On the Circular Security of Bit Encryption Ron Rothblum Weizmann - - PowerPoint PPT Presentation

on the circular security of bit encryption
SMART_READER_LITE
LIVE PREVIEW

On the Circular Security of Bit Encryption Ron Rothblum Weizmann - - PowerPoint PPT Presentation

On the Circular Security of Bit Encryption Ron Rothblum Weizmann Institute Circular Security Circular Security Q: Is it in general safe to encrypt your own key? A: For some schemes (e.g. [BHHO08,ACPS09] ) yes but in general No! Circular


slide-1
SLIDE 1

On the Circular Security

  • f Bit Encryption

Ron Rothblum Weizmann Institute

slide-2
SLIDE 2

Circular Security

slide-3
SLIDE 3

Circular Security

Q: Is it in general safe to encrypt your own key? A: For some schemes (e.g. [BHHO08,ACPS09]) yes but in general No!

slide-4
SLIDE 4

Circular Security

slide-5
SLIDE 5

Public Key Example Public Key Example

slide-6
SLIDE 6

Circular Security of Bit Encryption

Since general case is false, focus on interesting special case of bit-encryption. Why bit-encryption? 1. Most candidate FHE are bit-encryption whose semantic-security relies on their circular security (which is not understood). 2. Seems most natural way to foil the previous counterexample and get circular security for “free”.

slide-7
SLIDE 7

Bit-Encryption Conjecture

Conjecture: [Folklore] Every semantically-secure bit-encryption scheme is circular secure. Focus of this work is showing obstacles to proving the conjecture.

slide-8
SLIDE 8

Our Results

1. A scheme that is circular insecure but is semantically secure based on multilinear maps. 2. Cannot prove the conjecture via a blackbox reduction. 3. Equivalence of different security notions for circular security of bit- encryption.

slide-9
SLIDE 9

Our Results

1. A scheme that is circular insecure but is semantically secure based on multilinear maps. 2. Cannot prove the conjecture via a blackbox reduction. 3. Equivalence of different security notions for circular security of bit- encryption.

slide-10
SLIDE 10

Our Assumption

An extension of an assumption made on groups with bilinear maps to groups with multilinear maps.

slide-11
SLIDE 11

Multilinear Maps

slide-12
SLIDE 12

Multilinear Maps

There exist trivial multilinear maps unconditionally but for crypto, need computational problems such as discrete-log to be hard. Do there exist multilinear groups on which discrete-log (and friends) are hard? [BS03]

slide-13
SLIDE 13

(Silly) Example (Silly) Example

slide-14
SLIDE 14

SXDH Assumption [BGMM05, ACHM05]

c

slide-15
SLIDE 15
slide-16
SLIDE 16

Theorem

slide-17
SLIDE 17

El-Gamal Variant

Key Generation: Decrypt(c,d):

slide-18
SLIDE 18

Our Scheme

Key Generation:

slide-19
SLIDE 19

Our Scheme

Key Generation:

slide-20
SLIDE 20

Circular Security Attack

… … … … … … …

slide-21
SLIDE 21

Circular Security Attack

…. …

slide-22
SLIDE 22

Circular Security Attack

…. …

slide-23
SLIDE 23

Circular Security Attack

…. …

slide-24
SLIDE 24

Circular Security Attack

With overwhelming probability

slide-25
SLIDE 25

Our Results

1. A scheme that is circular insecure but is semantically secure based on multilinear maps. 2. Cannot prove the conjecture via a blackbox reduction. 3. Equivalence of different security notions for circular security of bit- encryption.

slide-26
SLIDE 26

Blackbox Impossibility Result

No blackbox reduction from circular-security of bit-encryption scheme to semantic-security (or even CCA security) of the same scheme. Blackbox access to encryption-scheme and adversary. Incomparable to [HH09] KDM blackbox separation.

slide-27
SLIDE 27

[HH09] KDM Blackbox Impossibility [HH09] KDM Blackbox Impossibility

slide-28
SLIDE 28

A Blackbox Reduction A Blackbox Reduction

Circular Security Encryption Scheme Circular Security Adversary

Challenger

Scheme

Challenger

Reduction (Semantic Security (Semantic Security Adversary)

slide-29
SLIDE 29

Our Results

1. A scheme that is circular insecure but is semantically secure based on multilinear maps. 2. Cannot prove the conjecture via a blackbox reduction. 3. Equivalence of different security notions for circular security of bit- encryption.

slide-30
SLIDE 30

Circular Security Definitions

slide-31
SLIDE 31

Equivalence Result

slide-32
SLIDE 32

Open Problems

slide-33
SLIDE 33

Thank you!