new notions of security
play

New Notions of Security: Universal Composability without Trusted - PowerPoint PPT Presentation

New Notions of Security: Universal Composability without Trusted Setup Manoj Prabhakaran & Amit Sahai Princeton University To appear in STOC04 Defining Security Central Problem in Cryptography Understanding what we want and what we


  1. New Notions of Security: Universal Composability without Trusted Setup Manoj Prabhakaran & Amit Sahai Princeton University To appear in STOC’04

  2. Defining Security Central Problem in Cryptography Understanding what we want and what we can get

  3. Evolution of Security Notions Early Fundamental Ideas 80’s (Basic tasks. Stand-alone situations.) Complex Adaptive tasks Adversaries Sequential/Parallel/ Malleability Concurrent Composition Early The “Grand Unification” 00’s

  4. Environmental Security [C,PW] Comprehensive Security of a general task... ... in a general environment Essential to be applicable in a networked/multi-tasking setting “Universally Composable”: can achieve complex tasks in a modular way

  5. However... Too strong? Sweeping impossibility results No commitment/ZK/Multi-Party Computation protocol is Environmentally Secure [C,CF ,CKL,L] Things possible: encryption, honest-majority MPC, or using a trusted setup (CRS- common reference string) [CF ,CLOS,...] No notion of provable security for any protocol in the “plain model” in the presence of an environment!

  6. New Notions of Security: An Overview Environmental Generalized Security [C] Environmental Security Composable Composable Not realizable Realizable Relaxed Environmental Security Realizable Not composable

  7. Security as Achieving the IDEAL Envision the IDEAL security notion- using A S trusted parties and secure channels to them T A protocol in the REAL world is secure if whatever can happen in the REAL world could REAL IDEAL have happened in the IDEAL world

  8. Environmental Security Interactive Environment A S present T Environment cannot distinguish between being in REAL Environment Environment execution and being in REAL IDEAL IDEAL execution

  9. Environmental Security ∀ ∃ ∀ A S Env S A T Environment Environment ≈ REAL World IDEAL World

  10. Universal Composability Theorem [C] If A S T ≈ Environment Environment REAL World IDEAL World

  11. Universal Composability Theorem [C] Then A S S A T T ≈ Environment Environment REAL World IDEAL World

  12. Environmental Security Not Realizable Very general impossibility results [C,CF ,L,CKL...] No commitment, ZK, multi-party computation Impossibility holds whenever environment can internally run the IDEAL adversary S Same condition for Universal Composition to hold!

  13. New Notions of Security: An Overview Environmental Generalized Security [C] Environmental Security Composable Composable Not realizable Realizable Relaxed Environmental Security Realizable Not composable

  14. Coming Up... ES Reloaded

  15. Commitment IDEAL “COMMIT” b “COMMIT” b “COMMIT” Environment

  16. Commitment IDEAL “COMMIT” b “COMMIT” Still ideal! b “COMMIT” Environment

  17. Relaxed Environmental Security In the IDEAL world, adversary has exponential computational power Still IDEAL: no extra information to compute with

  18. Relaxed Environmental Security ∀ ∃ ∀ A S Env S A T Environment Environment ≈ REAL World IDEAL World

  19. Relaxed ES Suffices in most cases of interest- when notion of security is information theoretic IDEAL not satisfactory for some situations (e.g. playing an online game) Fixed in Generalized Environmental Security Easily implies traditional strong notions of security (concurrent, non-malleable, CCA2 secure) for many tasks (commitment, encryption, WI proofs,...) Similar ideas previously for simpler situations

  20. Relaxed Environmental Security Not Composable! Too Relaxed?

  21. New Notions of Security: An Overview Environmental Generalized Security [C] Environmental Security Composable Composable Not realizable Realizable Relaxed Environmental Security Realizable Not composable

  22. Generalized Environmental Security Implies Relaxed Environmental Security IDEAL adversary and Environment have access to “The Angel” The Angel is exponential-time Oracle with a simple filter to decide whether to answer or not Filter depends on the set of corrupted parties Gives restricted access to exponential computational power: helps break corrupted parties’ security, but not honest parties’

  23. Generalized ES ∀ ∃ ∀ A S Env S A T Environment Environment ≈ REAL World IDEAL World

  24. Generalized ES ⇒ Relaxed ES ∀ ∃ ∀ A S Env S A T Environment Environment ≈ REAL World IDEAL World

  25. Generalized ES ⇒ Relaxed ES ∀ ∃ ∀ A S Env S A T Environment Environment ≈ REAL World IDEAL World

  26. Generalized ES ⇒ Relaxed ES ∀ ∃ ∀ A S Env S A T Environment Environment ≈ REAL World IDEAL World

  27. What is this Angel? Our Angel gives collisions in a hash function Alternative models possible with different Angels i.e., can instantiate the generalized ES framework with different Angels Using “null-Angel” gives the original ES model of [C]

  28. Generalized ES results For any exponential-time Angel X, gES(X) ⇒ relaxed ES For any Angel X, gES(X) protocols are Universally Composable There is an Angel X* such that there are gES(X*) protocols for commitment, ZK, and for realizing any efficient trusted party

  29. Realizing a General Trusted Party New! Commitment Semi-Functionality ZK Proof Semi-Functionality Commitment Semi-Honest MPC ZK Proof Commit & Prove (one-many) Protocol Compiler MPC (semi-honest to malicious) Currently, all results for Static Adversaries

  30. “The Angel” in Action R Protocol r R c = H R,r ( r � , b ) IDEAL ( R, r ) r ( r � 0 , r � 1 ) c T COMMIT c := H R,r ( r � 0 , 0) = H R,r ( r � 1 , 1)

  31. Assumptions R ∀ ( R, r ) ( H R,r ( r � , 0) , r � ) ( c, r � 0 ) ≈ r � ( H R,r ( r � , 1) , r � ) ( c, r � ( c, r � 0 , r � 1 ) 1 ) ≈ c := H R,r ( r � 0 , 0) = H R,r ( r � 1 , 1) R r Trapdoor Permutation ( r � 0 , r � 1 ) H R,r ( r � 0 , 0) � = H R,r ( r � 1 , 1)

  32. Recap S A Env Environmental Generalized Security [C] Environmental Security S Env A Composable Composable Not realizable Realizable Relaxed Environmental Security S Env A Realizable Not composable

  33. More work needed Investigate/simplify the assumptions Extend to Adaptive Adversaries Get simpler/more efficient protocols Even more realistic Environmental Security model

  34. Thank � You!

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend