On the Structure of Unconditional UC Hybrid Protocols
Mike Rosulek (Oregon State University) and Morgan Shirley (University of Toronto)
On the Structure of Unconditional UC Hybrid Protocols Mike Rosulek - - PowerPoint PPT Presentation
On the Structure of Unconditional UC Hybrid Protocols Mike Rosulek (Oregon State University) and Morgan Shirley (University of Toronto) Problem Statement & Summary of Results Our Parameters f(x, y) y x 2-Party functions A B
Mike Rosulek (Oregon State University) and Morgan Shirley (University of Toronto)
tables
x y f(x, y) x y 2 2 1 1
tables
x y f(x, y)
Either:
Either:
Trivial!
Either:
Trivial! Impossible!
(literally everything interesting)
Either:
Trivial! Impossible!
(literally everything interesting)
We'd like to differentiate functionalities on the right side
Canetti, Kushilevitz and Lindell EUROCRYPT 2003 Prabhakaran and Rosulek CRYPTO 2008
a g-hybrid protocol for f that has UC security
for completeness
Trivial! Complete
Reduces to everything Everything reduces to
Trivial! Complete
Reduces to everything Everything reduces to
Neither
Trivial! Complete
Reduces to everything Everything reduces to
Neither
Trivial! Complete
Reduces to everything Everything reduces to
Neither
Some reductions studied between decomposable functions (e.g. Maji, Prabhakaran, Rosulek TCC 2009)
Trivial! Complete
Reduces to everything Everything reduces to
Neither
Some reductions studied between decomposable functions (e.g. Maji, Prabhakaran, Rosulek TCC 2009)
Trivial! Complete
Reduces to everything Everything reduces to
Neither
Some reductions studied between decomposable functions (e.g. Maji, Prabhakaran, Rosulek TCC 2009)
When f and g are incomplete, if f g ⊑ then:
– f
g ⊑ via a single-round deterministic protocol
When f and g are incomplete, if f g ⊑ then:
– f
g ⊑ via a single-round deterministic protocol
*With a few edge cases
column) constant!
the output before the protocol begins
When f and g are incomplete, if f g ⊑ then:
– f
g ⊑ via a single-round deterministic protocol
When f and g are incomplete and f is non- unilateral, if f g ⊑ then:
– f
g ⊑ via a single-round deterministic protocol
Number of protocol rounds necessary (for incomplete and non-unilateral f and g)
1
...
Number of protocol rounds necessary (for incomplete and non-unilateral f and g)
1 ω(log κ)
...
When f and g are incomplete and f is non- unilateral, if f g ⊑ then:
– f
g ⊑ via a single-round deterministic protocol
When f and g are incomplete and f is non- unilateral, if f g ⊑ via a (worst-case) log-round protocol:
– f
g ⊑ via a single-round deterministic protocol
When f and g are incomplete and f is non- unilateral, the following are equivalent:
– f
g ⊑ via a (worst-case) log-round protocol
– f
g ⊑ via a single-round deterministic protocol
– f embeds in g
When f and g are incomplete and f is non- unilateral, the following are equivalent:
– f
g ⊑ via a (worst-case) log-round protocol
– f
g ⊑ via a single-round deterministic protocol
– f embeds in g
These edge cases are necessary
g
g g
g
g g
g
g
g g
g
*Perhaps with some rearrangement and relabelling
g can't reveal too much information There are no ambiguous g-inputs
g can't reveal too much information There are no ambiguous g-inputs
g can't reveal too much information There are no ambiguous g-inputs
g can't reveal too much information There are no ambiguous g-inputs
g can't reveal too much information There are no ambiguous g-inputs
g can't reveal too much information There are no ambiguous g-inputs
g can't reveal too much information There are no ambiguous g-inputs
g can't reveal too much information There are no ambiguous g-inputs
– If there's an embedding, there's a single-round
protocol
– If there's a single-round protocol, there's an
embedding
When f and g are incomplete and f is non- unilateral, the following are equivalent:
– f
g ⊑ via a (worst-case) log-round protocol
– f
g ⊑ via a single-round deterministic protocol
– f embeds in g
When f and g are incomplete and f is non- unilateral, the following are equivalent:
– f
g ⊑ via a (worst-case) log-round protocol
– f
g ⊑ via a single-round deterministic protocol
– f embeds in g
When f and g are incomplete and f is non- unilateral, the following are equivalent:
– f
g ⊑ via a (worst-case) log-round protocol
– f
g ⊑ via a single-round deterministic protocol
– f embeds in g
g g g g g g g g g g
g
g
g
g
g
g
g
g
g
g
Property: Alice's simulator has extracted
g
g
g
g
g
g
g
g
g
g
Property: Alice's simulator has extracted
– FB-ext – FB-out
Idea: Give me any secure, correct protocol for f
⊑
g g g g g g g g g g
FA-ext FB-ext FB-out FA-out
g g g g g g g g g g
FA-ext FB-ext FB-out FA-out
g g g g g g g g g g
FA-ext FB-ext FB-out FA-out
g g g g g g g g g g
FA-ext FB-ext FB-out FA-out
g g g g g g g g g g
FA-ext FB-ext FB-out FA-out
g g g g g g g g g g
FA-ext FB-ext FB-out FA-out
This is where we need f to be non-unilateral
g g g g g g g g g g
g g g g g g g g g g
Before: no information shared After: output of f is known Error (small)
g g g g
Before: no information shared Error (small)
g g g g g g g
O(log κ)
g g g g g g g
O(log κ)
g
g g g g g g
O(log κ)
If the simulation error is low enough (small constant), then this is a valid protocol!
g g
g g g g g g g
O(log κ)
Error ≥ 1/c
If all of these final-round calls are not valid single-round protocols, it must be very unlikely to get to the final round!
g g g g g g g
O(log κ)
Error ≥ 1/c
g g g
O(log κ)
g
O(log κ)
repeated O(log κ) times
fjrst round is cO(log κ)ε = poly(κ)ε, which is negligible
for f g ⊑
When f and g are incomplete and f is non- unilateral, the following are equivalent:
– f
g ⊑ via a (worst-case) log-round protocol
– f
g ⊑ via a single-round deterministic protocol
– f embeds in g
What would a protocol with ω(log κ) rounds look like?
– Conjecture: we only ever need to add 1 round
– Hard to construct examples – A general characterization would be
interesting
Questions?