Overcoming Impossibility Results in Composable Security using - - PowerPoint PPT Presentation

overcoming impossibility results in composable security
SMART_READER_LITE
LIVE PREVIEW

Overcoming Impossibility Results in Composable Security using - - PowerPoint PPT Presentation

Overcoming Impossibility Results in Composable Security using Interval-Wise Guarantees Daniel Jost Ueli Maurer ETH Zurich Crypto 2020, August 17-21, 2020 Motivation: how to best define security? Aug 17, 2020 2 Daniel Jost Defining Security


slide-1
SLIDE 1

Overcoming Impossibility Results in Composable Security using Interval-Wise Guarantees

Daniel Jost Ueli Maurer ETH Zurich

Crypto 2020, August 17-21, 2020

slide-2
SLIDE 2

Motivation: how to best define security?

Aug 17, 2020 Daniel Jost 2

slide-3
SLIDE 3

Defining Security

Aug 17, 2020 Daniel Jost 3

Game-based security:

  • Simple and minimal
  • no direct link to real-world

executions

  • many games
  • no composition
slide-4
SLIDE 4

Defining Security

Composable security:

Aug 17, 2020 Daniel Jost 4

  • Guarantees linked to real-world application
  • Modularization
  • Composition
  • Simple and minimal
  • no direct link to real-world

executions

  • many games
  • no composition
  • More complicated proofs
  • Less efficient schemes
  • Impossibility results

Game-based security:

slide-5
SLIDE 5

Defining Security

Composable security:

Aug 17, 2020 Daniel Jost 5

  • Guarantees linked to real-world application
  • Modularization
  • Composition
  • Simple and minimal
  • More complicated proofs
  • Less efficient schemes
  • Impossibility results

Game-based security:

Simulator-commitment problem

  • no direct link to real-world

executions

  • many games
  • no composition
slide-6
SLIDE 6

The Commitment Problem

  • Example:

− encrypting a message to protect confidentiality − where adversaries that can (adaptively) learn parties’ state (including keys)

Aug 17, 2020 Daniel Jost 6

πA πB

Key

sim

slide-7
SLIDE 7

The Commitment Problem

  • Example:

− encrypting a message to protect confidentiality − where adversaries that can (adaptively) learn parties’ state (including keys)

Aug 17, 2020 Daniel Jost 7

πA πB

Key

sim

Authenticated channel Secure channel (Leakable) key

slide-8
SLIDE 8

The Commitment Problem

  • Example:

− encrypting a message to protect confidentiality − where adversaries that can (adaptively) learn parties’ state (including keys)

Aug 17, 2020 Daniel Jost 8

sim

?

πA πB

Key

slide-9
SLIDE 9

The Commitment Problem

  • Example:

− encrypting a message to protect confidentiality − where adversaries that can (adaptively) learn parties’ state (including keys)

Aug 17, 2020 Daniel Jost 9

πA πB

Key

sim

1 m m

slide-10
SLIDE 10

The Commitment Problem

  • Example:

− encrypting a message to protect confidentiality − where adversaries that can (adaptively) learn parties’ state (including keys)

Aug 17, 2020 Daniel Jost 10

πA πB

Key

sim

1 m m 2 c c without m → committed

|m|

slide-11
SLIDE 11

The Commitment Problem

  • Example:

− encrypting a message to protect confidentiality − where adversaries that can (adaptively) learn parties’ state (including keys)

Aug 17, 2020 Daniel Jost 11

πA πB

Key

sim

1 m 2 c 3 k m c

|m| m

slide-12
SLIDE 12

The Commitment Problem

  • Example:

− encrypting a message to protect confidentiality − where adversaries that can (adaptively) learn parties’ state (including keys)

Aug 17, 2020 Daniel Jost 12

πA πB

Key

sim

m 2 c 3 k m c

|m| m

Cannot come up with k that explains c 1

slide-13
SLIDE 13

The Commitment Problem

  • Example:

− encrypting a message to protect confidentiality − where adversaries that can (adaptively) learn parties’ state (including keys)

Aug 17, 2020 Daniel Jost 13

πA πB

Key

sim

m 2 c 3 k m c

|m| m

Cannot come up with k that explains c 1

Observation:

  • Leaking only the messages length (and the simulator creating a fake ciphertext) is

used to formalize that the message remains confidential until the key leaks

  • But it causes problems to simulate after that event…
slide-14
SLIDE 14

The Commitment Problem

  • Existing solutions:

− Allowing for superpolynomial simulators → Still needs stronger schemes / additional setup − Non-information oracles: embedding game-based notions → Lack of clear composition rules

Aug 17, 2020 Daniel Jost 14

slide-15
SLIDE 15

Contributions

Open question: How would such a notion fit within a composable framework?

Aug 17, 2020 Daniel Jost 15

Idea of this paper: Can we make to separate statements?

  • One up to the moment the key leaks (for confidentiality)
  • One after the key leaked (about the remaining guarantees)

Goal:

  • Express security guarantees of

«regular» schemes composably Non-goals:

  • Requireing less efficient schemes /

additional setup

  • Fall back to game-based security
slide-16
SLIDE 16

Specifications: a fresh take on composable security

Aug 17, 2020 Daniel Jost 16

slide-17
SLIDE 17

Rethinking Composable Security: Specifications

Aug 17, 2020 Daniel Jost 17

a resource

slide-18
SLIDE 18

Rethinking Composable Security: Specifications

Aug 17, 2020 Daniel Jost 18

Set of all resources Subset of resources with the desired properties → specification

slide-19
SLIDE 19

Rethinking Composable Security: Specifications

Aug 17, 2020 Daniel Jost 19

▪ General statement: specification abstraction ▪ Abstract assumed specification by constructed one ▪ Easier to understand

slide-20
SLIDE 20

Rethinking Composable Security: Specifications

Aug 17, 2020 Daniel Jost 20

▪ General statement: specification abstraction ▪ Abstract assumed specification by constructed one ▪ Easier to understand

slide-21
SLIDE 21

Rethinking Composable Security: Specifications

Aug 17, 2020 Daniel Jost 21

▪ General statement: specification abstraction ▪ Abstract assumed specification by constructed one ▪ Easier to understand

slide-22
SLIDE 22

Rethinking Composable Security: Specifications

Aug 17, 2020 Daniel Jost 22

▪ General statement: specification abstraction ▪ Abstract assumed specification by constructed one ▪ Easier to understand Introduced in Mau-Ren’16

slide-23
SLIDE 23

Rethinking Composable Security: Specifications

Aug 17, 2020 Daniel Jost 23

▪ General statement: specification abstraction ▪ Abstract assumed specification by constructed one ▪ Easier to understand ▪ While traditional composable framework have a single type of statement, specifications give us flexibility: ▪ Basic properties and compositional guarantees fixed ▪ But not the types of specifications!

slide-24
SLIDE 24

Rethinking Composable Security: Specifications

Aug 17, 2020 Daniel Jost 24

▪ Advantages: ▪ Absolute statement: no «forgotten» attacks ▪ Composition: transitivity of subset relation ▪ Intersection

slide-25
SLIDE 25

Rethinking Composable Security: Specifications

Aug 17, 2020 Daniel Jost 25

▪ Advantages: ▪ Absolute statement: no «forgotten» attacks ▪ Composition: transitivity of subset relation ▪ Intersection

slide-26
SLIDE 26

Rethinking Composable Security: Specifications

Aug 17, 2020 Daniel Jost 26

▪ Advantages: ▪ Absolute statement: no «forgotten» attacks ▪ Composition: transitivity of subset relation ▪ Intersection

Guarantee 1 (e.g authenticity) Guarantee 2 (e.g confidentiality)

slide-27
SLIDE 27

Simulation-based Security

Aug 17, 2020 Daniel Jost 27

▪ The standard «simulation-based» notion can be expressed as a special case

  • f specification abstraction:

πA πB

Key

sim

slide-28
SLIDE 28

Simulation-based Security

Aug 17, 2020 Daniel Jost 28

▪ The standard «simulation-based» notion can be expressed as a special case

  • f specification abstraction:

πA πB

Key

sim

slide-29
SLIDE 29

Simulation-based Security

Aug 17, 2020 Daniel Jost 29

▪ The standard «simulation-based» notion can be expressed as a special case

  • f specification abstraction:

πA πB

Key

sim

Easy to see what Eve can do

slide-30
SLIDE 30

Simulation-based Security

Aug 17, 2020 Daniel Jost 30

▪ The standard «simulation-based» notion can be expressed as a special case

  • f specification abstraction:

πA πB

Key

sim

slide-31
SLIDE 31

Simulation-based Security

Aug 17, 2020 Daniel Jost 31

▪ The standard «simulation-based» notion can be expressed as a special case

  • f specification abstraction:

πA πB

Key

sim

≈ ⊆

slide-32
SLIDE 32

Simulation-based Security

Aug 17, 2020 Daniel Jost 32

▪ The standard «simulation-based» notion can be expressed as a special case

  • f specification abstraction:

πA πB

Key

sim

≈ ⊆

ε-relaxation: the set of all resources that are computationally indistinguishable to one of the original (green) specification.

slide-33
SLIDE 33

Simulation-based Security

Aug 17, 2020 Daniel Jost 33

▪ The ε-relaxation has two important properties:

  • 1. Commutes with protocol application

𝜌 ℛ𝜗 ⊆ 𝜌ℛ 𝜗

  • 2. Monotonicity:

ℛ ⊆ 𝒯 ⟹ ℛ𝜗⊆ 𝑇𝜗

slide-34
SLIDE 34

Simulation-based Security

Aug 17, 2020 Daniel Jost 34

▪ The ε-relaxation has two important properties:

  • 1. Commutes with protocol application

𝜌 ℛ𝜗 ⊆ 𝜌ℛ 𝜗

  • 2. Monotonicity:

ℛ ⊆ 𝒯 ⟹ ℛ𝜗⊆ 𝑇𝜗

  • The «standard» composition rule can be recovered as a syntactic derivation rule
  • In particular simulator and ε-relaxation can be ignored in further construction step

➔ Having structured specifications is crucial for true modularity!

slide-35
SLIDE 35

Interval-wise Relaxations

Aug 17, 2020 Daniel Jost 35

slide-36
SLIDE 36

Interval-wise Guarantees

We use this specification based view this to overcome commitment problem!

  • Recall: cannot simulate across exposure of key
  • Solution: we formalize the guarantees before and after

the key exposure as separate specifications:

  • 1. Confidentiality until the key is exposed
  • 2. Remaining guarantees afterwards

Aug 17, 2020 Daniel Jost 36

πA πB

Key m c k

sim

m c

|m| m

1 2 3

slide-37
SLIDE 37

Interval-wise Guarantees

Formalization of interval-wise guarantees as a specification:

  • 1. Start with unachievable resource

(what one might hope for)

  • 2. Apply suitable relaxations:

− Until-rexation: waives all guarantees after a certain event − From-relaxation: waives all guarantees before a certain event

Aug 17, 2020 Daniel Jost 37

m

|m| m

1 2 3

slide-38
SLIDE 38

Interval-wise Guarantees

Until-relaxation:

  • System S gets relaxed to the set T of systems that behave identically until the

event happens.

  • Formalized by considering the projection of the systems

that no longer replies from the event on.

Aug 17, 2020 Daniel Jost 38

S T

slide-39
SLIDE 39

Interval-wise Guarantees

From-relaxation:

  • How to formalize that the interaction only starts at a certain event?

Aug 17, 2020 Daniel Jost 39

sim

m c

|m| m

Simulator should only have to work from the moment on it learns the meessage due to the leakage fo the key.

slide-40
SLIDE 40

Interval-wise Guarantees

From-relaxation:

  • How to formalize that the interaction only starts at a certain event?
  • → Solution: only consider so-called external events from

CC with events [J-Mau-Mul’19b]

Aug 17, 2020 Daniel Jost 40

sim

m c

|m| m

Simulator should only have to work from the moment on it learns the meessage due to the leakage fo the key.

slide-41
SLIDE 41

Constructive Cryptography with Events

Aug 17, 2020 Daniel Jost 41

Event History

  • Alice sent m
  • Alice’s key leaked

from a memory (real world)

  • r from the simulator (ideal world)

m Conf( ) Auth( ) (deliver) (inject) (leak) m m

slide-42
SLIDE 42

Interval-wise Guarantees

Putting it all together: − The guarantees for each interval are formalized as a specification. − Each such specification might involve a simulator, but not necessarily the same one! − The interval-wise specifications are built around relaxations of the same (overly idealized) resource. − We show how those relaxations interaction with the ε-relaxation and protocol attachment → Syntactical composition rules

Aug 17, 2020 Daniel Jost 42

slide-43
SLIDE 43

Examples

We considered two additional examples:

  • Identity-based encryption

− [Hof-Mat-Mau’15] : Simulation-based secure IBE is impossible in the standard model − Using interval-wise guarantees we introduce a composable notion that is equivalent to the standard IND-ID-CPA notion.

Aug 17, 2020 Daniel Jost 43

slide-44
SLIDE 44

Examples

We considered two additional examples:

  • Identity-based encryption

− [Hof-Mat-Mau’15] : Simulation-based secure IBE is impossible in the standard model − Using interval-wise guarantees we introduce a composable notion that is equivalent to the standard IND-ID-CPA notion.

  • Coin-tossing over the phone without setup (via commitments)

Aug 17, 2020 Daniel Jost 44

slide-45
SLIDE 45

Conclusions

  • 1. Specifications allow for a more flexible approach towards composable

security.

  • 2. Considering structured specifications: syntactic composition rules.
  • 3. Interval-wise specifications: avoid several impossibility results due to the

simulator-commitment problem.

Aug 17, 2020 Daniel Jost 45

slide-46
SLIDE 46

Mau-Ren’16 – TCC 2016b Ueli Maurer and Renato Renner From indifferentiability to constructive cryptography (and back) J-Mau-Mul’19b – TCC 2019 Daniel Jost, Ueli Maurer, and Marta Mularczyk A Unified and Composable Take on Ratcheting Hof-Mat-Mau’15 – Asiacrypt 2015 Dennis Hofheinz, Christian Matt, and Ueli Maurer Idealizing Identity-Based Encryption

Credits: Images by xkcd.com (CC BY-NC 2.5)

Thank you for your attention!