public key encryption
play

Public-Key Encryption: The Auxiliary-Input Setting Zvika Brakerski - PowerPoint PPT Presentation

Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting Zvika Brakerski Gil Segev Microsoft Research Weizmann Institute Silicon Valley Probabilistic Encryption Enc Semantic Security [GM82]: No


  1. Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting Zvika Brakerski Gil Segev Microsoft Research Weizmann Institute Silicon Valley

  2. Probabilistic Encryption Enc 𝑞𝑙 𝑛 Semantic Security [GM82]: No adversary can learn any meaningful information on 𝑛 Encryption algorithm must be randomized 2

  3. Deterministic Encryption Efficiency: short ciphertexts  Each 𝑞𝑙 may even define a permutation Functionality: searchable encryption  Each 𝑞𝑙 defines a one-to-one mapping  Easy to check whether 𝑑 encrypts 𝑛 relative to 𝑞𝑙 3

  4. What About Security? Inherent limitation:  Each 𝑞𝑙 defines a one-to-one mapping  Easy to check whether 𝑑 encrypts 𝑛 relative to 𝑞𝑙 Security for high-entropy messages [BBO07]  Inspired by [RW02, DS05] in the symmetric-key setting  Exciting line of research [BFO08, BFOR08, BBNRSSY09 , O’N 10 ,…]  Meaningful for various applications (e.g., key encapsulation) Enc 𝑞𝑙 𝑙𝑓𝑧 , AES 𝑙𝑓𝑧 0 , AES 𝑙𝑓𝑧 1 , … 4

  5. Notion of Security ([BBO07] simplified) 𝒝 𝑞𝑙 Enc 𝑞𝑙 𝑛 High-entropy message source ℳ 𝒯 5

  6. The Auxiliary-Input Setting Enc 𝑞𝑙 𝑙𝑓𝑧 , AES 𝑙𝑓𝑧 0 , AES 𝑙𝑓𝑧 1 , … Encryption as a building block of a larger system  Additional information is available  Does 𝑙𝑓𝑧 have any entropy given (AES 𝑙𝑓𝑧 0 , AES 𝑙𝑓𝑧 1 , … ) ?  No security guarantees from current models and schemes (noticed already by [DS05, BBO07]) 6

  7. This Talk: Better Security Model  Deterministic encryption in the auxiliary-input setting  Hard-to-invert auxiliary inputs  Generalizes the high-entropy setting Constructions  Security w.r.t all auxiliary inputs that are sub-exponentially hard  Based on standard hardness assumptions  𝑒 -Linear for any 𝑒 ≥ 1 (Decisional Diffie- Hellman,…)  Subgroup indistinguishability [BG10] ( Quadratic Residuosity, Composite Residuosity ,…) 7

  8. Outline  Hard-to-invert auxiliary inputs  Security in the auxiliary-input setting  Construction based on 𝒆 -Linear 8

  9. Hard-to-Invert Auxiliary Inputs Definition A function 𝑔 is 𝜗 -hard-to-invert relative to 𝒴 if for any efficient algorithm 𝐵 it holds that 𝑦←𝒴 𝐵 𝑔 𝑦 Pr = 𝑦 ≤ 𝜗 𝑔 𝑙𝑓𝑧 = AES 𝑙𝑓𝑧 0 , AES 𝑙𝑓𝑧 1 , …  𝐵 is required to output the exact same 𝑦 (and not any 𝑦′ ∈ 𝑔 −1 𝑔 𝑦 as with one-wayness)  The source of hardness may be any combination of:  Information-theoretic hardness ( 𝑔 has many collisions)  Computational hardness ( 𝑔 is injective) 9

  10. Our Notion of Security (simplified) 𝒝 𝑞𝑙 Enc 𝑞𝑙 𝑛 𝑔 𝑛 𝑔 is hard-to-invert relative to ℳ 𝒯 𝑔 𝑛 10

  11. Construction Based on 𝑒 -Linear  Based on the lossy trapdoor function of [FGKRS10]  𝔿 - group of order 𝑞 generated by 𝑕 𝑕 𝐵 𝑗𝑘 = 𝑕 𝑏 𝑗𝑘 𝑜×𝑜  Sample 𝐵 ← ℤ 𝑞 Key generation  Output 𝑡𝑙 = 𝐵 −1 and 𝑞𝑙 = 𝑕 𝐵 ∈ 𝔿 𝑜×𝑜  Given 𝑛 ∈ 0,1 𝑜 output 𝑕 𝐵𝑛 ∈ 𝔿 𝑜 Encryption 𝑛 𝑘 𝑗 = 𝑕 𝑏 𝑗𝑘 𝑛 𝑘 𝑕 𝐵𝑛 = 𝑕 𝐵 𝑘  Given 𝑕 𝑤 ∈ 𝔿 𝑜 compute 𝑕 𝑛 = 𝑕 𝐵 −1 𝑤 ∈ 𝔿 𝑜 𝑗𝑘 Decryption 𝑘  Output 𝑛 ∈ 0,1 𝑜 11

  12. Proof of Security 𝑠 𝛽 2 𝑠 𝒝 𝑕 𝐵 𝑞𝑙 𝐶 ⋮ 𝛽 𝑜 𝑠 𝛾 𝑠 , 𝑛 𝛽 2 𝛾 𝛽 2 𝑠 , 𝑛 𝑕 𝐵 𝑛 Enc 𝑞𝑙 𝑛 𝐶 𝑛 ⋮ ⋮ 𝛽 𝑜 𝛾 𝛽 𝑜 𝑠 , 𝑛 𝑔 𝑛 Independent of 𝑛  [BHHO08,NS09]: 𝑒 -Linear ⇒ 𝑕 𝐵 ≈ 𝑑 𝑕 𝐶 where 𝑠𝑏𝑜𝑙 𝐶 = 𝑒  [GL89,DGKPV10]: 𝑔 is 𝜗 -hard-to-invert relative to ℳ ⇒ 𝑠 , 𝑠 , 𝑛 is pseudorandom 12

  13. Additional Features of Our Schemes Security for multiple users & related messages  Any number of users, linearly-related messages  Without requiring sub-exponential hardness Enc 𝑞𝑙 1 𝑛 1 , … , Enc 𝑞𝑙 𝑜 𝑛 𝑜 Homomorphic properties  Additions and one multiplication 𝑕 𝐵𝑛 1 ⋅ 𝑕 𝐵𝑛 2 = 𝑕 𝐵 𝑛 1 +𝑛 2 𝑓 𝑕 𝐵𝑛 1 , 𝑕 𝐵𝑛 2 𝑈 𝑈 𝐵 𝑈 = 𝑓 𝑕, 𝑕 𝐵𝑛 1 𝑛 2 13

  14. Conclusions and Open Problems  Deterministic encryption in the auxiliary-input setting  Meaningful security for hard-to-invert auxiliary inputs Open problems  Eliminating sub-exponential hardness requirement  Security beyond linearly-related messages  Dealing with 𝑞𝑙 -dependent messages and auxiliary inputs Thank you! 14

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend