New Notions of Security: Universal Composability without Trusted - - PowerPoint PPT Presentation

new notions of security
SMART_READER_LITE
LIVE PREVIEW

New Notions of Security: Universal Composability without Trusted - - PowerPoint PPT Presentation

New Notions of Security: Universal Composability without Trusted Setup Manoj Prabhakaran & Amit Sahai Princeton University To appear in STOC04 Defining Security Central Problem in Cryptography Understanding what we want and what we


slide-1
SLIDE 1

New Notions of Security:

Universal Composability without Trusted Setup Manoj Prabhakaran & Amit Sahai Princeton University

To appear in STOC’04

slide-2
SLIDE 2

Defining Security

Central Problem in Cryptography Understanding what we want and what we can get

slide-3
SLIDE 3

The “Grand Unification”

Early 00’s

Evolution of Security Notions

Fundamental Ideas (Basic tasks. Stand-alone situations.)

Early 80’s

Malleability Adaptive Adversaries Complex tasks Sequential/Parallel/ Concurrent Composition

slide-4
SLIDE 4

Environmental Security [C,PW]

Comprehensive Security of a general task... ... in a general environment Essential to be applicable in a networked/multi-tasking setting “Universally Composable”: can achieve complex tasks in a modular way

slide-5
SLIDE 5

However...

Too strong? Sweeping impossibility results No commitment/ZK/Multi-Party Computation protocol is Environmentally Secure [C,CF ,CKL,L] Things possible: encryption, honest-majority MPC, or using a trusted setup (CRS- common reference string) [CF ,CLOS,...] No notion of provable security for any protocol in the “plain model” in the presence of an environment!

slide-6
SLIDE 6

New Notions of Security: An Overview

Environmental Security [C] Composable Not realizable Relaxed Environmental Security Realizable Not composable Generalized Environmental Security Composable Realizable

slide-7
SLIDE 7

Security as Achieving the IDEAL

Envision the IDEAL security notion- using trusted parties and secure channels to them A protocol in the REAL world is secure if whatever can happen in the REAL world could have happened in the IDEAL world

A

REAL IDEAL

S

T

slide-8
SLIDE 8

Environment

Environmental Security

Interactive Environment present Environment cannot distinguish between being in REAL execution and being in IDEAL execution

Environment A

REAL IDEAL

S

T

slide-9
SLIDE 9

Environmental Security

Environment

REAL World

Environment

IDEAL World

A

S

Env

A S

T

slide-10
SLIDE 10

Universal Composability Theorem [C]

Environment

REAL World

Environment

IDEAL World

If

A S

T

slide-11
SLIDE 11

Universal Composability Theorem [C]

Environment

REAL World

Environment

IDEAL World

A S

T Then

A S

T

slide-12
SLIDE 12

Environmental Security Not Realizable

Very general impossibility results [C,CF ,L,CKL...] No commitment, ZK, multi-party computation Impossibility holds whenever environment can internally run the IDEAL adversary Same condition for Universal Composition to hold!

S

slide-13
SLIDE 13

New Notions of Security: An Overview

Environmental Security [C] Composable Not realizable Relaxed Environmental Security Realizable Not composable Generalized Environmental Security Composable Realizable

slide-14
SLIDE 14

Coming Up...

ES Reloaded

slide-15
SLIDE 15

“COMMIT” b “COMMIT” “COMMIT”

Commitment IDEAL

Environment

b

slide-16
SLIDE 16

“COMMIT” b “COMMIT” “COMMIT”

Commitment IDEAL

Environment

b

Still ideal!

slide-17
SLIDE 17

Relaxed Environmental Security

In the IDEAL world, adversary has exponential computational power Still IDEAL: no extra information to compute with

slide-18
SLIDE 18

Relaxed Environmental Security

Environment

REAL World

Environment

IDEAL World

A

S

Env

A S

T

slide-19
SLIDE 19

Relaxed ES

Suffices in most cases of interest- when notion of security is information theoretic IDEAL not satisfactory for some situations (e.g. playing an online game) Fixed in Generalized Environmental Security Easily implies traditional strong notions of security (concurrent, non-malleable, CCA2 secure) for many tasks (commitment, encryption, WI proofs,...) Similar ideas previously for simpler situations

slide-20
SLIDE 20

Relaxed Environmental Security

Not Composable!

Too Relaxed?

slide-21
SLIDE 21

New Notions of Security: An Overview

Environmental Security [C] Composable Not realizable Relaxed Environmental Security Realizable Not composable Generalized Environmental Security Composable Realizable

slide-22
SLIDE 22

Generalized Environmental Security

Implies Relaxed Environmental Security IDEAL adversary and Environment have access to “The Angel” The Angel is exponential-time Oracle with a simple filter to decide whether to answer or not Filter depends on the set of corrupted parties Gives restricted access to exponential computational power: helps break corrupted parties’ security, but not honest parties’

slide-23
SLIDE 23

A

Generalized ES

Environment

REAL World

Environment

IDEAL World

S

Env

A S

T

slide-24
SLIDE 24

A

Generalized ES ⇒ Relaxed ES

Environment

REAL World

Environment

IDEAL World

S

Env

A S

T

slide-25
SLIDE 25

A

Generalized ES ⇒ Relaxed ES

Environment

REAL World

Environment

IDEAL World

S

Env

A S

T

slide-26
SLIDE 26

A

Generalized ES ⇒ Relaxed ES

Environment

REAL World

Environment

IDEAL World

S

Env

A S

T

slide-27
SLIDE 27

What is this Angel?

Our Angel gives collisions in a hash function Alternative models possible with different Angels i.e., can instantiate the generalized ES framework with different Angels Using “null-Angel” gives the original ES model of [C]

slide-28
SLIDE 28

Generalized ES results

For any exponential-time Angel X, gES(X) ⇒ relaxed ES For any Angel X, gES(X) protocols are Universally Composable There is an Angel X* such that there are gES(X*) protocols for commitment, ZK, and for realizing any efficient trusted party

slide-29
SLIDE 29

ZK Proof

Realizing a General Trusted Party

Commitment

Commitment Semi-Functionality ZK Proof Semi-Functionality

Commit & Prove (one-many) Protocol Compiler (semi-honest to malicious) Semi-Honest MPC MPC New! Currently, all results for Static Adversaries

slide-30
SLIDE 30

IDEAL

COMMIT

T Protocol

R

“The Angel” in Action

r (r

0, r 1)

r (R, r) R c = HR,r(r, b) c c :=HR,r(r

0, 0)

=HR,r(r

1, 1)

slide-31
SLIDE 31

∀(R, r)

Assumptions

r R r (r

0, r 1)

HR,r(r

0, 0) = HR,r(r 1, 1)

Trapdoor Permutation

(c, r

0, r 1)

(HR,r(r, 0), r) ≈ (c, r

0)

(HR,r(r, 1), r) ≈ (c, r

1)

R

c :=HR,r(r

0, 0)

=HR,r(r

1, 1)
slide-32
SLIDE 32

Recap

Environmental Security [C] Composable Not realizable Relaxed Environmental Security Realizable Not composable Generalized Environmental Security Composable Realizable

A S Env A S Env A S Env

slide-33
SLIDE 33

More work needed

Investigate/simplify the assumptions Extend to Adaptive Adversaries Get simpler/more efficient protocols Even more realistic Environmental Security model

slide-34
SLIDE 34

ThankYou!