leakage resilient zero knowledge
play

Leakage-Resilient Zero Knowledge Sanjam Garg Abhishek Jain Amit - PowerPoint PPT Presentation

Leakage-Resilient Zero Knowledge Sanjam Garg Abhishek Jain Amit Sahai Leakage-Resilient Cryptography Traditional Cryptography: adv has only black-box access to a cryptosystem I O LR-Cryptography: open the black-box more


  1. Leakage-Resilient Zero Knowledge Sanjam Garg Abhishek Jain Amit Sahai

  2. Leakage-Resilient Cryptography • Traditional Cryptography: adv has only black-box access to a cryptosystem I O ϕ • LR-Cryptography: “ open the black-box ” more & more

  3. Prior Work • Leakage-Resilient (Stateless) Primitives  [DP08, AGV09, Pie09, DKL09, NS09, ADW09, KV09, FKPR10, DGKPV10, ADNGWW10, DHLW10, BKKV10, This work: Leakage on entire LRW11, MTVY11, BSW11, LLW11, DLWW12…] state of honest party during • Leakage-Resilient/Tamper-Resilient Circuits protocol execution  [ISW03, IPSW06, FRRTV10, A11] • Leakage-Resilient (Interactive) Protocols  [IKOS09, ADW09, DHLW10]  Limited leakage during protocol execution

  4. Zero Knowledge Proofs [GMR] X Verifier learns nothing beyond validity of X (For every V, there exists S that “ simulates ” the view of V)

  5. Zero Knowledge with Leakage? X f f(state) Verifier learns something beyond validity of X Can not be achieved.

  6. Leakage-Resilient Zero Knowledge? • Only computation leaks information [MR ’ 04]  Often problematic (e.g. cold-boot attacks [HSH + 08])  Standard ZK impossible • “ Leakage-free ” pre-processing  Limits applicability; impossible to yield standard ZK

  7. Leakage-Resilient Zero Knowledge? • What we want :  Leakage on entire state of prover, anytime during the protocol  No “ leakage-free ” phase  Meaningful notion; useful in application scenarios Cannot achieve standard ZK guarantee since simulator cannot simulate leakage queries on the witness

  8. Our Definition X f f ’ ≈ w f(state) f ’ (w) w Real Ideal • Real/Ideal paradigm, where Ideal is also leaky

  9. Our Definition … f i ’ f i ≈ f i ’ (w) f i (state) w Real Ideal • Total Ideal Leakage ≤ λ × (Total Real Leakage) How much leakage in the ideal world? • When λ≈1 : Verifier learns nothing beyond validity of X and leakage information

  10. Related Notion: Knowledge Complexity [GP ’ 91] • Witness oracle (or leakage on witness in ideal world) is not a new concept • Main difference: In their case protocol inherently leaked information • Our Setting: Leakage is because of side channel attacks

  11. Leakage-Oblivious Simulation • Leakage oracle should only help S to answer leakage queries of V • Leakage oblivious simulation: S does not see answers to leakage queries • Necessary for some scenarios

  12. Our Results • Main result: (1+ε) -LR-ZK interactive proof system (based on general assumptions)  almost optimal leakage parameter ( λ -LR-ZK for λ<1 impossible)  first positive result on handling arbitrary leakage during protocol exec • LR-NIZK proofs (under standard assumptions) • Exciting concurrent work [BCH ’ 11]

  13. Our Results … • Applications of LR-ZK  Universally Composable Secure Multi-party Computation in the “ leaky token model ” − All prior works require completely leakage-resilient tokens  Fully LR-Signatures in bounded leakage (and continual leakage) model − Recently constructed by [MTVY11, BSW11, LLW11] − Our scheme also secure in “ noisy leakage ” model

  14. Our Results I. (1+ε) -Leakage-Resilient Zero Knowledge Proof System

  15. Main Ideas f f(state) w • f(state) must be “ consistent ” with past actions of S • f(state) should not reveal S is cheating

  16. Main Ideas … f f(state) = state w • Same as corrupting the prover during the protocol • S must “ explain ” its actions as an honest prover Adaptive Security!

  17. Adaptive Security [CFGN96, B96] • Adv can corrupt parties during protocol exec • When a party P is corrupted:  Adv learns entire state (input and random coins) of P  Given input of P, Sim must produce random coins consistent with transcript and honest P strategy • Standard technique: equivocal commitments  Possible to decommit in any manner given trapdoor (otherwise binding)

  18. Question Adaptive Security  LR-ZK ?

  19. Graph Hamiltonicity 1 1 0 1 1 1 0 1 0 0 1 0 0 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 * * 1 * * * * * 1 0 1 0 1 0 1 0 1 0 1 0 1 * * * * * * * 0 1 0 1 * * * 1 * * * * 1 1 0 0 * 1 * * * * * * b b = 1? b = 0? 0 0 1 0 1 1 0 1 * * * * COM 0 0 1 0 1 0 1 0 * * * * 0 1 0 1 0 1 0 1 * * * * 1 0 1 0 1 1 0 0 * * * *

  20. Adaptive ZK LR-ZK? 1 1 0 1 1 1 0 1 0 0 1 0 0 0 1 0 * * * * 0 1 0 1 0 1 0 1 * * * * 1 0 1 0 1 0 1 0 * * * * * * * * f (w) b S does not know 1 1 0 1 0 0 1 0 0 * * * 1 * * * * * * * Eq-COM ‘b’. Answer must 1 0 1 0 0 0 1 0 * * * * * * * * * * * * be consistent 0 1 0 1 0 1 0 1 * * * * * * * * * * * * with ‘b’ 1 0 1 0 1 1 0 0 * * * * * * * * * * * *

  21. Adaptive security does not imply LR-ZK • Adaptive ZK: No need to simulate P after corruption • LR-ZK: Must continue to simulate even after a leakage query  Without knowledge of what was leaked!  “ Future ” messages must be “ consistent ” with leakage

  22. Main Ideas • Two ways for simulator to cheat (instead of one)  One cheating mode to simulate protocol messages  Another cheating mode to answer leakage queries • Extract V ’ s challenge for simulation of messages • Precise Simulation [MP06]  In order to bound the amount of leakage

  23. Our Results II. (1)-Leakage-Resilient NIZK proofs

  24. LR-NIZK • Adaptive NIZK implies LR-NIZK  no “ future ” messages to simulate after leakage A NIZK proof with “ adaptive security ” [GOS06] is also a LR-NIZK proof system (GOS NIZK proof system is leakage-resilient)

  25. Thank You!

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend