Leakage-Resilient Zero Knowledge Sanjam Garg Abhishek Jain Amit - - PowerPoint PPT Presentation

leakage resilient zero knowledge
SMART_READER_LITE
LIVE PREVIEW

Leakage-Resilient Zero Knowledge Sanjam Garg Abhishek Jain Amit - - PowerPoint PPT Presentation

Leakage-Resilient Zero Knowledge Sanjam Garg Abhishek Jain Amit Sahai Leakage-Resilient Cryptography Traditional Cryptography: adv has only black-box access to a cryptosystem I O LR-Cryptography: open the black-box more


slide-1
SLIDE 1

Leakage-Resilient Zero Knowledge

Abhishek Jain Amit Sahai Sanjam Garg

slide-2
SLIDE 2

Leakage-Resilient Cryptography

  • Traditional Cryptography: adv has only black-box

access to a cryptosystem

I O

  • LR-Cryptography: “open the black-box” more & more

ϕ

slide-3
SLIDE 3

Prior Work

  • Leakage-Resilient (Stateless) Primitives
  • Leakage-Resilient (Interactive) Protocols
  • [IKOS09, ADW09, DHLW10]
  • Leakage-Resilient/Tamper-Resilient Circuits
  • [DP08, AGV09, Pie09, DKL09, NS09, ADW09, KV09,

FKPR10, DGKPV10, ADNGWW10, DHLW10, BKKV10, LRW11, MTVY11, BSW11, LLW11, DLWW12…]

  • [ISW03, IPSW06, FRRTV10, A11]
  • Limited leakage during protocol execution

This work: Leakage on entire state of honest party during protocol execution

slide-4
SLIDE 4

Zero Knowledge Proofs [GMR]

X Verifier learns nothing beyond validity of X

(For every V, there exists S that “simulates” the view of V)

slide-5
SLIDE 5

Zero Knowledge with Leakage?

Verifier learns something beyond validity of X X

f f(state)

Can not be achieved.

slide-6
SLIDE 6

Leakage-Resilient Zero Knowledge?

  • Only computation leaks information [MR’04]
  • Often problematic (e.g. cold-boot attacks [HSH+08])
  • Standard ZK impossible
  • “Leakage-free” pre-processing
  • Limits applicability; impossible to yield standard ZK
slide-7
SLIDE 7

Leakage-Resilient Zero Knowledge?

  • What we want :
  • Leakage on entire state of prover, anytime during the

protocol

  • No “leakage-free” phase
  • Meaningful notion; useful in application scenarios

Cannot achieve standard ZK guarantee since simulator cannot simulate leakage queries on the witness

slide-8
SLIDE 8

Our Definition

  • Real/Ideal paradigm, where Ideal is also leaky

X

f f(state)

Ideal

w

Real

f’ f’(w)

w

slide-9
SLIDE 9

Our Definition …

fi fi(state) Ideal w

Real fi’ fi’(w)

How much leakage in the ideal world?

  • Total Ideal Leakage ≤ λ×(Total Real Leakage)
  • When λ≈1: Verifier learns nothing beyond validity of

X and leakage information

slide-10
SLIDE 10

Related Notion: Knowledge Complexity [GP’91]

  • Main difference: In their case protocol inherently

leaked information

  • Witness oracle (or leakage on witness in ideal world)

is not a new concept

  • Our Setting: Leakage is because of side channel

attacks

slide-11
SLIDE 11

Leakage-Oblivious Simulation

  • Leakage oblivious simulation: S does not see

answers to leakage queries

  • Leakage oracle should only help S to answer

leakage queries of V

  • Necessary for some scenarios
slide-12
SLIDE 12

Our Results

  • Main result: (1+ε)-LR-ZK interactive proof system

(based on general assumptions)

  • LR-NIZK proofs (under standard assumptions)
  • almost optimal leakage parameter (λ-LR-ZK for λ<1

impossible)

  • first positive result on handling arbitrary leakage during

protocol exec

  • Exciting concurrent work [BCH’11]
slide-13
SLIDE 13

Our Results …

  • Applications of LR-ZK
  • Universally Composable Secure Multi-party Computation

in the “leaky token model”

  • Fully LR-Signatures in bounded leakage (and continual

leakage) model − Recently constructed by [MTVY11, BSW11, LLW11] − Our scheme also secure in “noisy leakage” model − All prior works require completely leakage-resilient tokens

slide-14
SLIDE 14

Our Results

  • I. (1+ε)-Leakage-Resilient Zero Knowledge

Proof System

slide-15
SLIDE 15

Main Ideas

f f(state) w

  • f(state) must be “consistent” with past actions of S
  • f(state) should not reveal S is cheating
slide-16
SLIDE 16

Main Ideas …

f f(state) = state w

  • Same as corrupting the prover during the protocol
  • S must “explain” its actions as an honest prover

Adaptive Security!

slide-17
SLIDE 17

Adaptive Security [CFGN96, B96]

  • Adv can corrupt parties during protocol exec
  • Adv learns entire state (input and random coins) of P
  • Given input of P, Sim must produce random coins

consistent with transcript and honest P strategy

  • When a party P is corrupted:
  • Standard technique: equivocal commitments
  • Possible to decommit in any manner given trapdoor

(otherwise binding)

slide-18
SLIDE 18

Question

Adaptive Security  LR-ZK ?

slide-19
SLIDE 19

Graph Hamiltonicity

1 1 0 1 0 0 1 0 0 1 0 1 1 0 1 0 1 1 0 1 0 0 1 0 0 1 0 1 1 0 1 0 0 0 1 0 1 0 1 0 0 1 0 1 1 1 0 0 1 1 0 1 0 0 1 0 0 1 0 1 1 0 1 0 * * * * * * * * * * * * * * * * * * 1 * 1 * * * * * * 1 * 1 * * * * * * * * * * * * * * * * * *

b b = 0?

0 0 1 0 1 0 1 0 0 1 0 1 1 1 0 0

b = 1?

COM

slide-20
SLIDE 20

Adaptive ZK

1 1 0 1 0 0 1 0 0 1 0 1 1 0 1 0 1 1 0 1 0 0 1 0 0 1 0 1 1 0 1 0 0 0 1 0 1 0 1 0 0 1 0 1 1 1 0 0 1 1 0 1 0 0 1 0 0 1 0 1 1 0 1 0 * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *

b

0 * * * * * * * * * * * * * * * 1 * * * * * * * * * * * * * * * Eq-COM

(w) S does not know ‘b’. Answer must be consistent with ‘b’ f

LR-ZK?

slide-21
SLIDE 21

Adaptive security does not imply LR-ZK

  • Adaptive ZK: No need to simulate P after corruption
  • “Future” messages must be “consistent” with leakage
  • LR-ZK: Must continue to simulate even after a

leakage query

  • Without knowledge of what was leaked!
slide-22
SLIDE 22

Main Ideas

  • Two ways for simulator to cheat (instead of one)
  • One cheating mode to simulate protocol messages
  • Extract V’s challenge for simulation of messages
  • Another cheating mode to answer leakage queries
  • In order to bound the amount of leakage
  • Precise Simulation [MP06]
slide-23
SLIDE 23

Our Results

  • II. (1)-Leakage-Resilient NIZK proofs
slide-24
SLIDE 24

LR-NIZK

  • Adaptive NIZK implies LR-NIZK
  • no “future” messages to simulate after leakage

A NIZK proof with “adaptive security” [GOS06] is also a LR-NIZK proof system

(GOS NIZK proof system is leakage-resilient)

slide-25
SLIDE 25

Thank You!