On the Structure of Unconditional UC Hybrid Protocols Mike Rosulek - - PowerPoint PPT Presentation

on the structure of unconditional uc hybrid protocols
SMART_READER_LITE
LIVE PREVIEW

On the Structure of Unconditional UC Hybrid Protocols Mike Rosulek - - PowerPoint PPT Presentation

On the Structure of Unconditional UC Hybrid Protocols Mike Rosulek (Oregon State University) and Morgan Shirley (University of Toronto) Problem Statement & Summary of Results Our Parameters f(x, y) y x 2-Party functions A B


slide-1
SLIDE 1

On the Structure of Unconditional UC Hybrid Protocols

Mike Rosulek (Oregon State University) and Morgan Shirley (University of Toronto)

slide-2
SLIDE 2

Problem Statement & Summary of Results

slide-3
SLIDE 3

Our Parameters

  • 2-Party functions
  • Finite and fjxed truth

tables

  • Symmetric
  • UC Security
  • Security with abort
  • Information theoretic

0 2 1 120 201

A B

x y f(x, y) x y 2 2 1 1

slide-4
SLIDE 4

Our Parameters

  • 2-Party functions
  • Finite and fjxed truth

tables

  • Symmetric
  • UC Security
  • Security with abort
  • Information theoretic

0 2 1 120 201

A B

x y f(x, y)

slide-5
SLIDE 5

2-Party SFEs with Information- Theoretic UC Security

Either:

slide-6
SLIDE 6

2-Party SFEs with Information- Theoretic UC Security

Either:

Trivial!

0 1 001

slide-7
SLIDE 7

2-Party SFEs with Information- Theoretic UC Security

Either:

Trivial! Impossible!

0 1 001

(literally everything interesting)

slide-8
SLIDE 8

2-Party SFEs with Information- Theoretic UC Security

Either:

Trivial! Impossible!

0 1 001

(literally everything interesting)

We'd like to differentiate functionalities on the right side

Canetti, Kushilevitz and Lindell EUROCRYPT 2003 Prabhakaran and Rosulek CRYPTO 2008

slide-9
SLIDE 9

Hybrid World

slide-10
SLIDE 10

Reductions

  • A way to defjne complexity
  • A function f reduces to a function g if there exists

a g-hybrid protocol for f that has UC security

f ⊑ g

slide-11
SLIDE 11

Goal: completely classify when f and g reduce to each other

slide-12
SLIDE 12

Completeness

  • Complete g: every f reduces to g
  • Kilian1 shows a necessary and suffjcient condition

for completeness

  • 1. In 23rd ACM STOC, 1991

1 11

slide-13
SLIDE 13

2-Party SFEs with Information- Theoretic UC Security

Trivial! Complete

0 1 001 1 11

Reduces to everything Everything reduces to

slide-14
SLIDE 14

2-Party SFEs with Information- Theoretic UC Security

Trivial! Complete

0 1 001 1 11

Reduces to everything Everything reduces to

Neither

slide-15
SLIDE 15

2-Party SFEs with Information- Theoretic UC Security

Trivial! Complete

0 1 001 1 11

Reduces to everything Everything reduces to

Neither

0 1 001 110

slide-16
SLIDE 16

2-Party SFEs with Information- Theoretic UC Security

Trivial! Complete

0 1 001 1 11

Reduces to everything Everything reduces to

Neither

0 1 001 110

Some reductions studied between decomposable functions (e.g. Maji, Prabhakaran, Rosulek TCC 2009)

slide-17
SLIDE 17

2-Party SFEs with Information- Theoretic UC Security

Trivial! Complete

0 1 001 1 11

Reduces to everything Everything reduces to

Neither

0 1 001 110 1 2 1 452 433

Some reductions studied between decomposable functions (e.g. Maji, Prabhakaran, Rosulek TCC 2009)

slide-18
SLIDE 18

2-Party SFEs with Information- Theoretic UC Security

Trivial! Complete

0 1 001 1 11

Reduces to everything Everything reduces to

Neither

0 1 001 110 1 2 1 452 433

Some reductions studied between decomposable functions (e.g. Maji, Prabhakaran, Rosulek TCC 2009)

?

slide-19
SLIDE 19

Main Theorem (almost)

When f and g are incomplete, if f g ⊑ then:

– f

g ⊑ via a single-round deterministic protocol

slide-20
SLIDE 20

Main Theorem (almost)

When f and g are incomplete, if f g ⊑ then:

– f

g ⊑ via a single-round deterministic protocol

*

*With a few edge cases

slide-21
SLIDE 21

Edge case: Unilateral functions

1 1 1 233 233

  • At least one row (or

column) constant!

  • One party might know

the output before the protocol begins

slide-22
SLIDE 22

Main Theorem (almost)

When f and g are incomplete, if f g ⊑ then:

– f

g ⊑ via a single-round deterministic protocol

slide-23
SLIDE 23

Main Theorem (almost)

When f and g are incomplete and f is non- unilateral, if f g ⊑ then:

– f

g ⊑ via a single-round deterministic protocol

slide-24
SLIDE 24

Number of rounds required in a g-hybrid protocol for f

Number of protocol rounds necessary (for incomplete and non-unilateral f and g)

1

...

slide-25
SLIDE 25

Number of rounds required in a g-hybrid protocol for f

Number of protocol rounds necessary (for incomplete and non-unilateral f and g)

1 ω(log κ)

...

slide-26
SLIDE 26

Main Theorem (almost)

When f and g are incomplete and f is non- unilateral, if f g ⊑ then:

– f

g ⊑ via a single-round deterministic protocol

slide-27
SLIDE 27

Main Theorem

When f and g are incomplete and f is non- unilateral, if f g ⊑ via a (worst-case) log-round protocol:

– f

g ⊑ via a single-round deterministic protocol

slide-28
SLIDE 28

Main Theorem

When f and g are incomplete and f is non- unilateral, the following are equivalent:

– f

g ⊑ via a (worst-case) log-round protocol

– f

g ⊑ via a single-round deterministic protocol

– f embeds in g

slide-29
SLIDE 29

Main Theorem

When f and g are incomplete and f is non- unilateral, the following are equivalent:

– f

g ⊑ via a (worst-case) log-round protocol

– f

g ⊑ via a single-round deterministic protocol

– f embeds in g

These edge cases are necessary

slide-30
SLIDE 30

Embedding

slide-31
SLIDE 31

What would a single-round reduction look like?

slide-32
SLIDE 32

What would a single-round reduction look like?

g

A B

g g

slide-33
SLIDE 33

What would a single-round reduction look like?

g

A B

g g

A B

g

A B

  • r
slide-34
SLIDE 34

What would a single-round reduction look like?

g

A B

g g

A B

g

A B

  • r
slide-35
SLIDE 35

Embedding: Correctness

  • Each party sends a g-input based on their f-input
  • The g-output maps back to an f-output
  • Intuitively: f appears as sub-matrix* in g

1 2 1 452 433 1 2 1 452 433 7 7 7 8889

*Perhaps with some rearrangement and relabelling

f g

slide-36
SLIDE 36

Embedding: Security

g can't reveal too much information There are no ambiguous g-inputs

1 5 3 146 247 13 14 24 1 3 3 224 13 24

slide-37
SLIDE 37

Embedding: Security

g can't reveal too much information There are no ambiguous g-inputs

1 5 3 146 247 13 14 24 1 3 3 224 13 24

slide-38
SLIDE 38

Embedding: Security

g can't reveal too much information There are no ambiguous g-inputs

1 5 3 146 247 13 14 24 1 3 3 224 13 24

slide-39
SLIDE 39

Embedding: Security

g can't reveal too much information There are no ambiguous g-inputs

1 5 3 146 247 13 14 24 1 3 3 224 13 24

slide-40
SLIDE 40

Embedding: Security

g can't reveal too much information There are no ambiguous g-inputs

1 5 3 146 247 13 14 24 1 3 3 224 13 24

slide-41
SLIDE 41

Embedding: Security

g can't reveal too much information There are no ambiguous g-inputs

1 5 3 146 247 13 14 24 1 3 3 224 13 24

slide-42
SLIDE 42

Embedding: Security

g can't reveal too much information There are no ambiguous g-inputs

1 5 3 146 247 13 14 24 1 3 3 224 13 24

slide-43
SLIDE 43

Embedding: Security

g can't reveal too much information There are no ambiguous g-inputs

1 5 3 146 247 13 14 24 1 3 3 224 13 24

slide-44
SLIDE 44

Embedding

  • Defjnition basically follows this intuition

– If there's an embedding, there's a single-round

protocol

– If there's a single-round protocol, there's an

embedding

slide-45
SLIDE 45

Main Theorem

When f and g are incomplete and f is non- unilateral, the following are equivalent:

– f

g ⊑ via a (worst-case) log-round protocol

– f

g ⊑ via a single-round deterministic protocol

– f embeds in g

slide-46
SLIDE 46

Main Theorem

When f and g are incomplete and f is non- unilateral, the following are equivalent:

– f

g ⊑ via a (worst-case) log-round protocol

– f

g ⊑ via a single-round deterministic protocol

– f embeds in g

slide-47
SLIDE 47

Main Theorem

When f and g are incomplete and f is non- unilateral, the following are equivalent:

– f

g ⊑ via a (worst-case) log-round protocol

– f

g ⊑ via a single-round deterministic protocol

– f embeds in g

slide-48
SLIDE 48

Collapse a protocol to a single round

slide-49
SLIDE 49

Frontiers

g g g g g g g g g g

slide-50
SLIDE 50

Frontiers

g

g

g

✗ ✗ ✗

g

g

✔ ✔

g

g

g

✔ ✔

g

✔ ✔

g

Property: Alice's simulator has extracted

slide-51
SLIDE 51

Frontiers

g

g

g

✗ ✗ ✗

g

g

✔ ✔

g

g

g

✔ ✔

g

✔ ✔

g

Property: Alice's simulator has extracted

slide-52
SLIDE 52

Our Frontiers

  • FA-ext – Alice's simulator has extracted
  • FA-out – Alice thinks the output is fjxed (regardless
  • f Bob's input)
  • Similar frontiers defjned for Bob

– FB-ext – FB-out

slide-53
SLIDE 53

Idea: Give me any secure, correct protocol for f

  • g. I can say something about the frontiers.

slide-54
SLIDE 54

Frontiers

g g g g g g g g g g

FA-ext FB-ext FB-out FA-out

slide-55
SLIDE 55

Frontiers

g g g g g g g g g g

FA-ext FB-ext FB-out FA-out

slide-56
SLIDE 56

Frontiers

g g g g g g g g g g

FA-ext FB-ext FB-out FA-out

BAD!

slide-57
SLIDE 57

Frontiers

g g g g g g g g g g

FA-ext FB-ext FB-out FA-out

slide-58
SLIDE 58

Frontiers

g g g g g g g g g g

FA-ext FB-ext FB-out FA-out

BAD!

slide-59
SLIDE 59

Frontiers

g g g g g g g g g g

FA-ext FB-ext FB-out FA-out

BAD!

This is where we need f to be non-unilateral

slide-60
SLIDE 60

Cycle of Inequalities

  • FA-ext not before FB-out
  • FA-out not before FA-ext
  • FB-ext not before FA-out
  • FB-out not before FB-ext
  • So they all happen at the same time!
  • Must happen due to a call to g
slide-61
SLIDE 61

Instantaneous Property

g g g g g g g g g g

slide-62
SLIDE 62

Instantaneous Property

g g g g g g g g g g

Before: no information shared After: output of f is known Error (small)

slide-63
SLIDE 63

Instantaneous Property

g g g g

Before: no information shared Error (small)

slide-64
SLIDE 64

Protocol Tree

  • Protocol has simulation error ε

g g g g g g g

O(log κ)

slide-65
SLIDE 65

Protocol Tree

  • Simulation error = ???

g g g g g g g

O(log κ)

g

slide-66
SLIDE 66

Protocol Tree

  • Simulation error = ???

g g g g g g

O(log κ)

If the simulation error is low enough (small constant), then this is a valid protocol!

g g

slide-67
SLIDE 67

Protocol Tree

  • Protocol has simulation error ε

g g g g g g g

O(log κ)

Error ≥ 1/c

slide-68
SLIDE 68

If all of these final-round calls are not valid single-round protocols, it must be very unlikely to get to the final round!

slide-69
SLIDE 69

Protocol Tree

  • Protocol has simulation error ε

g g g g g g g

O(log κ)

Error ≥ 1/c

slide-70
SLIDE 70

Protocol Tree

  • Protocol has simulation error cε

g g g

O(log κ)

slide-71
SLIDE 71

Protocol Tree

  • Protocol has simulation error c2ε

g

O(log κ)

slide-72
SLIDE 72

Collapse to a single round

  • Either we found a single-round protocol, or we

repeated O(log κ) times

  • Simulation error of the protocol truncating at the

fjrst round is cO(log κ)ε = poly(κ)ε, which is negligible

  • So this single-round protocol is a valid protocol

for f g ⊑

slide-73
SLIDE 73

Main Theorem

When f and g are incomplete and f is non- unilateral, the following are equivalent:

– f

g ⊑ via a (worst-case) log-round protocol

– f

g ⊑ via a single-round deterministic protocol

– f embeds in g

slide-74
SLIDE 74

What would a protocol with ω(log κ) rounds look like?

slide-75
SLIDE 75

A 2 1 3A4 65A A 2 1 3A4 65A B 2 1 4B3 56B C 2 1 3C4 65C D 2 1 3D4 65D D 2 1 4D3 56D C 4 1 6C2 35C E 4 1 6E2 35E 4 E 1 E62 5E3 A B A CDD CEE

  • The smallest counterexample we could fjnd!
  • No embedding (so no single round protocol)
  • Expected number of rounds is constant (3)
  • To achieve negligible error, ω(log κ) rounds are required!
slide-76
SLIDE 76

Future Work: Fix the edge cases

  • Unilateral functions

– Conjecture: we only ever need to add 1 round

  • Super-logarithmic protocols

– Hard to construct examples – A general characterization would be

interesting

slide-77
SLIDE 77

Questions?