Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation
Yu Chen1 Yuyu Wang2 Hong-Sheng Zhou3
1SKLOIS-IIE-CAS, UCAS 2Tokyo Institute of Technology, IOHK, AIST 3Virginia Commonwealth University
ASIACRYPT 2018
- Dec. 5th 2018
1 / 55
Leakage-Resilient Cryptography from Puncturable Primitives and - - PowerPoint PPT Presentation
Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation ASIACRYPT 2018 Dec. 5th 2018 1 / 55 Yu Chen 1 Yuyu Wang 2 Hong-Sheng Zhou 3 1 SKLOIS-IIE-CAS, UCAS 2 Tokyo Institute of Technology, IOHK, AIST 3 Virginia Commonwealth
1SKLOIS-IIE-CAS, UCAS 2Tokyo Institute of Technology, IOHK, AIST 3Virginia Commonwealth University
1 / 55
1 Background 2 Motivation 3 Primitives 4 Our Framework Towards Leakage-Resilience
5 Achieving Optimal Leakage Rate
2 / 55
1 Background 2 Motivation 3 Primitives 4 Our Framework Towards Leakage-Resilience
5 Achieving Optimal Leakage Rate
3 / 55
leakage proof black-box leakage prone leakage attacks (since 1996) invalidate this idealized assumption
4 / 55
leakage proof black-box leakage prone leakage attacks (since 1996) invalidate this idealized assumption
4 / 55
leakage proof black-box leakage prone leakage attacks (since 1996) invalidate this idealized assumption
4 / 55
leakage proof black-box leakage prone leakage attacks (since 1996) invalidate this idealized assumption
4 / 55
leakage proof black-box leakage prone leakage attacks (since 1996) invalidate this idealized assumption
4 / 55
leakage proof black-box leakage prone leakage attacks (since 1996) invalidate this idealized assumption
4 / 55
leakage proof black-box leakage prone leakage attacks (since 1996) invalidate this idealized assumption
4 / 55
leakage proof black-box leakage prone leakage attacks (since 1996) invalidate this idealized assumption
4 / 55
leakage proof black-box leakage prone leakage attacks (since 1996) invalidate this idealized assumption
4 / 55
leakage proof black-box leakage prone leakage attacks (since 1996) invalidate this idealized assumption
4 / 55
leakage proof black-box leakage prone leakage attacks (since 1996) invalidate this idealized assumption
4 / 55
5 / 55
6 / 55
6 / 55
6 / 55
1 Background 2 Motivation 3 Primitives 4 Our Framework Towards Leakage-Resilience
5 Achieving Optimal Leakage Rate
7 / 55
8 / 55
9 / 55
10 / 55
11 / 55
12 / 55
1 Background 2 Motivation 3 Primitives 4 Our Framework Towards Leakage-Resilience
5 Achieving Optimal Leakage Rate
13 / 55
14 / 55
R R
15 / 55
R R
15 / 55
0 ← F(k, x∗)
1
R
R
15 / 55
0 ← F(k, x∗)
1
R
R
β
15 / 55
0 ← F(k, x∗)
1
R
R
β
15 / 55
0 ← F(k, x∗)
1
R
R
β
15 / 55
R
R R
16 / 55
R
0 ← F(k, x∗)
1
R
R
16 / 55
R
0 ← F(k, x∗)
1
R
R
β
16 / 55
R
0 ← F(k, x∗)
1
R
R
β
16 / 55
R
0 ← F(k, x∗)
1
R
R
β
16 / 55
17 / 55
17 / 55
17 / 55
1 Background 2 Motivation 3 Primitives 4 Our Framework Towards Leakage-Resilience
5 Achieving Optimal Leakage Rate
18 / 55
19 / 55
19 / 55
19 / 55
19 / 55
19 / 55
20 / 55
20 / 55
20 / 55
20 / 55
20 / 55
21 / 55
21 / 55
21 / 55
21 / 55
c(sk) w.r.t. f (auxliary-input
21 / 55
22 / 55
23 / 55
R
Encaps Constants: PPRF key sk Input: randomness r ∈ {0, 1}λ
1 compute x ← G(r); output c = x, k ← F(sk, x) 24 / 55
R
25 / 55
R
25 / 55
R
25 / 55
1 Background 2 Motivation 3 Primitives 4 Our Framework Towards Leakage-Resilience
5 Achieving Optimal Leakage Rate
26 / 55
27 / 55
27 / 55
27 / 55
27 / 55
27 / 55
27 / 55
28 / 55
29 / 55
29 / 55
R R
30 / 55
R R
30 / 55
0 ← F(sk, x∗)
1
R
R
β, skx∗
30 / 55
0 ← F(sk, x∗)
1
R
R
β, skx∗
30 / 55
0 ← F(sk, x∗)
1
R
R
β, skx∗
30 / 55
0 ← F(sk, x∗)
1
R
R
β, skx∗
30 / 55
Priv Constants: Punc-PEPRF secret key Input:
1
Ext
31 / 55
Priv Constants: Punc-PEPRF secret key Input:
1
Ext
31 / 55
Priv Constants: Punc-PEPRF secret key Input:
1
Ext
31 / 55
Priv Constants: Punc-PEPRF secret key Input:
1
Ext
31 / 55
Priv Constants: Punc-PEPRF secret key sk Input: ˆ x = (x, s)
1
31 / 55
Priv∗ Constants: Punc-PEPRF punctured key skx∗, x∗ and y∗ Input: ˆ x = (x, s)
1 If x = x∗, output Ext(y∗, s). Else, output Ext(F(skx∗, x), s).
R
32 / 55
33 / 55
34 / 55
1 Background 2 Motivation 3 Primitives 4 Our Framework Towards Leakage-Resilience
5 Achieving Optimal Leakage Rate
35 / 55
Priv Constants: wPPRF secret key sk Input: ˆ x = (x, s)
1
36 / 55
1 Background 2 Motivation 3 Primitives 4 Our Framework Towards Leakage-Resilience
5 Achieving Optimal Leakage Rate
37 / 55
R
Verify Constants: sPPRF key k Input: message m and signature σ
1 output g(σ) =?g(F(k, m)). 38 / 55
Verify∗ Constants: punctured sPPRF key km∗ and z∗ Input: message m and signature σ
1 If m = m∗, output g(σ) =?z∗. 2 Else, output g(σ) =?g(F(km∗, m)).
39 / 55
1 express signing algorithm as a program and obfuscate the program as sk 2 simulate leakage queries with function-equivalent key – an obfuscation of a
40 / 55
1 express signing algorithm as a program and obfuscate the program as sk 2 simulate leakage queries with function-equivalent key – an obfuscation of a
40 / 55
1 express signing algorithm as a program and obfuscate the program as sk 2 simulate leakage queries with function-equivalent key – an obfuscation of a
40 / 55
41 / 55
1 Background 2 Motivation 3 Primitives 4 Our Framework Towards Leakage-Resilience
5 Achieving Optimal Leakage Rate
42 / 55
43 / 55
44 / 55
44 / 55
Priv Constants: Punc-PEPRF secret key sk Input: ˆ x = (x, s)
1 Output z ← Ext(F(sk, x), s)
Priv Constants: Punc-PEPRF secret key sk, t∗ Input: ct, ˆ x = (x, s)
1 If h(ct) ̸= t∗, output ⊥. Else, output z ← Ext(F(sk, x), s).
45 / 55
R
Priv∗ Constants: Punc-PEPRF punctured secret key skx∗, ke, t∗ Input: ct, ˆ x = (x, s)
1 If h(ct) ̸= t∗, output ⊥. 2 Else if x = x∗, set y∗ ← SKE.Dec(ke, ct), output z ← Ext(y∗, s). 3 Otherwise, output z ← Ext(F(sk, x), s).
46 / 55
47 / 55
48 / 55
1 wPPRF+iO ⇝ LR wPRF ⇒ LR-SKE 2 punc-PEPRF+iO ⇝ LR PEPRF ⇒ LR-PKE
as a building block of independent interest, we realize punc-PEPRF from newly introduced punc-objects such as PTDFs and PEHPS.
3 sPPRF+ LR-OWF + iO ⇒ the fjrst LR-public-coin Sig
solve the open problem posed by Boyle et al. (Eurocrypt 2011)
4 By further assuming lossy functions, all the above constructions achieve
solve the open problem posed by Dachman-Soled et al. (PKC 2016, JOC 2018)
49 / 55
50 / 55
50 / 55
50 / 55
50 / 55
50 / 55
50 / 55
50 / 55
51 / 55
[ADN+10] Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Segev, Shabsi Walfjsh, and Daniel Wichs. Public-key encryption in the bounded-retrieval model. In EUROCRYPT, pages 113–134, 2010. [ADW09] Joël Alwen, Yevgeniy Dodis, and Daniel Wichs. Leakage-resilient public-key cryptography in the bounded-retrieval model. In CRYPTO, pages 36–54, 2009. [AGV09] Adi Akavia, Shafj Goldwasser, and Vinod Vaikuntanathan. Simultaneous hardcore bits and cryptography against memory attacks. In TCC, pages 474–495, 2009. [BG10] Zvika Brakerski and Shafj Goldwasser. Circular and leakage resilient public-key encryption under subgroup indistinguishability - (or: Quadratic residuosity strikes back). In CRYPTO, pages 1–20, 2010. [BGI+12] Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil P. Vadhan, and Ke Yang. On the (im)possibility of obfuscating programs. J. ACM, 59(2):6, 2012. [BKKV10] Zvika Brakerski, Yael Tauman Kalai, Jonathan Katz, and Vinod Vaikuntanathan. Overcoming the hole in the bucket: Public-key cryptography resilient to continual memory
[BSW11] Elette Boyle, Gil Segev, and Daniel Wichs. Fully leakage-resilient signatures. In EUROCRYPT, pages 89–108, 2011. [CQX18] Yu Chen, Baodong Qin, and Haiyang Xue. Regularly lossy functions and their applications. In CT-RSA, 2018.
52 / 55
[CZ14] Yu Chen and Zongyang Zhang. Publicly evaluable pseudorandom functions and their
[DGK+10] Yevgeniy Dodis, Shafj Goldwasser, Yael Tauman Kalai, Chris Peikert, and Vinod
361–381, 2010. [DGL+16] Dana Dachman-Soled, S. Dov Gordon, Feng-Hao Liu, Adam O’Neill, and Hong-Sheng Zhou. Leakage-resilient public-key encryption from obfuscation. In PKC, pages 101–128, 2016. [DHLW10] Yevgeniy Dodis, Kristiyan Haralambiev, Adriana López-Alt, and Daniel Wichs. Effjcient public-key cryptography in the presence of key leakage. In ASIACRYPT, pages 613–631, 2010. [DKL09] Yevgeniy Dodis, Yael Tauman Kalai, and Shachar Lovett. On cryptography with auxiliary
[DY13] Yevgeniy Dodis and Yu Yu. Overcoming weak expectations. In TCC, pages 1–22, 2013. [GJS11] Sanjam Garg, Abhishek Jain, and Amit Sahai. Leakage-resilient zero knowledge. In CRYPTO, pages 297–315, 2011. [HLWW13] Carmit Hazay, López-Alt, Hoeteck Wee, and Daniel Wichs. Leakage-resilient cryptography from minimal assumptions. In EUROCRYPT, pages 160–176, 2013. [KV09] Jonathan Katz and Vinod Vaikuntanathan. Signature schemes with bounded leakage
53 / 55
[LLW11] Allison B. Lewko, Mark Lewko, and Brent Waters. How to leak on key updates. In STOC, pages 725–734, 2011. [MH15] Takahiro Matsuda and Goichiro Hanaoka. Constructing and understanding chosen ciphertext security via puncturable key encapsulation mechanisms. In TCC, pages 561–590, 2015. [MR04] Silvio Micali and Leonid Reyzin. Physically observable cryptography (extended abstract). In TCC, pages 278–296, 2004. [MTVY11] Tal Malkin, Isamu Teranishi, Yevgeniy Vahlis, and Moti Yung. Signatures resilient to continual leakage on memory and computation. In TCC, pages 89–106, 2011. [NS09] Moni Naor and Gil Segev. Public-key cryptosystems resilient to key leakage. In CRYPTO, pages 18–35, 2009. [Pie09] Krzysztof Pietrzak. A leakage-resilient mode of operation. In Advances in Cryptology - EUROCRYPT 2009, pages 462–482, 2009. [QL13] Baodong Qin and Shengli Liu. Leakage-resilient chosen-ciphertext secure public-key encryption from hash proof system and one-time lossy fjlter. In ASIACRYPT, pages 381–400, 2013. [RS09] Alon Rosen and Gil Segev. Chosen-ciphertext security via correlated products. In TCC, pages 419–436, 2009. [RW14] Kim Ramchen and Brent Waters. Fully secure and fast signing from obfuscation. In ACM CCS, pages 659–673, 2014.
54 / 55
[SW14] Amit Sahai and Brent Waters. How to use indistinguishability obfuscation: deniable encryption, and more. In STOC, pages 475–484, 2014. [Wee10] Hoeteck Wee. Effjcient chosen-ciphertext security via extractable hash proofs. In CRYPTO, pages 314–332, 2010. [Zha16] Mark Zhandry. The Magic of ELFs. In CRYPTO, pages 479–508, 2016.
55 / 55