On Assumptions and the Limits of Cryptography
Nils Fleischhacker
Bochum, January 24, 2018
On Assumptions and the Limits of Cryptography Nils Fleischhacker - - PowerPoint PPT Presentation
On Assumptions and the Limits of Cryptography Nils Fleischhacker Bochum, January 24, 2018 2 2 2 So, how do we know all of this is secure? 2 The sad truth is: We dont! Not really. So, how do we know all of this is secure? 2 The
Nils Fleischhacker
Bochum, January 24, 2018
2
2
2
2
So, how do we know all of this is secure?
2
So, how do we know all of this is secure? The sad truth is: We don’t! Not really.
3
The Cryptographic Landscape
3
The Cryptographic Landscape
DS PKE
3
The Cryptographic Landscape
DS PKE 2PC
3
The Cryptographic Landscape
DS PKE 2PC FHE iO
3
The Cryptographic Landscape
DS PKE 2PC FHE iO
One-way Functions Trapdoor Permutations Trapdoor Permutations
3
The Cryptographic Landscape
DS PKE 2PC FHE iO
One-way Functions Trapdoor Permutations Trapdoor Permutations Oblivious Transfer LWE
3
The Cryptographic Landscape
DS PKE 2PC FHE iO
One-way Functions Trapdoor Permutations Trapdoor Permutations Oblivious Transfer LWE Multi-Linear Maps
3
The Cryptographic Landscape
DS PKE 2PC FHE iO
One-way Functions Trapdoor Permutations Trapdoor Permutations Oblivious Transfer LWE Multi-Linear Maps
3
The Cryptographic Landscape
DS PKE 2PC FHE iO
One-way Functions Trapdoor Permutations Trapdoor Permutations Oblivious Transfer LWE
3
The Cryptographic Landscape
DS PKE 2PC FHE iO
One-way Functions Trapdoor Permutations Trapdoor Permutations Oblivious Transfer LWE
Well this seems like a terrible idea!
4
One-Way Functions
f x
4
One-Way Functions
f x y
4
One-Way Functions
f x y
4
One-Way Functions
f x y ???
5
Why We Need to Make Assumptions
5
Why We Need to Make Assumptions
OWF ENC
5
Why We Need to Make Assumptions
OWF ENC MAC
5
Why We Need to Make Assumptions
OWF ENC MAC PKE
5
Why We Need to Make Assumptions
OWF ENC MAC PKE 2PC
5
Why We Need to Make Assumptions
OWF ENC MAC PKE 2PC FHE
5
Why We Need to Make Assumptions
OWF ENC MAC PKE 2PC FHE
P = NP
5
Why We Need to Make Assumptions
OWF ENC MAC PKE 2PC FHE
P = NP
6
Idea Behind Provable Security
ENC MAC 2PC
6
Idea Behind Provable Security
ENC MAC 2PC
6
Idea Behind Provable Security
Assumption ENC MAC 2PC
6
Idea Behind Provable Security
Assumption ENC MAC 2PC
6
Idea Behind Provable Security
Abstract Assumption ENC MAC 2PC
B P7
Determining Minimal Assumptions
Statistical Security
7
Determining Minimal Assumptions
Statistical Security One-Way Functions
7
Determining Minimal Assumptions
Statistical Security One-Way Functions Trapdoor Permutations
7
Determining Minimal Assumptions
Statistical Security One-Way Functions Trapdoor Permutations Oblivious Transfer
7
Determining Minimal Assumptions
Statistical Security One-Way Functions Trapdoor Permutations Oblivious Transfer . . . Fully Homomorphic Encryption . . .
7
Determining Minimal Assumptions
Statistical Security One-Way Functions Trapdoor Permutations Oblivious Transfer . . . Fully Homomorphic Encryption . . .
7
Determining Minimal Assumptions
Statistical Security One-Way Functions Trapdoor Permutations Oblivious Transfer . . . Fully Homomorphic Encryption . . .
7
Determining Minimal Assumptions
Statistical Security One-Way Functions Trapdoor Permutations Oblivious Transfer . . . Fully Homomorphic Encryption . . .
7
Determining Minimal Assumptions
Statistical Security One-Way Functions Trapdoor Permutations Oblivious Transfer . . . Fully Homomorphic Encryption . . .
7
Determining Minimal Assumptions
Statistical Security One-Way Functions Trapdoor Permutations Oblivious Transfer . . . Fully Homomorphic Encryption . . .
8
Schnorr Signatures 2-Party Computation Obfuscation
8
Schnorr Signatures [FF13,FJS14] 2-Party Computation Obfuscation Most Natural Assumptions (tightly) Discrete Logarithm Assumption
9
Schnorr Signatures
◮ Very simple, very efficient!
9
Schnorr Signatures
◮ Very simple, very efficient! ◮ Proven secure under the discrete log assumption. [PS96] But
9
Schnorr Signatures
◮ Very simple, very efficient! ◮ Proven secure under the discrete log assumption. [PS96] But
◮ Proof in the Random Oracle Model
9
Schnorr Signatures
◮ Very simple, very efficient! ◮ Proven secure under the discrete log assumption. [PS96] But
◮ Proof in the Random Oracle Model ◮ Proof is extremely loose.
10
Schnorr Signatures
The security of Schnorr signatures cannot be reduced to the discrete logarithm assumption using a naturally restricted reduction in a less idealized model (NPROM). The result holds under the slightly stronger one-more discrete logarithm assumption.
11
Schnorr Signatures
The security of Schnorr signatures cannot be tightly reduced to any natural non-interactive assumption using a generic reduction. The result holds unconditionally.
12
Schnorr Signatures [FF13,FJS14] 2-Party Computation [DFKLS14] Obfuscation Most Natural Assumptions (tightly) Discrete Logarithm Assumption Malicious PUFs
13
Secure Two-Party Computation from PUFs
◮ The idea: Use secure hardware to overcome impossibility of
information theoretically secure 2-PC.
13
Secure Two-Party Computation from PUFs
◮ The idea: Use secure hardware to overcome impossibility of
information theoretically secure 2-PC.
◮ Use Physically Uncloneable Functions
13
Secure Two-Party Computation from PUFs
◮ The idea: Use secure hardware to overcome impossibility of
information theoretically secure 2-PC.
◮ Use Physically Uncloneable Functions
◮ Behave like random functions.
13
Secure Two-Party Computation from PUFs
◮ The idea: Use secure hardware to overcome impossibility of
information theoretically secure 2-PC.
◮ Use Physically Uncloneable Functions
◮ Behave like random functions. ◮ Cannot be copied.
14
Secure Computation from PUFs
[BFSK11] [OSVW13]
Honest Malicious Stateless Malicious Stateful Unconditional
14
Secure Computation from PUFs
[BFSK11] [OSVW13] Our Paper Our Paper Honest Malicious Stateless Malicious Stateful Unconditional
15
Schnorr Signatures [FF13,FJS14] 2-Party Computation [DFKLS14] Obfuscation [BBF16] Most Natural Assumptions (tightly) Discrete Logarithm Assumption Malicious PUFs Stateless Malicious PUFs Statistical Security
16
Statistically Secure Obfuscation
O C C′ r
16
Statistically Secure Obfuscation
O C C′ r
◮ Perfect Correctness: For any circuit C
∀x : C′(x) = C(x)
16
Statistically Secure Obfuscation
O C C′ r
◮ Perfect Correctness: For any circuit C
∀x : C′(x) = C(x)
◮ (1 − ǫ)-Approximate Correctness: For any circuit C,
Pr
r,x
17
Statistically Secure Obfuscation
O C C′ r
◮ Indistinguishability Obfuscator: For any pair of circuits,
such that C1 ≡ C2 and |C1| = |C2| SD(O(C1), O(C2)) ≤ negl(n)
17
Statistically Secure Obfuscation
O C C′ r
◮ Indistinguishability Obfuscator: For any pair of circuits,
such that C1 ≡ C2 and |C1| = |C2| SD(O(C1), O(C2)) ≤ negl(n)
◮ (1 − δ)-Correlation Obfuscator: For any pair of circuits,
such that C1 ≡ C2 and |C1| = |C2| SD(O(C1), O(C2)) ≤ δ(n)
18
Why Do We Even Care About Approximate Correctness?
Because approximate obfuscation is useful! [MMNPs16,SW14,Hol06] 0.1 0.2 0.3 0.4 0.5 0.25 0.5 0.75 1 Correctness Error ǫ Statistical Distance δ
Allows PKE from OWF
19
Main Result
◮ If statistically secure, approximately correct iO (saiO) exists,
then either one-way functions do not exist, or NP ⊆ AM ∩ coAM.
◮ More Generally: If (1 − δ)-statistically secure,
(1 − ǫ)-approximately correct correlation obfuscation (sacO) exists with δ(n) ≤ 1
3 − 2 3ǫ(n) − 1 poly(n), then either one-way
functions do not exist, or NP ⊆ AM ∩ coAM.
◮ For very weak parameters, a trivial construction of sacO exists
with δ(n) = 2ǫ(n).
20
The Landscape of Correlation Obfuscation
0.1 0.2 0.3 0.4 0.5 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Correctness Error ǫ Statistical Distance δ
Achievable with Trivial Construction Ruled out by Negative Result
20
The Landscape of Correlation Obfuscation
0.1 0.2 0.3 0.4 0.5 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Correctness Error ǫ Statistical Distance δ
Achievable with Trivial Construction Ruled out by Negative Result Allows PKE from OWF
21
Publications
On the Existence of Three Round Zero-Knowledge Proofs (EUROCRYPT 2018)
Nils Fleischhacker, Vipul Goyal, Abhishek Jain
Efficient Cryptographic Password Hardening Services From Partially Oblivious Commitments (CCS 2016)
Jonas Schneider, Nils Fleischhacker, Dominique Schr¨
On Statistically Secure Obfuscation with Approximate Correctness (CRYPTO 2016)
Zvika Brakerski, Chris Brzuska, Nils Fleischhacker
Two Message Oblivious Evaluation of Cryptographic Functionalities (CRYPTO 2016)
Nico Doettling, Nils Fleischhacker, Johannes Krupp, Dominique Schr¨
Efficient Unlinkable Sanitizable Signatures from Signatures with Re-Randomizable Keys (PKC 2016)
Nils Fleischhacker, Johannes Krupp, Giulio Malavolta, Jonas Schneider, Dominique Schr¨
On Tight Security Proofs for Schnorr Signatures (ASIACRYPT 2014)
Nils Fleischhacker, Tibor Jager, Dominique Schr¨
Feasibility and Infeasibility of Secure Computation with Malicious PUFs (CRYPTO 2014)
Dana Dachman-Soled, Nils Fleischhacker, Jonathan Katz, Anna Lysyanskaya, Dominique Schr¨
Limitations of the Meta-Reduction Technique: The Case of Schnorr Signatures (EUROCRYPT 2013)
Marc Fischlin, Nils Fleischhacker
22