new impossibility results for concurrent composition
play

New Impossibility Results for Concurrent Composition and a - PowerPoint PPT Presentation

New Impossibility Results for Concurrent Composition and a Non-Interactive Completeness Theorem for Secure Computation Abishek Kumarasubramanian Secure Computation [Yao,GMW] Security guarantee only Corrupted party learns no when protocol runs


  1. New Impossibility Results for Concurrent Composition and a Non-Interactive Completeness Theorem for Secure Computation Abishek Kumarasubramanian

  2. Secure Computation [Yao,GMW] Security guarantee only Corrupted party learns no when protocol runs in more than protocol output isolation x y Π f(x,y)

  3. Today’s World is Concurrent

  4. Overall Question Can we design protocols that remain secure even when executed concurrently? Stand-alone security does not imply security under concurrent composition [DDN92,DNS98]

  5. Positive Results • If we are willing to make global trust assumptions, then general positive results known [CF01,CLOS…] • Alternatively, can relax the security definition to obtain positive results [Pass03,PS04,BS05,MPR06] No general positive result in the plain model

  6. Negative Result? • Broad impossibility results known in the plain model [CF01, CKL03, Lin03, Lin04, BPS06] There are still important gaps in our understanding

  7. Paper 1 - [Agrawal-Goyal-Jain-Prabhakaran-Sahai] Motivation – Fixed Roles Client 1 Client 2 Client 3 • Positive results for concurrent zero-knowledge [RK99,KP01,PRS02] • Impossibility for some functionalities [Lin04] Is concurrently secure Oblivious Transfer possible? [Lin08]

  8. Paper 2 - [Garg-K-Ostrovsky-Visconti] Motivation – Fixed Input Y1 Client 1 X1 Y2 Client 2 X2 Client 3 X3 Y3 Impossibility results for two very specific (somewhat contrived) functionalities [BPS06,Goy12]

  9. Core Result [Agrawal-Goyal-Jain-Prabhakaran-Sahai] [Garg-K-Ostrovsky-Visconti] • Concurrent self composition impossible for Oblivious Transfer • in both fixed input, fixed role settings

  10. Extensions • [Garg-K-Ostrovsky-Visconti] • Concurrent composition impossible for all non trivial asymmetric and symmetric functionalities • General stateless secure computation [GS09,GM11] is impossible • [Agrawal-Goyal-Jain-Prabhakaran-Sahai] • Non-interactive completeness theorem for non trivial asymmetric functionalities • subsumes result of [Kil00] • corollary: concurrent composition impossibility for non trivial asymmetric functionalities

  11. Oblivious Transfer Ideal World Real world b s 0 ,s 1 Π OT

  12. Chosen Protocol Attack b, s 0 , s 1 s 0 , s 1 Π OT Π OT if output = s b send s 1-b Bob Dave Alice Bob merely forwards messages; successfully learns s 1-b always

  13. Chosen Protocol Attack… b, s 0 , s 1 s 0 , s 1 Π OT if output = s b send s 1-b Bob Dave Alice Bob fails Dave’s test with prob. 1/2 ; so learns s 1-b with prob. 1/2

  14. From Chosen Protocol Attack to Impossibility of Concurrent OT Dave garbled circuits with replace computing his next msg function Keys for garbled Obtained by more OT concurrent executions circuits . . . . . Alice Bob

  15. Complete Proof 2 Full versions! 1 0 Full version

  16. Thank you! And Questions! Many thanks to Abhishek Jain and Shweta Agrawal for the slides Only 1/3 of the blame goes to me!

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend