protect a p latform for ro bust t hr e shold c ryp t
play

PROTECT a P latform for Ro bust T hr e shold C ryp t ography Jason - PowerPoint PPT Presentation

PROTECT a P latform for Ro bust T hr e shold C ryp t ography Jason Resch, Christian Cachin, Hugo Krawczyk, Tal Rabin, Chrysa Stathakopoulou Project Overview Functionality and Goals Model and Assumptions Architecture Tunable


  1. PROTECT a P latform for Ro bust T hr e shold C ryp t ography Jason Resch, Christian Cachin, Hugo Krawczyk, Tal Rabin, Chrysa Stathakopoulou

  2. Project • Overview • Functionality and Goals • Model and Assumptions Architecture • Tunable Security • System Architecture • Single System Outline Performance • Distributed Locally • Distributed Geographically • Installation and Configuration Demo • Secrets: Generation, Refresh, Recovery • Cryptographic Operations Discussion • General Discussion • Questions and Answers NTCW2019 2

  3. • PROTECT is an open source (MIT Licensed) platform for threshold-secure operations • Tolerates (n/3) – ( n/2) Byzantine faults • Operates over eventually synchronous networks • Self-heals and self-secures after faults and breaches Project • Supported operations: • (O)PRF, ECIES, BLS, RSA (Blind)Sign/Decrypt Overview • Generate, Store, Read, Delete, Enable, Disable • Future enhancement goals: • Share conversion, Schnorr signatures, ECDSA • Share multiplication, MPC, Threshold AES • RSA (DKG/Refresh/Recover) • Post-Quantum Cryptography NTCW2019 3

  4. ? ½ ⅓ System Model Synchronous Asynchronous Bound Bound NTCW2019 4

  5. f = ⅓ f S = n – 2 f L - 1 f L = (n – f S – 1) / 2 ⅓ ¼ ½ Minimum Asynchronous Synchronous Liveness Bound Bound NTCW2019 5

  6. Tunable Security NTCW2019 6

  7. Safety Liveness Conventional Setting ( f = 2) Tunable Security ( f L = 1, f S = 3) Tunability in Practice

  8. System Architecture NTCW2019 8

  9. Performance Results

  10. 1. Downloading 2. Installing 3. Configuration 4. Launching Servers 5. Client Setup Demo 6. Secret Management: a. Distributed Generation b. Proactive Refresh c. Share Recovery 7. Cryptographic Operations: a. Decryption b. Signing NTCW2019 10

  11. 1. Downloading 2. Installing 3. Configuration 4. Launching Servers 5. Client Setup 6. Secret Management: a. Distributed Generation b. Proactive Refresh c. Share Recovery 7. Cryptographic Operations: a. Decryption b. Signing https://youtu.be/9sDgPOUpADw NTCW2019 11

  12. 1. Downloading 2. Installing 3. Configuration 4. Launching Servers 5. Client Setup 6. Secret Management: a. Distributed Generation b. Proactive Refresh c. Share Recovery 7. Cryptographic Operations: a. Decryption b. Signing https://youtu.be/Cz9VV0FzW10 NTCW2019 12

  13. 1. Downloading 2. Installing 3. Configuration 4. Launching Servers 5. Client Setup 6. Secret Management: a. Distributed Generation b. Proactive Refresh c. Share Recovery 7. Cryptographic Operations: a. Decryption b. Signing https://youtu.be/BHM17XE6ZhQ NTCW2019 13

  14. 1. Downloading 2. Installing 3. Configuration 4. Launching Servers 5. Client Setup 6. Secret Management: a. Distributed Generation b. Proactive Refresh c. Share Recovery 7. Cryptographic Operations: a. Decryption b. Signing https://youtu.be/H4rX8gtqjrI NTCW2019 14

  15. 1. Downloading 2. Installing 3. Configuration 4. Launching Servers 5. Client Setup 6. Secret Management: a. Distributed Generation b. Proactive Refresh c. Share Recovery 7. Cryptographic Operations: a. Decryption b. Signing https://youtu.be/DXvrh1b8GH4 NTCW2019 15

  16. 1. Downloading 2. Installing 3. Configuration 4. Launching Servers 5. Client Setup 6. Secret Management: a. Distributed Generation b. Proactive Refresh c. Share Recovery 7. Cryptographic Operations: a. Decryption b. Signing https://youtu.be/ZMjMlC52MJc NTCW2019 16

  17. 1. Downloading 2. Installing 3. Configuration 4. Launching Servers 5. Client Setup 6. Secret Management: a. Distributed Generation b. Proactive Refresh c. Share Recovery 7. Cryptographic Operations: a. Decryption b. Signing https://youtu.be/hVjxZmUPwlU NTCW2019 17

  18. Q&A + Discussion • Further Reading: • The “PROTECT” open source project: • http://bit.ly/protect123 (Github Repository) • New contributors, testers, implementers welcome! • Our eprint “Tunable Protocols for Threshold and Proactive Cryptography” • Provides details of the underlying protocols • Coming soon! NTCW2019 18

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend