On Assumptions and the Limits of Cryptography Nils Fleischhacker - - PowerPoint PPT Presentation

on assumptions and the limits of cryptography
SMART_READER_LITE
LIVE PREVIEW

On Assumptions and the Limits of Cryptography Nils Fleischhacker - - PowerPoint PPT Presentation

On Assumptions and the Limits of Cryptography Nils Fleischhacker Bochum, January 24, 2018 2 2 2 So, how do we know all of this is secure? 2 The sad truth is: We dont! Not really. So, how do we know all of this is secure? 2 The


slide-1
SLIDE 1

On Assumptions and the Limits of Cryptography

Nils Fleischhacker

Bochum, January 24, 2018

slide-2
SLIDE 2

2

slide-3
SLIDE 3

2

slide-4
SLIDE 4

2

slide-5
SLIDE 5

2

So, how do we know all of this is secure?

slide-6
SLIDE 6

2

So, how do we know all of this is secure? The sad truth is: We don’t! Not really.

slide-7
SLIDE 7

3

The Cryptographic Landscape

slide-8
SLIDE 8

3

The Cryptographic Landscape

DS PKE

slide-9
SLIDE 9

3

The Cryptographic Landscape

DS PKE 2PC

slide-10
SLIDE 10

3

The Cryptographic Landscape

DS PKE 2PC FHE iO

slide-11
SLIDE 11

3

The Cryptographic Landscape

DS PKE 2PC FHE iO

One-way Functions Trapdoor Permutations Trapdoor Permutations

slide-12
SLIDE 12

3

The Cryptographic Landscape

DS PKE 2PC FHE iO

One-way Functions Trapdoor Permutations Trapdoor Permutations Oblivious Transfer LWE

slide-13
SLIDE 13

3

The Cryptographic Landscape

DS PKE 2PC FHE iO

One-way Functions Trapdoor Permutations Trapdoor Permutations Oblivious Transfer LWE Multi-Linear Maps

slide-14
SLIDE 14

3

The Cryptographic Landscape

DS PKE 2PC FHE iO

One-way Functions Trapdoor Permutations Trapdoor Permutations Oblivious Transfer LWE Multi-Linear Maps

slide-15
SLIDE 15

3

The Cryptographic Landscape

DS PKE 2PC FHE iO

One-way Functions Trapdoor Permutations Trapdoor Permutations Oblivious Transfer LWE

slide-16
SLIDE 16

3

The Cryptographic Landscape

DS PKE 2PC FHE iO

One-way Functions Trapdoor Permutations Trapdoor Permutations Oblivious Transfer LWE

Well this seems like a terrible idea!

slide-17
SLIDE 17

4

One-Way Functions

f x

slide-18
SLIDE 18

4

One-Way Functions

f x y

slide-19
SLIDE 19

4

One-Way Functions

f x y

slide-20
SLIDE 20

4

One-Way Functions

f x y ???

slide-21
SLIDE 21

5

Why We Need to Make Assumptions

slide-22
SLIDE 22

5

Why We Need to Make Assumptions

OWF ENC

slide-23
SLIDE 23

5

Why We Need to Make Assumptions

OWF ENC MAC

slide-24
SLIDE 24

5

Why We Need to Make Assumptions

OWF ENC MAC PKE

slide-25
SLIDE 25

5

Why We Need to Make Assumptions

OWF ENC MAC PKE 2PC

slide-26
SLIDE 26

5

Why We Need to Make Assumptions

OWF ENC MAC PKE 2PC FHE

slide-27
SLIDE 27

5

Why We Need to Make Assumptions

OWF ENC MAC PKE 2PC FHE

P = NP

slide-28
SLIDE 28

5

Why We Need to Make Assumptions

OWF ENC MAC PKE 2PC FHE

P = NP

slide-29
SLIDE 29

6

Idea Behind Provable Security

ENC MAC 2PC

slide-30
SLIDE 30

6

Idea Behind Provable Security

ENC MAC 2PC

slide-31
SLIDE 31

6

Idea Behind Provable Security

Assumption ENC MAC 2PC

slide-32
SLIDE 32

6

Idea Behind Provable Security

Assumption ENC MAC 2PC

slide-33
SLIDE 33

6

Idea Behind Provable Security

Abstract Assumption ENC MAC 2PC

B P
slide-34
SLIDE 34

7

Determining Minimal Assumptions

Statistical Security

slide-35
SLIDE 35

7

Determining Minimal Assumptions

Statistical Security One-Way Functions

slide-36
SLIDE 36

7

Determining Minimal Assumptions

Statistical Security One-Way Functions Trapdoor Permutations

slide-37
SLIDE 37

7

Determining Minimal Assumptions

Statistical Security One-Way Functions Trapdoor Permutations Oblivious Transfer

slide-38
SLIDE 38

7

Determining Minimal Assumptions

Statistical Security One-Way Functions Trapdoor Permutations Oblivious Transfer . . . Fully Homomorphic Encryption . . .

slide-39
SLIDE 39

7

Determining Minimal Assumptions

Statistical Security One-Way Functions Trapdoor Permutations Oblivious Transfer . . . Fully Homomorphic Encryption . . .

slide-40
SLIDE 40

7

Determining Minimal Assumptions

Statistical Security One-Way Functions Trapdoor Permutations Oblivious Transfer . . . Fully Homomorphic Encryption . . .

slide-41
SLIDE 41

7

Determining Minimal Assumptions

Statistical Security One-Way Functions Trapdoor Permutations Oblivious Transfer . . . Fully Homomorphic Encryption . . .

slide-42
SLIDE 42

7

Determining Minimal Assumptions

Statistical Security One-Way Functions Trapdoor Permutations Oblivious Transfer . . . Fully Homomorphic Encryption . . .

slide-43
SLIDE 43

7

Determining Minimal Assumptions

Statistical Security One-Way Functions Trapdoor Permutations Oblivious Transfer . . . Fully Homomorphic Encryption . . .

slide-44
SLIDE 44

8

Schnorr Signatures 2-Party Computation Obfuscation

slide-45
SLIDE 45

8

Schnorr Signatures [FF13,FJS14] 2-Party Computation Obfuscation Most Natural Assumptions (tightly) Discrete Logarithm Assumption

slide-46
SLIDE 46

9

Schnorr Signatures

◮ Very simple, very efficient!

slide-47
SLIDE 47

9

Schnorr Signatures

◮ Very simple, very efficient! ◮ Proven secure under the discrete log assumption. [PS96] But

slide-48
SLIDE 48

9

Schnorr Signatures

◮ Very simple, very efficient! ◮ Proven secure under the discrete log assumption. [PS96] But

◮ Proof in the Random Oracle Model

slide-49
SLIDE 49

9

Schnorr Signatures

◮ Very simple, very efficient! ◮ Proven secure under the discrete log assumption. [PS96] But

◮ Proof in the Random Oracle Model ◮ Proof is extremely loose.

slide-50
SLIDE 50

10

Schnorr Signatures

The security of Schnorr signatures cannot be reduced to the discrete logarithm assumption using a naturally restricted reduction in a less idealized model (NPROM). The result holds under the slightly stronger one-more discrete logarithm assumption.

slide-51
SLIDE 51

11

Schnorr Signatures

The security of Schnorr signatures cannot be tightly reduced to any natural non-interactive assumption using a generic reduction. The result holds unconditionally.

slide-52
SLIDE 52

12

Schnorr Signatures [FF13,FJS14] 2-Party Computation [DFKLS14] Obfuscation Most Natural Assumptions (tightly) Discrete Logarithm Assumption Malicious PUFs

slide-53
SLIDE 53

13

Secure Two-Party Computation from PUFs

◮ The idea: Use secure hardware to overcome impossibility of

information theoretically secure 2-PC.

slide-54
SLIDE 54

13

Secure Two-Party Computation from PUFs

◮ The idea: Use secure hardware to overcome impossibility of

information theoretically secure 2-PC.

◮ Use Physically Uncloneable Functions

slide-55
SLIDE 55

13

Secure Two-Party Computation from PUFs

◮ The idea: Use secure hardware to overcome impossibility of

information theoretically secure 2-PC.

◮ Use Physically Uncloneable Functions

◮ Behave like random functions.

slide-56
SLIDE 56

13

Secure Two-Party Computation from PUFs

◮ The idea: Use secure hardware to overcome impossibility of

information theoretically secure 2-PC.

◮ Use Physically Uncloneable Functions

◮ Behave like random functions. ◮ Cannot be copied.

slide-57
SLIDE 57

14

Secure Computation from PUFs

[BFSK11] [OSVW13]

? ?

Honest Malicious Stateless Malicious Stateful Unconditional

slide-58
SLIDE 58

14

Secure Computation from PUFs

[BFSK11] [OSVW13] Our Paper Our Paper Honest Malicious Stateless Malicious Stateful Unconditional

slide-59
SLIDE 59

15

Schnorr Signatures [FF13,FJS14] 2-Party Computation [DFKLS14] Obfuscation [BBF16] Most Natural Assumptions (tightly) Discrete Logarithm Assumption Malicious PUFs Stateless Malicious PUFs Statistical Security

slide-60
SLIDE 60

16

Statistically Secure Obfuscation

O C C′ r

slide-61
SLIDE 61

16

Statistically Secure Obfuscation

O C C′ r

◮ Perfect Correctness: For any circuit C

∀x : C′(x) = C(x)

slide-62
SLIDE 62

16

Statistically Secure Obfuscation

O C C′ r

◮ Perfect Correctness: For any circuit C

∀x : C′(x) = C(x)

◮ (1 − ǫ)-Approximate Correctness: For any circuit C,

Pr

r,x

  • C′(x) = C(x)
  • ≥ 1 − ǫ(n)
slide-63
SLIDE 63

17

Statistically Secure Obfuscation

O C C′ r

◮ Indistinguishability Obfuscator: For any pair of circuits,

such that C1 ≡ C2 and |C1| = |C2| SD(O(C1), O(C2)) ≤ negl(n)

slide-64
SLIDE 64

17

Statistically Secure Obfuscation

O C C′ r

◮ Indistinguishability Obfuscator: For any pair of circuits,

such that C1 ≡ C2 and |C1| = |C2| SD(O(C1), O(C2)) ≤ negl(n)

◮ (1 − δ)-Correlation Obfuscator: For any pair of circuits,

such that C1 ≡ C2 and |C1| = |C2| SD(O(C1), O(C2)) ≤ δ(n)

slide-65
SLIDE 65

18

Why Do We Even Care About Approximate Correctness?

Because approximate obfuscation is useful! [MMNPs16,SW14,Hol06] 0.1 0.2 0.3 0.4 0.5 0.25 0.5 0.75 1 Correctness Error ǫ Statistical Distance δ

Allows PKE from OWF

slide-66
SLIDE 66

19

Main Result

◮ If statistically secure, approximately correct iO (saiO) exists,

then either one-way functions do not exist, or NP ⊆ AM ∩ coAM.

◮ More Generally: If (1 − δ)-statistically secure,

(1 − ǫ)-approximately correct correlation obfuscation (sacO) exists with δ(n) ≤ 1

3 − 2 3ǫ(n) − 1 poly(n), then either one-way

functions do not exist, or NP ⊆ AM ∩ coAM.

◮ For very weak parameters, a trivial construction of sacO exists

with δ(n) = 2ǫ(n).

slide-67
SLIDE 67

20

The Landscape of Correlation Obfuscation

0.1 0.2 0.3 0.4 0.5 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Correctness Error ǫ Statistical Distance δ

Achievable with Trivial Construction Ruled out by Negative Result

slide-68
SLIDE 68

20

The Landscape of Correlation Obfuscation

0.1 0.2 0.3 0.4 0.5 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Correctness Error ǫ Statistical Distance δ

Achievable with Trivial Construction Ruled out by Negative Result Allows PKE from OWF

slide-69
SLIDE 69

21

Publications

On the Existence of Three Round Zero-Knowledge Proofs (EUROCRYPT 2018)

Nils Fleischhacker, Vipul Goyal, Abhishek Jain

Efficient Cryptographic Password Hardening Services From Partially Oblivious Commitments (CCS 2016)

Jonas Schneider, Nils Fleischhacker, Dominique Schr¨

  • der, Michael Backes

On Statistically Secure Obfuscation with Approximate Correctness (CRYPTO 2016)

Zvika Brakerski, Chris Brzuska, Nils Fleischhacker

Two Message Oblivious Evaluation of Cryptographic Functionalities (CRYPTO 2016)

Nico Doettling, Nils Fleischhacker, Johannes Krupp, Dominique Schr¨

  • der

Efficient Unlinkable Sanitizable Signatures from Signatures with Re-Randomizable Keys (PKC 2016)

Nils Fleischhacker, Johannes Krupp, Giulio Malavolta, Jonas Schneider, Dominique Schr¨

  • der, Mark Simkin

On Tight Security Proofs for Schnorr Signatures (ASIACRYPT 2014)

Nils Fleischhacker, Tibor Jager, Dominique Schr¨

  • der

Feasibility and Infeasibility of Secure Computation with Malicious PUFs (CRYPTO 2014)

Dana Dachman-Soled, Nils Fleischhacker, Jonathan Katz, Anna Lysyanskaya, Dominique Schr¨

  • der

Limitations of the Meta-Reduction Technique: The Case of Schnorr Signatures (EUROCRYPT 2013)

Marc Fischlin, Nils Fleischhacker

slide-70
SLIDE 70

22

Thank You!