leakage resilient chosen ciphertext secure public key
play

Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption - PowerPoint PPT Presentation

Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter Baodong Qin and Shengli Liu Shanghai Jiao Tong University ASIACRYPT 2013 Dec 5, Bangalore, India B. Qin and S. Liu LR-CCA Secure


  1. Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter Baodong Qin and Shengli Liu Shanghai Jiao Tong University ASIACRYPT 2013 Dec 5, Bangalore, India B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF

  2. ������������ Why We Consider Secrets Leak? T HEORY R EAL L IFE � � Ideal setting Physical implementation leaks � information Private internal secret state � e.g.: secret key/ randomness secret state secret state B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  3. ������������ Why We Consider Secrets Leak? T HEORY R EAL L IFE � � Ideal setting Physical implementation leaks electromagnetic � information Private internal secret state radiation � e.g.: secret key/ randomness time secret state secret state Side channel attacks sound B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  4. ������������ Why We Consider Secrets Leak? T HEORY R EAL L IFE � � Ideal setting Physical implementation leaks electromagnetic � information Private internal secret state radiation � e.g.: secret key/ randomness time secret state secret state Side channel attacks sound Only computation leaks information [Micali and Reyzin 04] B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  5. ������������ Bounded Leakage Model � Inspired by “cold-boot” attack/memory attack [Halderman et al.08] � Not only computation leaks information � Model: leakage oracle secret key: SK • • • Leakage rate: B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  6. ������������ Public-Key Encryption Semantic security against key leakage and CCA [NS09] Adversary y Decryption queries Leakage queries B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  7. ������������ Public-Key Encryption Semantic security against key leakage and CCA [NS09] Adversary y Decryption The adversary succeeds if queries b=b’ Advantage: Pr[b=b’]-1/2 Leakage queries B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  8. ������������ Previous Works � High leakage-rate (e.g. 1-o(1), using NIZK) but � either no efficient instantiations [NS09] or � over a pairing-friendly group (efficient, but the ciphertext size is a little bit large) [Dodis et al.10, Galindo et al.12] B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  9. ������������ Previous Works � High leakage-rate (e.g. 1-o(1), using NIZK) but � either no efficient instantiations [NS09] or � over a pairing-friendly group (efficient, but the ciphertext size is a little bit large) [Dodis et al.10, Galindo et al.12] � Low leakage rate (e.g. 1/4-o(1)), but � very practical construction via hash proof system [NS09,Li et al.12, Liu et al.13] � has short ciphertext size (for reasonable leakage rate) � Instantiations under DDH, DCR etc. (without pairing) B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  10. ������������ Question From [Dodis et al. Asiacrypt 2010] …, it seems that the hash proof system approach to building CCA encryption is inherently limited to leakage-rates below 1/2: this is because the secret-key consists of two components (one for verifying that the ciphertext is well-formed and one for decrypting it) and the proofs break down if either of the components is individually leaked in its entirety. However, no HPS-based PKEs are known achieving leakage- rate 1/2-o(1), especially under DDH or DCR assumptions. Question: can we find a new way to construct LR-CCA secure PKEs which are as practical as HPS with reasonable high leakage-rates, like 1/2-o(1)? B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  11. ������������ Hash Proof System[CS02] � Family of projective hash functions � Subset membership problem: (valid/invalid) B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  12. ������������ Hash Proof System[CS02] � Family of projective hash functions � Subset membership problem: (valid/invalid) SK space PK space B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  13. ������������ Hash Proof System[CS02] � Family of projective hash functions � Subset membership problem: (valid/invalid) SK space Public evaluation Private evaluation PK space B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  14. ������������ Hash Proof System[CS02] � Family of projective hash functions � Subset membership problem: (valid/invalid) SK space High entropy Public evaluation Private evaluation •universal/universal 2 •smooth PK space B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  15. ������������ HPS-based Approach (language) additional input Prove Mask message B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  16. ������������ HPS-based Approach (language) additional input Prove Mask message B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  17. ������������ HPS-based Approach (language) additional input Prove Mask message •Leakage amount is at most: •In fact smaller than B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  18. ������������ HPS-based Approach (language) additional input Leakage-rate: Prove Mask message •Leakage amount is at most: •In fact smaller than B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  19. ������������ HPS-based Approach (language) additional input Leakage-rate: Best result: 1/4 –o(1) under DDH assumption Prove Mask message •Leakage amount is at most: •In fact smaller than B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  20. ������������ Our Approach (language) additional input Prove Mask message B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  21. ������������ Our Approach (language) additional input Prove Mask message B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  22. ������������ Our Approach (language) additional input Prove Mask message B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  23. ������������ Our Approach (language) additional input Prove Mask message B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  24. ������������ Our Approach (language) additional input Prove Mask message B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  25. ������������ Our Approach (language) additional input Leakage-rate: Our result: 1/2 –o(1) under DDH /DCR Prove Mask message B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  26. ������������ Our Approach (language) additional input Leakage-rate: One-Time Lossy Filter Our result: 1/2 –o(1) under DDH /DCR Prove Mask message B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  27. ������������ ������������ B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  28. ������������ ������������ B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend