Randomness Complexity of Private Circuits for Multiplication Sonia - - PowerPoint PPT Presentation

โ–ถ
randomness complexity of private circuits for
SMART_READER_LITE
LIVE PREVIEW

Randomness Complexity of Private Circuits for Multiplication Sonia - - PowerPoint PPT Presentation

Randomness Complexity of Private Circuits for Multiplication Sonia Belad, Fabrice Benhamouda, Alain Passelgue , Emmanuel Prouff, Adrian Thillard, Damien Vergnaud brief introduction - side-channel attacks - masking - -probing model


slide-1
SLIDE 1

Randomness Complexity of Private Circuits for Multiplication

Sonia Belaรฏd, Fabrice Benhamouda, Alain Passelรจgue, Emmanuel Prouff, Adrian Thillard, Damien Vergnaud

slide-2
SLIDE 2

brief introduction

  • side-channel attacks
  • masking
  • ๐‘’-probing model

1/16

slide-3
SLIDE 3

key-idea: for security at order ๐‘’, split sensitive data ๐‘ฆ into ๐‘’ + 1 ran andom variables (shares) s.t. ๐‘ฆ = ๐‘ฆ0 โŠ• ๐‘ฆ1 โŠ• โ‹ฏ โŠ• ๐‘ฆ๐‘’ 2/16

slide-4
SLIDE 4

key-idea: for security at order ๐‘’, split sensitive data ๐‘ฆ into ๐‘’ + 1 ran andom variables (shares) s.t. ๐‘ฆ = ๐‘ฆ0 โŠ• ๐‘ฆ1 โŠ• โ‹ฏ โŠ• ๐‘ฆ๐‘’

needs for a lot of randomness

2/16

slide-5
SLIDE 5

randomness in cryptography

used everywhere:

  • keys
  • RSA prime factors
  • ...

3/16

slide-6
SLIDE 6

randomness in cryptography

used everywhere:

  • keys
  • RSA prime factors
  • ...

strong properties:

  • statistically random
  • uniformly distributed
  • independent
  • ...

3/16

slide-7
SLIDE 7

where does it come from? 4/16

slide-8
SLIDE 8

where does it come from? in the real world: natural randomness 4/16

slide-9
SLIDE 9

where does it come from? in the real world: natural randomness in practice:

  • need special hardware
  • slow
  • bias or uneven distribution

4/16

slide-10
SLIDE 10

where does it come from? in the real world: natural randomness in practice:

  • need special hardware
  • slow
  • bias or uneven distribution

randomness should be considered as a resource, like space and time

4/16

slide-11
SLIDE 11

private circuits

๐‘”: 0,1 ๐‘œ โ†’ 0,1 ๐‘› encoder ๐ฝ . . .

๐œ1

circuit ๐ท decoder ๐‘ƒ

๐‘ 

1

. . . . . . . . .

๐‘ฆ 0,1 ๐‘œโ€ฒ 0,1 ๐‘›โ€ฒ ๐‘”(๐‘ฆ)

correctness: ๐‘ƒ ๐ท ๐ฝ ๐‘ฆ; ๐œ ; ๐‘  = ๐‘” ๐‘ฆ , โˆ€ ๐‘ฆ, ๐œ, ๐‘  ๐‘’-priv privacy: for any set ๐‘„ of ๐‘’ wires in ๐ท and for all ๐‘ฆ, ๐‘ง โˆˆ 0,1 ๐‘œ: {๐ท๐‘„(๐ฝ ๐‘ฆ; ๐œ ; ๐‘ )}๐œ,๐‘  = {๐ท๐‘„(๐ฝ ๐‘ง; ๐œ ; ๐‘ )}๐œ,๐‘ 

โ€ฆ โ€ฆ ๐‘ 

2

๐‘ 

๐‘†

๐œ2 ๐œโ„“

5/16

slide-12
SLIDE 12

private circuits

๐‘”: 0,1 ๐‘œ โ†’ 0,1 ๐‘› encoder ๐ฝ . . .

๐œ1

circuit ๐ท decoder ๐‘ƒ

๐‘ 

1

. . . . . . . . .

๐‘ฆ 0,1 ๐‘œโ€ฒ 0,1 ๐‘›โ€ฒ ๐‘”(๐‘ฆ) โ€ฆ โ€ฆ ๐‘ 

2

๐‘ 

๐‘†

๐œ2 ๐œโ„“

5/16

slide-13
SLIDE 13

private circuits

๐‘”: 0,1 ๐‘œ โ†’ 0,1 ๐‘› encoder ๐ฝ . . .

๐œ1

circuit ๐ท decoder ๐‘ƒ

๐‘ 

1

. . . . . . . . .

๐‘ฆ 0,1 ๐‘›โ€ฒ ๐‘”(๐‘ฆ) โ€ฆ โ€ฆ ๐‘ 

2

๐‘ 

๐‘†

๐œ2 ๐œโ„“ 0,1 ๐‘œโ€ฒ

5/16

slide-14
SLIDE 14

private circuits

๐‘”: 0,1 ๐‘œ โ†’ 0,1 ๐‘› encoder ๐ฝ . . .

๐œ1

circuit ๐ท decoder ๐‘ƒ

๐‘ 

1

. . . . . . . . .

๐‘ฆ ๐‘”(๐‘ฆ) โ€ฆ โ€ฆ ๐‘ 

2

๐‘ 

๐‘†

๐œ2 ๐œโ„“ 0,1 ๐‘›โ€ฒ

5/16

slide-15
SLIDE 15

private circuits

๐‘”: 0,1 ๐‘œ โ†’ 0,1 ๐‘› encoder ๐ฝ . . .

๐œ1

circuit ๐ท decoder ๐‘ƒ

๐‘ 

1

. . . . . . . . .

๐‘ฆ ๐‘”(๐‘ฆ) โ€ฆ โ€ฆ ๐‘ 

2

๐‘ 

๐‘†

๐œ2 ๐œโ„“

5/16

slide-16
SLIDE 16

private circuits

๐‘”: 0,1 ๐‘œ โ†’ 0,1 ๐‘› encoder ๐ฝ . . .

๐œ1

circuit ๐ท decoder ๐‘ƒ

๐‘ 

1

. . . . . . . . .

๐‘ฆ ๐‘”(๐‘ฆ)

correctness: ๐‘ƒ ๐ท ๐ฝ ๐‘ฆ; ๐œ ; ๐‘  = ๐‘” ๐‘ฆ , โˆ€ ๐‘ฆ, ๐œ, ๐‘ 

โ€ฆ โ€ฆ ๐‘ 

2

๐‘ 

๐‘†

๐œ2 ๐œโ„“

5/16

slide-17
SLIDE 17

private circuits

๐‘”: 0,1 ๐‘œ โ†’ 0,1 ๐‘› encoder ๐ฝ . . .

๐œ1

circuit ๐ท decoder ๐‘ƒ

๐‘ 

1

. . . . . . . . .

๐‘ฆ ๐‘”(๐‘ฆ)

correctness: ๐‘ƒ ๐ท ๐ฝ ๐‘ฆ; ๐œ ; ๐‘  = ๐‘” ๐‘ฆ , โˆ€ ๐‘ฆ, ๐œ, ๐‘  ๐‘’-priv privacy: for any set ๐‘„ of ๐‘’ wires in ๐‘ซ and for all ๐‘ฆ, ๐‘ง โˆˆ 0,1 ๐‘œ: {๐ท๐‘„(๐ฝ ๐‘ฆ; ๐œ ; ๐‘ )}๐œ,๐‘  = {๐ท๐‘„(๐ฝ ๐‘ง; ๐œ ; ๐‘ )}๐œ,๐‘ 

โ€ฆ โ€ฆ ๐‘ 

2

๐‘ 

๐‘†

๐œ2 ๐œโ„“

5/16

slide-18
SLIDE 18

ADDITIONS ONLY . . .

๐‘0๐‘0 ๐‘0๐‘1 ๐‘0๐‘2 ๐‘๐‘’๐‘๐‘’โˆ’1 ๐‘๐‘’๐‘๐‘’

. . .

๐‘‘0 ๐‘‘1 ๐‘‘๐‘’ โŠ•๐‘— ๐‘‘๐‘— = ๐‘ โ‹… ๐‘ โŠ•๐‘— ๐‘๐‘— = ๐‘ โŠ•๐‘— ๐‘๐‘— = ๐‘ encoder circuit decoder ๐‘ 

1

โ€ฆ ๐‘ 

2

๐‘ 

๐‘†

๐‘, ๐‘ โˆˆ 0,1 2 โ†ฆ ๐‘ โ‹… ๐‘ โˆˆ 0,1

this paper

6/16

slide-19
SLIDE 19

ADDITIONS ONLY . . .

๐‘0๐‘0 ๐‘0๐‘1 ๐‘0๐‘2 ๐‘๐‘’๐‘๐‘’โˆ’1 ๐‘๐‘’๐‘๐‘’

. . .

๐‘‘0 ๐‘‘1 ๐‘‘๐‘’ ๐‘ 

1

โ€ฆ ๐‘ 

2

๐‘ 

๐‘†

6/16

slide-20
SLIDE 20

ADDITIONS ONLY . . .

๐‘0๐‘0 ๐‘0๐‘1 ๐‘0๐‘2 ๐‘๐‘’๐‘๐‘’โˆ’1 ๐‘๐‘’๐‘๐‘’

. . .

๐‘‘0 ๐‘‘1 ๐‘‘๐‘’ ๐‘ 

1

โ€ฆ ๐‘ 

2

๐‘ 

๐‘†

how much randomness is needed? 6/16

slide-21
SLIDE 21

Ishai-Sahai-Wagner scheme

๐‘0๐‘0 ๐‘ 

0,1

๐‘ 

0,1 โŠ• ๐‘0๐‘1 โŠ• ๐‘1๐‘0

๐‘1๐‘1 โ‹ฏ ๐‘ 

0,๐‘’ โŠ• ๐‘0๐‘’ โŠ• ๐‘๐‘’๐‘0

๐‘ 

1,๐‘’ โŠ• ๐‘1๐‘๐‘’ โŠ• ๐‘๐‘’๐‘1

โ‹ฎ โ‹ฎ โ‹ฑ โ‹ฎ ๐‘ 

0,๐‘’โˆ’1

๐‘ 

0,๐‘’

๐‘ 

1,๐‘’โˆ’1

๐‘ 

1,๐‘’

โ‹ฏ ๐‘ 

๐‘’โˆ’1,๐‘’ โŠ• ๐‘๐‘’โˆ’1๐‘๐‘’ โŠ• ๐‘๐‘’๐‘๐‘’โˆ’1

๐‘๐‘’๐‘๐‘’ ๐‘‘0 ๐‘‘1

โ‹ฎ

๐‘‘๐‘’โˆ’1 ๐‘‘๐‘’

7/16

slide-22
SLIDE 22

Ishai-Sahai-Wagner scheme randomness complexity: ๐‘’(๐‘’ + 1)/2

๐‘0๐‘0 ๐‘ 

0,1

๐‘ 

0,1 โŠ• ๐‘0๐‘1 โŠ• ๐‘1๐‘0

๐‘1๐‘1 โ‹ฏ ๐‘ 

0,๐‘’ โŠ• ๐‘0๐‘’ โŠ• ๐‘๐‘’๐‘0

๐‘ 

1,๐‘’ โŠ• ๐‘1๐‘๐‘’ โŠ• ๐‘๐‘’๐‘1

โ‹ฎ โ‹ฎ โ‹ฑ โ‹ฎ ๐‘ 

0,๐‘’โˆ’1

๐‘ 

0,๐‘’

๐‘ 

1,๐‘’โˆ’1

๐‘ 

1,๐‘’

โ‹ฏ ๐‘ 

๐‘’โˆ’1,๐‘’ โŠ• ๐‘๐‘’โˆ’1๐‘๐‘’ โŠ• ๐‘๐‘’๐‘๐‘’โˆ’1

๐‘๐‘’๐‘๐‘’ ๐‘‘0 ๐‘‘1

โ‹ฎ

๐‘‘๐‘’โˆ’1 ๐‘‘๐‘’

7/16

slide-23
SLIDE 23

ADDITIONS ONLY . . .

๐‘0๐‘0 ๐‘0๐‘1 ๐‘0๐‘2 ๐‘๐‘’๐‘๐‘’โˆ’1 ๐‘๐‘’๐‘๐‘’ ๐‘ 

1

โ€ฆ ๐‘ 

2

๐‘ 

๐‘†

8/16 . . .

๐‘‘0 ๐‘‘1 ๐‘‘๐‘’

slide-24
SLIDE 24

ADDITIONS ONLY . . .

๐‘0๐‘0 ๐‘0๐‘1 ๐‘0๐‘2 ๐‘๐‘’๐‘๐‘’โˆ’1 ๐‘๐‘’๐‘๐‘’ ๐‘ 

1

โ€ฆ ๐‘ 

2

๐‘ 

๐‘†

any probe (wire value) has the form: ๐‘ž = เป„

๐‘—,๐‘˜ โˆˆ๐‘ŒโІ 0,โ€ฆ,๐‘’ 2

๐‘๐‘—๐‘

๐‘˜

โŠ• เป„

๐‘™โˆˆ๐‘โІ 1,โ€ฆ,๐‘†

๐‘ 

๐‘™

8/16 . . .

๐‘‘0 ๐‘‘1 ๐‘‘๐‘’

slide-25
SLIDE 25

any probe (wire value) has the form: ๐‘ž = เป„

๐‘—,๐‘˜ โˆˆ๐‘ŒโІ 0,โ€ฆ,๐‘’ 2

๐‘๐‘—๐‘

๐‘˜

โŠ• เป„

๐‘™โˆˆ๐‘โІ 1,โ€ฆ,๐‘†

๐‘ 

๐‘™

= ิฆ ๐‘๐‘ข โ‹… ๐‘๐‘ž โ‹… ๐‘ โŠ• ิฆ ๐‘ก๐‘ž

๐‘ข โ‹… ิฆ

๐‘  with ิฆ ๐‘ = ๐‘0, โ€ฆ , ๐‘๐‘’ , ๐‘ = ๐‘0, โ€ฆ , ๐‘๐‘’ , ิฆ ๐‘  = ๐‘ 

0, โ€ฆ , ๐‘  ๐‘† ,

๐‘๐‘ž โˆˆ 0,1

๐‘’+1 ร— ๐‘’+1 , ิฆ

๐‘ก๐‘ž โˆˆ 0,1 ๐‘† 8/16

slide-26
SLIDE 26

any probe (wire value) has the form: ๐‘ž = เป„

๐‘—,๐‘˜ โˆˆ๐‘ŒโІ 0,โ€ฆ,๐‘’ 2

๐‘๐‘—๐‘

๐‘˜

โŠ• เป„

๐‘™โˆˆ๐‘โІ 1,โ€ฆ,๐‘†

๐‘ 

๐‘™

= ิฆ ๐‘๐‘ข โ‹… ๐‘๐‘ž โ‹… ๐‘ โŠ• ิฆ ๐‘ก๐‘ž

๐‘ข โ‹… ิฆ

๐‘  with ิฆ ๐‘ = ๐‘0, โ€ฆ , ๐‘๐‘’ , ๐‘ = ๐‘0, โ€ฆ , ๐‘๐‘’ , ิฆ ๐‘  = ๐‘ 

0, โ€ฆ , ๐‘  ๐‘† ,

๐‘๐‘ž โˆˆ 0,1

๐‘’+1 ร— ๐‘’+1 , ิฆ

๐‘ก๐‘ž โˆˆ 0,1 ๐‘†

any sum of probes has the form: ิฆ ๐‘๐‘ข โ‹… ๐‘ โ‹… ๐‘ โŠ• ิฆ ๐‘ก๐‘ข โ‹… ิฆ ๐‘ 

8/16

slide-27
SLIDE 27

algebraic characterization

condition 1: a set of probes ๐‘„ = ๐‘ž1, โ€ฆ , ๐‘žโ„“ satisfies condition 1 iff: โจ๐‘—=1

โ„“

๐‘ž๐‘— = ิฆ ๐‘๐‘ข โ‹… ๐‘ โ‹… ๐‘ and 1, โ€ฆ , 1 is in the row (or column) space of ๐‘ 9/16

slide-28
SLIDE 28

algebraic characterization

condition 1: a set of probes ๐‘„ = ๐‘ž1, โ€ฆ , ๐‘žโ„“ satisfies condition 1 iff: โจ๐‘—=1

โ„“

๐‘ž๐‘— = ิฆ ๐‘๐‘ข โ‹… ๐‘ โ‹… ๐‘ and 1, โ€ฆ , 1 is in the row (or column) space of ๐‘ the theorem: ๐ท is ๐‘’-private โ‡” there does not exist ๐‘„ = ๐‘ž1, โ€ฆ , ๐‘žโ„“ , โ„“ โ‰ค ๐‘’ that satisfies condition 1 9/16

slide-29
SLIDE 29

proof sketch

โ‡’ assume ๐‘ž1, โ€ฆ , ๐‘žโ„“ such that: โจ๐‘—=1

โ„“

๐‘ž๐‘— = ิฆ ๐‘๐‘ข โ‹… ๐‘ โ‹… ๐‘ and(1, โ€ฆ , 1) is in the column space of ๐‘

10/16

slide-30
SLIDE 30

proof sketch

โ‡’ assume ๐‘ž1, โ€ฆ , ๐‘žโ„“ such that: โจ๐‘—=1

โ„“

๐‘ž๐‘— = ิฆ ๐‘๐‘ข โ‹… ๐‘ โ‹… ๐‘ and(1, โ€ฆ , 1) is in the column space of ๐‘ โ‡’ there exists ๐‘โ€ฒ โˆˆ 0,1 ๐‘’+1 s.t. ๐‘ โ‹… ๐‘โ€ฒ = (1, โ€ฆ , 1)

10/16

slide-31
SLIDE 31

proof sketch

โ‡’ assume ๐‘ž1, โ€ฆ , ๐‘žโ„“ such that: โจ๐‘—=1

โ„“

๐‘ž๐‘— = ิฆ ๐‘๐‘ข โ‹… ๐‘ โ‹… ๐‘ and(1, โ€ฆ , 1) is in the column space of ๐‘ โ‡’ there exists ๐‘โ€ฒ โˆˆ 0,1 ๐‘’+1 s.t. ๐‘ โ‹… ๐‘โ€ฒ = (1, โ€ฆ , 1) Pr ิฆ ๐‘๐‘ข โ‹… ๐‘ โ‹… ๐‘ = ๐‘ = เตž 1 2 if ๐‘ โ‹… ๐‘ โ‰  (1, โ€ฆ , 1) 1 if ๐‘ โ‹… ๐‘ = 1, โ€ฆ , 1

10/16

slide-32
SLIDE 32

proof sketch

โ‡’ assume ๐‘ž1, โ€ฆ , ๐‘žโ„“ such that: โจ๐‘—=1

โ„“

๐‘ž๐‘— = ิฆ ๐‘๐‘ข โ‹… ๐‘ โ‹… ๐‘ and(1, โ€ฆ , 1) is in the column space of ๐‘ โ‡’ there exists ๐‘โ€ฒ โˆˆ 0,1 ๐‘’+1 s.t. ๐‘ โ‹… ๐‘โ€ฒ = (1, โ€ฆ , 1) Pr ิฆ ๐‘๐‘ข โ‹… ๐‘ โ‹… ๐‘ = ๐‘ = เตž 1 2 if ๐‘ โ‹… ๐‘ โ‰  (1, โ€ฆ , 1) 1 if ๐‘ โ‹… ๐‘ = 1, โ€ฆ , 1 then, Pr ิฆ ๐‘๐‘ข โ‹… ๐‘ โ‹… ๐‘ = ๐‘ > Pr ิฆ ๐‘๐‘ข โ‹… ๐‘ โ‹… ๐‘ = เดค ๐‘

10/16

slide-33
SLIDE 33

proof sketch

โ‡’ assume ๐‘ž1, โ€ฆ , ๐‘žโ„“ such that: โจ๐‘—=1

โ„“

๐‘ž๐‘— = ิฆ ๐‘๐‘ข โ‹… ๐‘ โ‹… ๐‘ and(1, โ€ฆ , 1) is in the column space of ๐‘ โ‡’ there exists ๐‘โ€ฒ โˆˆ 0,1 ๐‘’+1 s.t. ๐‘ โ‹… ๐‘โ€ฒ = (1, โ€ฆ , 1) Pr ิฆ ๐‘๐‘ข โ‹… ๐‘ โ‹… ๐‘ = ๐‘ = เตž 1 2 if ๐‘ โ‹… ๐‘ โ‰  (1, โ€ฆ , 1) 1 if ๐‘ โ‹… ๐‘ = 1, โ€ฆ , 1 then, Pr ิฆ ๐‘๐‘ข โ‹… ๐‘ โ‹… ๐‘ = ๐‘ > Pr ิฆ ๐‘๐‘ข โ‹… ๐‘ โ‹… ๐‘ = เดค ๐‘ โ‡ a lot more technical...

10/16

slide-34
SLIDE 34

upper bound

11/16

slide-35
SLIDE 35

upper bound th theorem: there exists a ๐‘’-private circuit for multiplication with randomness complexity ร•(๐‘’).

11/16 randomness complexity of ISW: ๐‘ƒ ๐‘’2 needs for a quadratic complexity?

slide-36
SLIDE 36

proof sketch

probabilistic method: non-constructive! 12/16

slide-37
SLIDE 37

proof sketch

probabilistic method: non-constructive! ๐‘ 

1, โ€ฆ , ๐‘  ๐‘† random bits

๏ƒž๐œ๐‘—,๐‘˜ = โŠ•1โ‰ค๐‘™โ‰ค๐‘† ๐›ฝ๐‘—,๐‘˜,๐‘™ โ‹… ๐‘ 

๐‘— with ๐›ฝ๐‘—,๐‘˜,๐‘™ โ† 0,1 $

12/16

slide-38
SLIDE 38

proof sketch

probabilistic method: non-constructive! ๐‘ 

1, โ€ฆ , ๐‘  ๐‘† random bits

๏ƒž๐œ๐‘—,๐‘˜ = โŠ•1โ‰ค๐‘™โ‰ค๐‘† ๐›ฝ๐‘—,๐‘˜,๐‘™ โ‹… ๐‘ 

๐‘— with ๐›ฝ๐‘—,๐‘˜,๐‘™ โ† 0,1

๐‘0๐‘0 ๐‘1๐‘0 ๐‘0๐‘1 ๐‘1๐‘1 โ‹ฏ ๐‘0๐‘๐‘’ ๐‘1๐‘๐‘’ โ‹ฎ โ‹ฎ โ‹ฑ โ‹ฎ ๐‘๐‘’๐‘0 ๐‘๐‘’๐‘1 โ‹ฏ ๐‘๐‘’๐‘๐‘’ ๐‘‘0 ๐‘‘1

โ‹ฎ

๐‘‘๐‘’

$

12/16

slide-39
SLIDE 39

proof sketch

๐‘‘0 ๐‘‘1

โ‹ฎ

๐‘‘๐‘’

โ€ฆ

= ๐‘๐‘—๐‘

๐‘˜

โŠ• โŠ• โŠ•

12/16 probabilistic method: non-constructive! ๐‘ 

1, โ€ฆ , ๐‘  ๐‘† random bits

๏ƒž๐œ๐‘—,๐‘˜ = โŠ•1โ‰ค๐‘™โ‰ค๐‘† ๐›ฝ๐‘—,๐‘˜,๐‘™ โ‹… ๐‘ 

๐‘— with ๐›ฝ๐‘—,๐‘˜,๐‘™ โ† 0,1 $

slide-40
SLIDE 40

proof sketch

๐‘‘0 ๐‘‘1

โ‹ฎ

๐‘‘๐‘’

โ€ฆ

= ๐‘๐‘—๐‘

๐‘˜

โŠ• โŠ• โŠ• โŠ• โŠ• โŠ•

= ๐œ๐‘—,๐‘˜

12/16 probabilistic method: non-constructive! ๐‘ 

1, โ€ฆ , ๐‘  ๐‘† random bits

๏ƒž๐œ๐‘—,๐‘˜ = โŠ•1โ‰ค๐‘™โ‰ค๐‘† ๐›ฝ๐‘—,๐‘˜,๐‘™ โ‹… ๐‘ 

๐‘— with ๐›ฝ๐‘—,๐‘˜,๐‘™ โ† 0,1 $

slide-41
SLIDE 41

proof sketch

๐‘‘0 ๐‘‘1

โ‹ฎ

๐‘‘๐‘’

โ€ฆ

= ๐‘๐‘—๐‘

๐‘˜

โŠ• โŠ• โŠ• โŠ• โŠ• โŠ•

= ๐œ๐‘—,๐‘˜ correctness: ๐œ๐‘’,๐‘’ = โŠ•๐‘—,๐‘˜ ๐œ๐‘—,๐‘˜

12/16 probabilistic method: non-constructive! ๐‘ 

1, โ€ฆ , ๐‘  ๐‘† random bits

๏ƒž๐œ๐‘—,๐‘˜ = โŠ•1โ‰ค๐‘™โ‰ค๐‘† ๐›ฝ๐‘—,๐‘˜,๐‘™ โ‹… ๐‘ 

๐‘— with ๐›ฝ๐‘—,๐‘˜,๐‘™ โ† 0,1 $

slide-42
SLIDE 42

proof sketch

๐‘‘0 ๐‘‘1

โ‹ฎ

๐‘‘๐‘’

โ€ฆ

= ๐‘๐‘—๐‘

๐‘˜

โŠ• โŠ• โŠ• โŠ• โŠ• โŠ•

= ๐œ๐‘—,๐‘˜ correctness: ๐œ๐‘’,๐‘’ = โŠ•๐‘—,๐‘˜ ๐œ๐‘—,๐‘˜ ๐‘’-privacy: if ๐‘† = ร• ๐‘’ , Pr ๐‘—๐‘ก ๐‘ก๐‘“๐‘‘๐‘ฃ๐‘ ๐‘“ > 0 โ‡’ at least one algorithm is ๐‘’-private

12/16 probabilistic method: non-constructive! ๐‘ 

1, โ€ฆ , ๐‘  ๐‘† random bits

๏ƒž๐œ๐‘—,๐‘˜ = โŠ•1โ‰ค๐‘™โ‰ค๐‘† ๐›ฝ๐‘—,๐‘˜,๐‘™ โ‹… ๐‘ 

๐‘— with ๐›ฝ๐‘—,๐‘˜,๐‘™ โ† 0,1 $

slide-43
SLIDE 43

lower bounds

13/16

slide-44
SLIDE 44

lower bounds

theorem:

  • 1. ๐‘’-privacy โ‡’ at least ๐‘’ random bits (for ๐‘’ โ‰ฅ 2)
  • 2. ๐‘’-privacy โ‡’ at least ๐‘’ + 1 random bits (for ๐‘’ โ‰ฅ 3)

13/16

slide-45
SLIDE 45

proof sketch of 1.

lemma: ๐‘‡0, ๐‘‡1 two sets of at most ๐‘’ probes and ๐‘ก๐‘ = โŠ•๐‘žโˆˆ๐‘‡๐‘ ๐‘ž (๐‘ 

๐‘— โˆ‰ ๐‘ก๐‘, โˆ€๐‘—, ๐‘) โˆง (๐‘ก0 โŠ• ๐‘ก1 = ๐‘ โ‹… ๐‘) โ‡’ ๐ท is not ๐‘’-private

14/16

slide-46
SLIDE 46

proof sketch of 1.

suppose an algorithm ๐ท with only ๐‘ 

1, โ€ฆ , ๐‘  ๐‘’โˆ’1 and let ๐‘‘0, โ€ฆ , ๐‘‘๐‘’ the output of ๐ท

let ๐‘‚ = ๐‘œ๐‘—,๐‘˜ 1โ‰ค๐‘—โ‰ค๐‘’โˆ’1

1โ‰ค๐‘˜โ‰ค๐‘’

โˆˆ 0,1 (๐‘’โˆ’1)ร—๐‘’ s.t. ๐‘œ๐‘—,๐‘˜ = 1 โ‡” ๐‘ ๐‘— โˆˆ ๐‘‘

๐‘˜

lemma: ๐‘‡0, ๐‘‡1 two sets of at most ๐‘’ probes and ๐‘ก๐‘ = โŠ•๐‘žโˆˆ๐‘‡๐‘ ๐‘ž (๐‘ 

๐‘— โˆ‰ ๐‘ก๐‘, โˆ€๐‘—, ๐‘) โˆง (๐‘ก0 โŠ• ๐‘ก1 = ๐‘ โ‹… ๐‘) โ‡’ ๐ท is not ๐‘’-private

14/16

slide-47
SLIDE 47

proof sketch of 1.

suppose an algorithm ๐ท with only ๐‘ 

1, โ€ฆ , ๐‘  ๐‘’โˆ’1 and let ๐‘‘0, โ€ฆ , ๐‘‘๐‘’ the output of ๐ท

let ๐‘‚ = ๐‘œ๐‘—,๐‘˜ 1โ‰ค๐‘—โ‰ค๐‘’โˆ’1

1โ‰ค๐‘˜โ‰ค๐‘’

โˆˆ 0,1 (๐‘’โˆ’1)ร—๐‘’ s.t. ๐‘œ๐‘—,๐‘˜ = 1 โ‡” ๐‘ ๐‘— โˆˆ ๐‘‘

๐‘˜

๐‘‚ has dimension ๐‘’ โˆ’ 1 ร— ๐‘’ โ‡’ ๐ฟ๐‘“๐‘  ๐‘‚ โ‰  0

lemma: ๐‘‡0, ๐‘‡1 two sets of at most ๐‘’ probes and ๐‘ก๐‘ = โŠ•๐‘žโˆˆ๐‘‡๐‘ ๐‘ž (๐‘ 

๐‘— โˆ‰ ๐‘ก๐‘, โˆ€๐‘—, ๐‘) โˆง (๐‘ก0 โŠ• ๐‘ก1 = ๐‘ โ‹… ๐‘) โ‡’ ๐ท is not ๐‘’-private

14/16

slide-48
SLIDE 48

proof sketch of 1.

suppose an algorithm ๐ท with only ๐‘ 

1, โ€ฆ , ๐‘  ๐‘’โˆ’1 and let ๐‘‘0, โ€ฆ , ๐‘‘๐‘’ the output of ๐ท

let ๐‘‚ = ๐‘œ๐‘—,๐‘˜ 1โ‰ค๐‘—โ‰ค๐‘’โˆ’1

1โ‰ค๐‘˜โ‰ค๐‘’

โˆˆ 0,1 (๐‘’โˆ’1)ร—๐‘’ s.t. ๐‘œ๐‘—,๐‘˜ = 1 โ‡” ๐‘ 

๐‘— โˆˆ ๐‘‘ ๐‘˜

๐‘‚ has dimension ๐‘’ โˆ’ 1 ร— ๐‘’ โ‡’ ๐ฟ๐‘“๐‘  ๐‘‚ โ‰  0 let ๐‘ฅ โˆˆ ๐ฟ๐‘“๐‘  ๐‘‚ โˆ’ {0} ๐‘‡0 = ๐‘‘0 โˆช ๐‘‘๐‘— ๐‘ฅ๐‘— = 0 and ๐‘‡1 = ๐‘‘๐‘— ๐‘ฅ๐‘— = 1 satisfy requirements of lemma...

lemma: ๐‘‡0, ๐‘‡1 two sets of at most ๐‘’ probes and ๐‘ก๐‘ = โŠ•๐‘žโˆˆ๐‘‡๐‘ ๐‘ž (๐‘ 

๐‘— โˆ‰ ๐‘ก๐‘, โˆ€๐‘—, ๐‘) โˆง (๐‘ก0 โŠ• ๐‘ก1 = ๐‘ โ‹… ๐‘) โ‡’ ๐ท is not ๐‘’-private

14/16

slide-49
SLIDE 49

automatic tool for finding attacks

  • rder

2 3 4 5 6 [BBDFGS15] <1 ms 36 ms 108 ms 6,3 s 26 min this paper <10 ms <10 ms <10 ms <10 ms <10 ms

  • based on the algebraic characterization
  • relies on coding theory (information set decoding algorithms)
  • not perfectly sound...
  • much faster than Easycrypt-based [BBDFGS15]

table: time to find an attack

15/16

slide-50
SLIDE 50

16/16

slide-51
SLIDE 51

16/16

slide-52
SLIDE 52

16/16

slide-53
SLIDE 53

thank you!

slide-54
SLIDE 54