non malleable codes in the split state model
play

Non-malleable codes in the split-state model Divesh Aggarwal, - PowerPoint PPT Presentation

Non-malleable codes in the split-state model Divesh Aggarwal, Yevgeniy Dodis , Tomasz Kazana, Shachar Lovett, Maciej Obremski New York University Tampering Experiment f Enc Dec m* m c c* (Real) g m g (m) (Ideal) Consider a


  1. Non-malleable codes in the split-state model Divesh Aggarwal, Yevgeniy Dodis , Tomasz Kazana, Shachar Lovett, Maciej Obremski New York University

  2. Tampering Experiment f Enc Dec m* m c c* (Real) g m g (m) (Ideal) • Consider a tamperable communication channel.

  3. Tampering Experiment f Enc Dec m* m c c* (Real) g m g (m) (Ideal) • Consider a tamperable communication channel. • To protect, send c = Enc ( m ) along the channel.

  4. Tampering Experiment f Enc Dec m* m c c* (Real) g m g (m) (Ideal) • Consider a tamperable communication channel. • To protect, send c = Enc ( m ) along the channel. • The tampered codeword decodes to some m ∗ .

  5. Tampering Experiment f Enc Dec m* m c c* (Real) g m g (m) (Ideal) • Consider a tamperable communication channel. • To protect, send c = Enc ( m ) along the channel. • The tampered codeword decodes to some m ∗ . • Hope: m ∗ "looks like" g ( m ) for some "good" g that we can "tolerate".

  6. Tampering Experiment f Enc Dec m* m c c* (Real) g m g (m) (Ideal) • Consider a tamperable communication channel. • To protect, send c = Enc ( m ) along the channel. • The tampered codeword decodes to some m ∗ . • Hope: m ∗ "looks like" g ( m ) for some "good" g that we can "tolerate". We want ◮ Correctness: ∀ m , Dec ( Enc ( m )) = m . ◮ Simulation: ∀ f ∈ F , ∃ g ∈ G , where ◮ F is large and realistic against attacks/channels. ◮ G small and "easy to handle".

  7. Example: Error-correcting codes f Enc Dec m* (Real) m c c* g m g (m) (Ideal) F G Id (m) = m ◮ G = { Id } is “easy to handle".

  8. Example: Error-correcting codes f Enc Dec m* (Real) m c c* g m g (m) (Ideal) F G Id (m) = m ∆ (c, ) <= c* ρ ◮ G = { Id } is “easy to handle". ◮ F realistic/useful. ◮ Constructions: Hadamard, Reed-Solomon, Reed-Muller, etc..

  9. Example: Error-detecting codes f Enc Dec m* m c c* (Real) g m g (m) (Ideal) F G Id (m) = m (m) = AMD Codes: Application in robust fuzzy extractors and secret sharing [C D FPW12], NM-codes [DPW10], etc.

  10. Example: Error-detecting codes f Enc Dec m* m c c* (Real) g m g (m) (Ideal) F G Id (m) = m ∆( c, )<= 2ρ c* (m) = Same constructions as those for ECC.secret sharing [CDFPW12], NM-codes [DPW10], etc.

  11. Example: Error-detecting codes f Enc Dec m* m c c* (Real) g m g (m) (Ideal) F G Id (m) = m f (c) = c + δ (m) = δ AMD Codes: Application in robust fuzzy extractors and secret sharing [C D FPW12], NM-codes [DPW10], etc.

  12. Error-correction/detection impossible f Enc Dec m* m c c* (Real) g m g (m) (Ideal) F G Constant ?? Id (m) = m functions (m) = f (c) = c* c* Let c ∗ = Enc ( m ′ ) for some fixed m ′ . Thus, Dec ( c ∗ ) = m ′ / ∈ { m , ⊥} .

  13. Error-correction/detection impossible f Enc Dec m* m c c* (Real) g m g (m) (Ideal) F G Constant Id (m) = m functions (m) = f (c) = c* c* Let c ∗ = Enc ( m ′ ) for some fixed m ′ . Thus, Dec ( c ∗ ) = m ′ / ∈ { m , ⊥} .

  14. Non-malleable codes f Enc Dec m* m c c* (Real) g m g (m) (Ideal) F NM Id (m) = m g (m) = m* m*

  15. Non-malleable codes f Enc Dec m* m c c* (Real) g m g (m) (Ideal) F NM Id (m) = m g (m) = m* m* Is NM "realistic/easy-to-handle"? When is it useful?

  16. Application of Non-malleable codes ◮ Consider Sign sk (userID, m ). ◮ Task: How to protect sk against tampering attack. ◮ Encode sk using non-malleable code. ◮ Thus, sk ∗ = Dec ( f ( Enc ( sk ))) is either equal to sk or unrelated. ◮ Thus, cannot use Sign sk ∗ (userID, · ) to forge Sign sk (userID’ , · ).

  17. Non-malleable codes: Formal Definition Let ( Enc , Dec ) be a coding scheme with Enc randomized , and Dec deterministic, s.t. ∀ m Dec ( Enc ( m )) = m , f Enc Dec m* m c c* (Real) g (Ideal) m g (m) The coding scheme is non-malleable w.r.t. family F , if ∀ f ∈ F ,

  18. Non-malleable codes: Formal Definition Let ( Enc , Dec ) be a coding scheme with Enc randomized , and Dec deterministic, s.t. ∀ m Dec ( Enc ( m )) = m , f Enc Dec m* m c c* (Real) g (Ideal) m g (m) The coding scheme is non-malleable w.r.t. family F , if ∀ f ∈ F , ∃ T which is a probabilistic combination of: ◮ constant functions ◮ identity function s.t.

  19. Non-malleable codes: Formal Definition Let ( Enc , Dec ) be a coding scheme with Enc randomized , and Dec deterministic, s.t. ∀ m Dec ( Enc ( m )) = m , f Enc Dec m* m c c* (Real) g (Ideal) m g (m) The coding scheme is non-malleable w.r.t. family F , if ∀ f ∈ F , ∃ T which is a probabilistic combination of: ◮ constant functions ◮ identity function s.t. ∀ m ∈ M , m ∗ ≈ T ( m ) .

  20. Non-malleable codes: Formal Definition Let ( Enc , Dec ) be a coding scheme with Enc randomized , and Dec deterministic, s.t. ∀ m Dec ( Enc ( m )) = m , f Enc Dec m* m c c* (Real) g (Ideal) m g (m) The coding scheme is non-malleable w.r.t. family F , if ∀ f ∈ F , ∃ T which is a probabilistic combination of: ◮ constant functions ◮ identity function s.t. ∀ m ∈ M , m ∗ ≈ T ( m ) . Note: T is independent of m . Thus, intuitively, either m ∗ = m or they are unrelated.

  21. Which realistic families F can we tolerate? f Enc Dec m* (Real) m c c* g m g (m) (Ideal) F all NM Id (m) = m g (m) = m* m* Impossible [DPW10]. ∀ g ∈ F all , let f ( c ) = Enc ( g ( Dec ( c ))) .

  22. Which realistic families F can we tolerate? f Enc Dec m* (Real) m c c* g m g (m) (Ideal) F all F all Impossible [DPW10]. ∀ g ∈ F all , let f ( c ) = Enc ( g ( Dec ( c ))) .

  23. Non-malleable Codes in the t -split-state model ◮ Tamper t different memory-parts independently

  24. Non-malleable Codes in the t -split-state model ◮ Tamper t different memory-parts independently ◮ Application to non-malleable secret-sharing

  25. Non-malleable Codes in the t -split-state model ◮ Tamper t different memory-parts independently ◮ Application to non-malleable secret-sharing ◮ Includes ECC, EDC, Constant functions, bitwise tampering functions but much more

  26. Non-malleable Codes in the t -split-state model ◮ Tamper t different memory-parts independently ◮ Application to non-malleable secret-sharing ◮ Includes ECC, EDC, Constant functions, bitwise tampering functions but much more ◮ Existential result known [DPW10].

  27. Non-malleable Codes in the t -split-state model ◮ Tamper t different memory-parts independently ◮ Application to non-malleable secret-sharing ◮ Includes ECC, EDC, Constant functions, bitwise tampering functions but much more ◮ Existential result known [DPW10]. ◮ Efficient construction for family of bitwise-tampering functions ( t = k , the no. of bits in m ) [DPW10, CG14, FNVW14].

  28. Non-malleable Codes in the t -split-state model ◮ Tamper t different memory-parts independently ◮ Application to non-malleable secret-sharing ◮ Includes ECC, EDC, Constant functions, bitwise tampering functions but much more ◮ Existential result known [DPW10]. ◮ Efficient construction for family of bitwise-tampering functions ( t = k , the no. of bits in m ) [DPW10, CG14, FNVW14]. ◮ Efficient construction for t = 2, k = 1 [DKO13]

  29. Non-malleable Codes in the t -split-state model ◮ Tamper t different memory-parts independently ◮ Application to non-malleable secret-sharing ◮ Includes ECC, EDC, Constant functions, bitwise tampering functions but much more ◮ Existential result known [DPW10]. ◮ Efficient construction for family of bitwise-tampering functions ( t = k , the no. of bits in m ) [DPW10, CG14, FNVW14]. ◮ Efficient construction for t = 2, k = 1 [DKO13] ◮ Open Question: Efficient construction for t constant, k large.

  30. Non-malleable Codes in the t -split-state model ◮ Tamper t different memory-parts independently ◮ Application to non-malleable secret-sharing ◮ Includes ECC, EDC, Constant functions, bitwise tampering functions but much more ◮ Existential result known [DPW10]. ◮ Efficient construction for family of bitwise-tampering functions ( t = k , the no. of bits in m ) [DPW10, CG14, FNVW14]. ◮ Efficient construction for t = 2, k = 1 [DKO13] ◮ Open Question: Efficient construction for t constant, k large. YES (this talk). We show several constructions, including t = 2 and constant rate (i.e. code length is Θ( k ) ).

  31. NM-codes in the t -split state model f 1 X* X 1 1 f X* X 2 Dec 2 Enc 2 f 3 m* m X* X 3 3 f X* X 4 4 4 f 5 X* X 5 5 The coding scheme is non-malleable w.r.t. family F t-split , if ∀ f 1 , . . . , f t , ∃ T which is a probabilistic combination of: ◮ constant functions ◮ identity function s.t. ∀ m ∈ M , m ∗ ≈ T ( m ) .

  32. Common outline for our results: Non-malleable reductions [A D KO15]

  33. Non-malleable Reduction: Definition [A D KO15] Let ( Enc , Dec ) be a coding scheme with Enc randomized , and Dec deterministic, s.t. ∀ m Dec ( Enc ( m )) = m ,

  34. Non-malleable Reduction: Definition [A D KO15] Let ( Enc , Dec ) be a coding scheme with Enc randomized , and Dec deterministic, s.t. ∀ m Dec ( Enc ( m )) = m , f Enc Dec m* (Real) m c c* g The scheme is a non-malleable reduction from F to G , m g (m) (Ideal) denoted as F ⇒ G if ∀ f ∈ F ,

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend