PROTECT a P latform for Ro bust T hr e shold C ryp t ography Jason - - PowerPoint PPT Presentation

protect a p latform for ro bust t hr e shold c ryp t
SMART_READER_LITE
LIVE PREVIEW

PROTECT a P latform for Ro bust T hr e shold C ryp t ography Jason - - PowerPoint PPT Presentation

PROTECT a P latform for Ro bust T hr e shold C ryp t ography Jason Resch, Christian Cachin, Hugo Krawczyk, Tal Rabin, Chrysa Stathakopoulou Project Overview Functionality and Goals Model and Assumptions Architecture Tunable


slide-1
SLIDE 1

Jason Resch, Christian Cachin, Hugo Krawczyk, Tal Rabin, Chrysa Stathakopoulou

PROTECT a Platform for Robust Threshold Cryptography

slide-2
SLIDE 2

Outline

  • Overview
  • Functionality and Goals

Project

  • Model and Assumptions
  • Tunable Security
  • System Architecture

Architecture

  • Single System
  • Distributed Locally
  • Distributed Geographically

Performance

  • Installation and Configuration
  • Secrets: Generation, Refresh, Recovery
  • Cryptographic Operations

Demo

  • General Discussion
  • Questions and Answers

Discussion

NTCW2019 2

slide-3
SLIDE 3

Project Overview

  • PROTECT is an open source (MIT Licensed)

platform for threshold-secure operations

  • Tolerates (n/3) – (n/2) Byzantine faults
  • Operates over eventually synchronous networks
  • Self-heals and self-secures after faults and breaches
  • Supported operations:
  • (O)PRF, ECIES, BLS, RSA (Blind)Sign/Decrypt
  • Generate, Store, Read, Delete, Enable, Disable
  • Future enhancement goals:
  • Share conversion, Schnorr signatures, ECDSA
  • Share multiplication, MPC, Threshold AES
  • RSA (DKG/Refresh/Recover)
  • Post-Quantum Cryptography

NTCW2019 3

slide-4
SLIDE 4

System Model

NTCW2019 4

⅓ ½

?

Asynchronous Bound Synchronous Bound

slide-5
SLIDE 5

NTCW2019 5

⅓ ½

Asynchronous Bound Synchronous Bound

¼

Minimum Liveness

f = ⅓ fL= (n – fS – 1) / 2 fS= n – 2 fL - 1

slide-6
SLIDE 6

Tunable Security

NTCW2019 6

slide-7
SLIDE 7

Tunability in Practice

Safety Liveness

Conventional Setting (f = 2) Tunable Security (fL = 1, fS = 3)

slide-8
SLIDE 8

System Architecture

NTCW2019 8

slide-9
SLIDE 9

Performance Results

slide-10
SLIDE 10

Demo

1. Downloading 2. Installing 3. Configuration 4. Launching Servers 5. Client Setup 6. Secret Management:

a. Distributed Generation b. Proactive Refresh c. Share Recovery

7. Cryptographic Operations:

a. Decryption b. Signing

NTCW2019 10

slide-11
SLIDE 11

1. Downloading 2. Installing 3. Configuration 4. Launching Servers 5. Client Setup 6. Secret Management:

a. Distributed Generation b. Proactive Refresh c. Share Recovery

7. Cryptographic Operations:

a. Decryption b. Signing

NTCW2019 11

https://youtu.be/9sDgPOUpADw

slide-12
SLIDE 12

1. Downloading 2. Installing 3. Configuration 4. Launching Servers 5. Client Setup 6. Secret Management:

a. Distributed Generation b. Proactive Refresh c. Share Recovery

7. Cryptographic Operations:

a. Decryption b. Signing

NTCW2019 12

https://youtu.be/Cz9VV0FzW10

slide-13
SLIDE 13

1. Downloading 2. Installing 3. Configuration 4. Launching Servers 5. Client Setup 6. Secret Management:

a. Distributed Generation b. Proactive Refresh c. Share Recovery

7. Cryptographic Operations:

a. Decryption b. Signing

NTCW2019 13

https://youtu.be/BHM17XE6ZhQ

slide-14
SLIDE 14

1. Downloading 2. Installing 3. Configuration 4. Launching Servers 5. Client Setup 6. Secret Management:

a. Distributed Generation b. Proactive Refresh c. Share Recovery

7. Cryptographic Operations:

a. Decryption b. Signing

NTCW2019 14

https://youtu.be/H4rX8gtqjrI

slide-15
SLIDE 15

1. Downloading 2. Installing 3. Configuration 4. Launching Servers 5. Client Setup 6. Secret Management:

a. Distributed Generation b. Proactive Refresh c. Share Recovery

7. Cryptographic Operations:

a. Decryption b. Signing

NTCW2019 15

https://youtu.be/DXvrh1b8GH4

slide-16
SLIDE 16

1. Downloading 2. Installing 3. Configuration 4. Launching Servers 5. Client Setup 6. Secret Management:

a. Distributed Generation b. Proactive Refresh c. Share Recovery

7. Cryptographic Operations:

a. Decryption b. Signing

NTCW2019 16

https://youtu.be/ZMjMlC52MJc

slide-17
SLIDE 17

1. Downloading 2. Installing 3. Configuration 4. Launching Servers 5. Client Setup 6. Secret Management:

a. Distributed Generation b. Proactive Refresh c. Share Recovery

7. Cryptographic Operations:

a. Decryption b. Signing

NTCW2019 17

https://youtu.be/hVjxZmUPwlU

slide-18
SLIDE 18

Q&A + Discussion

  • Further Reading:
  • The “PROTECT” open source project:
  • http://bit.ly/protect123 (Github Repository)
  • New contributors, testers, implementers welcome!
  • Our eprint “Tunable Protocols for Threshold and Proactive Cryptography”
  • Provides details of the underlying protocols
  • Coming soon!

NTCW2019 18