z q s n • Secret-key: s ∈ Z q A x b + = ε ε ε ε • Encrypt z ∈ Z p ⊂ Z q by (u ∈ Z q n ,c ∈ Z q ) fixed linear ECC random randomness vector (u, <s,u>+err+g ⋅ (message)) Enc message distribution over low-weight elements public-key • To Decrypt (u,c): compute c-<s,u>=g ⋅ mes+err and decode • CPA Security in [Regev05, GentryPeikertVaikuntanathan08] • Want: Plaintext homomorphic, Self referential, Key homomorphic

  17. Regev’s Scheme - [GPV-PVW08] variant n × m , b ∈ Z q m • Public-key: A ∈ Z q s n • Secret-key: s ∈ Z q A x b + = ε ε ε ε • Encrypt z ∈ Z p ⊂ Z q by (u ∈ Z q n ,c ∈ Z q ) fixed linear ECC random randomness vector (u, <s,u>+err+g ⋅ (message)) Enc message distribution over low-weight elements public-key • To Decrypt (u,c): compute c-<s,u>=g ⋅ mes+err and decode • CPA Security in [Regev05, GentryPeikertVaikuntanathan08] • Want: Plaintext homomorphic, Self referential , Key homomorphic

  18. Self Reference n × m , b ∈ Z q m • Public-key: A ∈ Z q s s n • Secret-key: s ∈ Z q A x b + = ε ε ε ε • Encrypt z ∈ Z p ⊂ Z q by (u ∈ Z q n ,c ∈ Z q ) randomness (u, <s,u>+err+g ⋅ (message)) Enc message public-key • Can we convert E(0) to E(s 1 ) ? • Can use prev ideas (up to some technicalities) but… • Problem: s 1 may not be in Z p • Sol: Choose s with entries in Z p by sampling from Gaussian around (0 ± p/2) • Security: we show how to convert standard LWE to LWE with s ← Noise

  19. Hardness of LWE with s ← Noise Convert standard LWE to LWE with s ← Noise 1. Get (A,b) s.t A is invertible A b n s ∈ ∈ Z q ∈ ∈ s A x b + =

  20. Hardness of LWE with s ← Noise Convert standard LWE to LWE with s ← Noise • If ( α , β ) ← LWE s then ( α ’, β ’) ← LWE x Proof: β ’= β +< α ’,b> = < α ,s>+e + < α ’,As>+< α ’,x> = < α ,s>+e + <-A -1 α ,As>+< α ’,x> -A -1 α β +< α ’,b> < α ,s>+e α α α α ’ β β β β ’ α α α α β β β β n s ∈ ∈ ∈ ∈ Z q x ∈ ∈ ∈ Noise ∈ A s x b + =

  21. Hardness of LWE with s ← Noise Convert standard LWE to LWE with s ← Noise • If ( α , β ) ← LWE s then ( α ’, β ’) ← LWE x • If ( α , β ) are uniform then ( α ’, β ’) also uniform • Hence distinguisher for LWE x yields a distinguisher for LWE s - α A -1 β +< α ’,b> < α ,s>+e α α α α ’ β β β β ’ α α α α β β β β n s ∈ ∈ ∈ ∈ Z q x ∈ ∈ ∈ Noise ∈ A s x b + =

  22. Hardness of LWE with s ← Noise • Reduction generates invertible linear mapping f A,b :s → x (A,b) n x ∈ ∈ ∈ ∈ Noise s ∈ ∈ Z q ∈ ∈ A s x b + =

  23. Hardness of LWE with s ← Noise • Reduction generates invertible linear mapping f A,b :s → x • Key Hom: get pk’s whose sk’s x 1 ,..,x k satisfy known linear-relation • Together with prev properties get circular (clique) security x k ∈ ∈ Noise ∈ ∈ (A k ,b k ) • • • • • • • • • • • • • • • • • • • • • • • • (A 1 ,b 1 ) n x 1 ∈ ∈ ∈ Noise ∈ s ∈ ∈ Z q ∈ ∈ • Improve efficiency via amortized version of [PVW08]

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend