Reusable Non-Interactive Secure Computation Melissa Chase (MSR - - PowerPoint PPT Presentation

reusable non interactive secure computation
SMART_READER_LITE
LIVE PREVIEW

Reusable Non-Interactive Secure Computation Melissa Chase (MSR - - PowerPoint PPT Presentation

Reusable Non-Interactive Secure Computation Melissa Chase (MSR Redmond) Yevgeniy Dodis (NYU) Yuval Ishai (Technion) Daniel Kraschewski (TNG Technology Consulting) Tianren Liu (MIT UW) Rafail Ostrovsky (UCLA) Vinod Vaikuntanathan


slide-1
SLIDE 1

Reusable Non-Interactive Secure Computation

Melissa Chase (MSR Redmond) Yevgeniy Dodis (NYU) Yuval Ishai (Technion) Daniel Kraschewski (TNG Technology Consulting) Tianren Liu (MIT → UW) Rafail Ostrovsky (UCLA) Vinod Vaikuntanathan (MIT) Aug 22, 2019

slide-2
SLIDE 2

Non-Interactive Secure Computation (NISC)

R

x

S

y Goal: receiver gets f (x,y) for a public function f .

slide-3
SLIDE 3

Non-Interactive Secure Computation (NISC)

R

x

S

y Goal: receiver gets f (x,y) for a public function f .

slide-4
SLIDE 4

Non-Interactive Secure Computation (NISC)

R

x

S

y Goal: receiver gets f (x,y) for a public function f .

slide-5
SLIDE 5

Non-Interactive Secure Computation (NISC)

R

x

S

y f (x,y) Goal: receiver gets f (x,y) for a public function f .

slide-6
SLIDE 6

Non-Interactive Secure Computation (NISC)

E.g. FHE = ⇒ Semi-honest NISC

R

x

S

y f (x,y) Goal: receiver gets f (x,y) for a public function f .

slide-7
SLIDE 7

Non-Interactive Secure Computation (NISC)

E.g. FHE = ⇒ Semi-honest NISC

R

x

S

y Enc( x ) f (x,y) Goal: receiver gets f (x,y) for a public function f .

slide-8
SLIDE 8

Non-Interactive Secure Computation (NISC)

E.g. FHE = ⇒ Semi-honest NISC

R

x

S

y Enc( x ) Enc( f (x,y) ) f (x,y) Goal: receiver gets f (x,y) for a public function f .

slide-9
SLIDE 9

Garbled Circuit + OT = ⇒ Semi-honest NISC [Kilian’88]

R

x

S

y

slide-10
SLIDE 10

Garbled Circuit + OT = ⇒ Semi-honest NISC [Kilian’88]

R

x

S

y ˜ C and tags w1,0 w1,1 w2,0 w2,1 w3,0 w3,1 w4,0 w4,1 . . . wn,0 wn,1

slide-11
SLIDE 11

Garbled Circuit + OT = ⇒ Semi-honest NISC [Kilian’88]

R

x

S

y ˜ C and tags w1,0 w1,1 w2,0 w2,1 w3,0 w3,1 w4,0 w4,1 . . . wn,0 wn,1 x = 1 1 . . . 1

slide-12
SLIDE 12

Garbled Circuit + OT = ⇒ Semi-honest NISC [Kilian’88]

R

x

S

y ˜ C and tags w1,0 w1,1 w2,0 w2,1 w3,0 w3,1 w4,0 w4,1 . . . wn,0 wn,1 x = 1 1 . . . 1

slide-13
SLIDE 13

Garbled Circuit + OT = ⇒ Semi-honest NISC [Kilian’88]

R

x

S

y ˜ C and tags w1,0 w1,1 w2,0 w2,1 w3,0 w3,1 w4,0 w4,1 . . . wn,0 wn,1 x = 1 1 . . . 1 ˜ C and (wi,xi)n

i=1 reveals f (x,y)

and nothing else computationally.

slide-14
SLIDE 14

Garbled Circuit + OT = ⇒ Semi-honest NISC [Kilian’88]

R

x

S

y ˜ C and tags w1,0 w1,1 w2,0 w2,1 w3,0 w3,1 w4,0 w4,1 . . . wn,0 wn,1 x = 1 1 . . . 1 ˜ C and (wi,xi)n

i=1 reveals f (x,y)

and nothing else computationally. ˜ C

slide-15
SLIDE 15

Garbled Circuit + OT = ⇒ Semi-honest NISC [Kilian’88]

R

x

S

y ˜ C and tags w1,0 w1,1 w2,0 w2,1 w3,0 w3,1 w4,0 w4,1 . . . wn,0 wn,1 x = 1 1 . . . 1 ˜ C and (wi,xi)n

i=1 reveals f (x,y)

and nothing else computationally. ˜ C OT wi,0,wi,1 xi wi,xi

slide-16
SLIDE 16

NISC in OT-hybrid model

Advantages

◮ OT realization from various models/assumptions ◮ Efficiency ◮ Malicious Security [Ishai-Kushilevitz-Ostrovsky-Prabhakaran-Sahai’88]

◮ Information-theoretical NISC for NC0 in OT-hybrid. ◮ NISC in OT-hybrid using black-box PRG.

Disadvantages

◮ NOT reusable secure.

slide-17
SLIDE 17

NISC in OT-hybrid model

Advantages

◮ OT realization from various models/assumptions ◮ Efficiency ◮ Malicious Security [Ishai-Kushilevitz-Ostrovsky-Prabhakaran-Sahai’88]

◮ Information-theoretical NISC for NC0 in OT-hybrid. ◮ NISC in OT-hybrid using black-box PRG.

Disadvantages

◮ NOT reusable secure.

slide-18
SLIDE 18

NISC in OT-hybrid model

Advantages

◮ OT realization from various models/assumptions ◮ Efficiency ◮ Malicious Security [Ishai-Kushilevitz-Ostrovsky-Prabhakaran-Sahai’88]

◮ Information-theoretical NISC for NC0 in OT-hybrid. ◮ NISC in OT-hybrid using black-box PRG.

Disadvantages

◮ NOT reusable secure.

slide-19
SLIDE 19

Reusable NISC

R

x

S

y

slide-20
SLIDE 20

Reusable NISC

R

x

S

y “encryption” of my data Cx

slide-21
SLIDE 21

Reusable NISC

R

x

S

y “encryption” of my data Cx msg

slide-22
SLIDE 22

Reusable NISC

R

x

S

y “encryption” of my data Cx msg f (x,y)

slide-23
SLIDE 23

Reusable NISC

R

x

S

y “encryption” of my data Cx msg f (x,y) Reusability: Safe for receiver to reuse first msg and randomness

slide-24
SLIDE 24

Reusable NISC

R

x

S

y “encryption” of my data Cx msg f (x,y) Reusability: Safe for receiver to reuse first msg and randomness

S′

y′,y′′

slide-25
SLIDE 25

Reusable NISC

R

x

S

y “encryption” of my data Cx msg f (x,y) Reusability: Safe for receiver to reuse first msg and randomness

S′

y′,y′′ msg′, msg′′

slide-26
SLIDE 26

Reusable NISC

R

x

S

y “encryption” of my data Cx msg f (x,y) Reusability: Safe for receiver to reuse first msg and randomness

S′

y′,y′′ msg′, msg′′ f (x,y′) f (x,y′′)

slide-27
SLIDE 27

Reusable NISC

R

x

S

y “encryption” of my data Cx msg f (x,y) Reusability: Safe for receiver to reuse first msg and randomness

S′

y′,y′′ msg′, msg′′ f (x,y′) f (x,y′′)

slide-28
SLIDE 28

NISC in OT-hybrid model

R

x

S

y ˜ C and tags w1,0 w1,1 w2,0 w2,1 w3,0 w3,1 w4,0 w4,1 . . . wn,0 wn,1 x = 1 1 . . . 1 ˜ C

reusable

OT wi,0,wi,1 xi wi,xi

slide-29
SLIDE 29

NISC in OT-hybrid model

R

x

S

y ˜ C and tags w1,0 mess w2,0 w2,1 w3,0 w3,1 w4,0 w4,1 . . . wn,0 wn,1 x = 1 1 . . . 1 ˜ C

reusable

OT wi,0,wi,1 xi wi,xi

slide-30
SLIDE 30

NISC in OT-hybrid model

R

x

S

y ˜ C and tags w1,0 mess w2,0 w2,1 w3,0 w3,1 w4,0 w4,1 . . . wn,0 wn,1 x = 1 1 . . . 1 Replacing w1,1 changes ’s behaviour = ⇒ x[1] = 1 thus NO security against malicious sender. ˜ C

reusable

OT wi,0,wi,1 xi wi,xi

slide-31
SLIDE 31

NISC in OT-hybrid model

R

x

S

y ˜ C and tags w1,0 mess w2,0 w2,1 w3,0 w3,1 w4,0 w4,1 . . . wn,0 wn,1 x = 1 1 . . . 1 ˜ C

reusable

OT wi,0,wi,1 xi wi,xi

slide-32
SLIDE 32

NISC in OT-hybrid model + one-shot UC-security [IKOPS’11]

R

x

S

y ˜ C and tags w1,0 mess w2,0 w2,1 w3,0 w3,1 w4,0 w4,1 . . . wn,0 wn,1 let OT input be encoding ˜ x = 1 1 . . . 1 ˜ C

reusable

OT wi,0,wi,1 ˜ xi wi,˜

xi

slide-33
SLIDE 33

NISC in OT-hybrid model + one-shot UC-security [IKOPS’11]

R

x

S

y ˜ C and tags w1,0 mess w2,0 w2,1 w3,0 w3,1 w4,0 w4,1 . . . wn,0 wn,1 let OT input be encoding ˜ x = 1 1 . . . 1 A few bits of ˜ x leaks no information about x. ˜ C

reusable

OT wi,0,wi,1 ˜ xi wi,˜

xi

slide-34
SLIDE 34

NISC in OT-hybrid model + one-shot UC-security [IKOPS’11]

R

x

S

y ˜ C and tags w1,0 mess w2,0 w2,1 w3,0 w3,1 w4,0 w4,1 . . . wn,0 wn,1 let OT input be encoding ˜ x = 1 1 . . . 1 Repeat the attack to learn the whole encoding ˜ x thus NO reusable security against malicious sender. ˜ C

reusable

OT wi,0,wi,1 ˜ xi wi,˜

xi

slide-35
SLIDE 35

Our Results

Impossible to patch the protocol against malicious adversaries in reusable settings, as we show...

Theorem 1

There is no information-theoretic reusable NISC in rOT-hybrid model.

slide-36
SLIDE 36

Our Results

Impossible to patch the protocol against malicious adversaries in reusable settings, as we show...

Theorem 1

There is no information-theoretic reusable NISC in rOT-hybrid model. There is no reusable NISC for certain functionalities in rOT-hybrid model with black-box simulation, assuming OWF.

slide-37
SLIDE 37

Our Results

Impossible to patch the protocol against malicious adversaries in reusable settings, as we show...

Theorem 1

There is no information-theoretic reusable NISC in rOT-hybrid model. There is no reusable NISC for certain functionalities in rOT-hybrid model with black-box simulation, assuming OWF. Expansive alternative: Semi-honest NISC + reusable NIZK = ⇒ reusable NISC.

slide-38
SLIDE 38

Our Results (continue)

NEW primitive: Oblivious linear function evaluation (OLE) S R

x ∈ F a,b ∈ F

slide-39
SLIDE 39

Our Results (continue)

NEW primitive: Oblivious linear function evaluation (OLE) S R

x ∈ F a,b ∈ F get ax +b ∈ F

slide-40
SLIDE 40

Our Results (continue)

NEW primitive: Oblivious linear function evaluation (OLE) S R

x ∈ F a,b ∈ F get ax +b ∈ F

Theorem 2

An information-theoretical UC-secure reusable NISC protocol in rOLE-hybrid model.

slide-41
SLIDE 41

Our Results (continue)

NEW primitive: Oblivious linear function evaluation (OLE) S R

x ∈ F a,b ∈ F get ax +b ∈ F

Theorem 2

An information-theoretical UC-secure reusable NISC protocol in rOLE-hybrid model.

Theorem 3

An UC-secure 2-msg reusable OLE protocol in the CRS setting, under Paillier assumption.

slide-42
SLIDE 42

Our Results (continue)

NEW primitive: Oblivious linear function evaluation (OLE) S R

x ∈ F a,b ∈ F get ax +b ∈ F Degenerate into OT if |F| = 2.

Theorem 2

An information-theoretical UC-secure reusable NISC protocol in rOLE-hybrid model.

Theorem 3

An UC-secure 2-msg reusable OLE protocol in the CRS setting, under Paillier assumption.

slide-43
SLIDE 43

Our Results (continue)

NEW primitive: Oblivious linear function evaluation (OLE) S R

x ∈ F a,b ∈ F get ax +b ∈ F Degenerate into OT if |F| = 2.

Theorem 2

An information-theoretical UC-secure reusable NISC protocol in rOLE-hybrid model.

Theorem 3

An UC-secure 2-msg reusable OLE protocol in the CRS setting, under Paillier assumption. Security loss ≈ 1

|F|

slide-44
SLIDE 44

How to Lift One-shot Security to Reusability

R

x

S

y rOLE ai,bi ˜ xi ai ˜ xi +bi f (x,y)

slide-45
SLIDE 45

How to Lift One-shot Security to Reusability

R

x

S

y rOLE ai,bi ˜ xi ai ˜ xi +bi f (x,y)

slide-46
SLIDE 46

How to Lift One-shot Security to Reusability

R

x

S

/// y / rOLE ai,bi ˜ xi ai ˜ xi +bi f (x,y)

slide-47
SLIDE 47

How to Lift One-shot Security to Reusability

R

x

S

/// y / rOLE ai,bi ˜ xi ai ˜ xi +bi f (x,y∗) ◮ UC-security: ∃ an efficient simulator S S (a1,b1,a2,b2,...) → y∗

slide-48
SLIDE 48

How to Lift One-shot Security to Reusability

R

x

S

/// y / rOLE ai,bi ˜ xi ai ˜ xi +bi f (x,y∗) ◮ UC-security: ∃ an efficient simulator S S (a1,b1,a2,b2,...) → y∗ ◮ No Abort (optional): When abnormal behavior was detected,

  • utput f (x,0)
slide-49
SLIDE 49

How to Lift One-shot Security to Reusability

R

x

S

/// y / rOLE ai,bi ˜ xi ai ˜ xi +bi f (x,y∗) ◮ UC-security: ∃ an efficient simulator S S (a1,b1,a2,b2,...) → y∗ ◮ No Abort (optional): When abnormal behavior was detected,

  • utput f (x,0)

◮ Difficulty: distribution y∗ = ⇒ f (x,y∗) has entropy in ideal world = ⇒ leak information of receiver’s randomness in real world

slide-50
SLIDE 50

How to Lift One-shot Security to Reusability

R

x

S

/// y / rOLE ai,bi ˜ xi ai ˜ xi +bi f (x,y∗) ◮ UC-security: ∃ an efficient simulator S S (a1,b1,a2,b2,...) → y∗ ◮ No Abort (optional): When abnormal behavior was detected,

  • utput f (x,0)

◮ Difficulty: distribution y∗ = ⇒ f (x,y∗) has entropy in ideal world = ⇒ leak information of receiver’s randomness in real world

slide-51
SLIDE 51

How to Lift One-shot Security to Reusability

R

x

S

/// y / rOLE ai,bi ˜ xi ai ˜ xi +bi f (x,y∗) ◮ UC-security: ∃ an efficient simulator S S (a1,b1,a2,b2,...) → y∗ ◮ No Abort (optional): When abnormal behavior was detected,

  • utput f (x,0)

◮ Difficulty: distribution y∗ = ⇒ f (x,y∗) has entropy in ideal world = ⇒ leak information of receiver’s randomness in real world

slide-52
SLIDE 52

How to Lift One-shot Security to Reusability

R

x

S

/// y / rOLE ai,bi ˜ xi ai ˜ xi +bi f (x,y∗) ◮ UC-security: ∃ an efficient simulator S S (a1,b1,a2,b2,...) → y∗ ◮ No Abort (optional): When abnormal behavior was detected,

  • utput f (x,0)

◮ Difficulty: distribution y∗ = ⇒ f (x,y∗) has entropy in ideal world = ⇒ leak information of receiver’s randomness in real world ◮ “Strong” UC-security = ⇒ Reusability The simulator is deterministic

slide-53
SLIDE 53

Overview: rNISC in rOLE-hybrid model

R

x ∈ Fn

S

y ∈ Fn ◮ Assume f is an arithmetic NC1 circuit or an arithmetic branching program over F ◮ [IK’02,AIK’14] encode y → (A,b) s.t. Ax +b reveals f (x,y) and nothing else ◮ Against malicious sender: detect if (A,b) is honestly generated, i.e. satisfies some simple arithmetic constraints Certified rOLE →

  • Ax +b,

if (A,b) satisfies constraints ⊥,

  • therwise
slide-54
SLIDE 54

Overview: rNISC in rOLE-hybrid model

R

x ∈ Fn

S

y ∈ Fn ◮ Assume f is an arithmetic NC1 circuit or an arithmetic branching program over F ◮ [IK’02,AIK’14] encode y → (A,b) s.t. Ax +b reveals f (x,y) and nothing else ◮ Against malicious sender: detect if (A,b) is honestly generated, i.e. satisfies some simple arithmetic constraints Certified rOLE →

  • Ax +b,

if (A,b) satisfies constraints ⊥,

  • therwise
slide-55
SLIDE 55

Overview: rNISC in rOLE-hybrid model

R

x ∈ Fn

S

y ∈ Fn rOLE A,b x Ax +b ◮ Assume f is an arithmetic NC1 circuit or an arithmetic branching program over F ◮ [IK’02,AIK’14] encode y → (A,b) s.t. Ax +b reveals f (x,y) and nothing else ◮ Against malicious sender: detect if (A,b) is honestly generated, i.e. satisfies some simple arithmetic constraints Certified rOLE →

  • Ax +b,

if (A,b) satisfies constraints ⊥,

  • therwise
slide-56
SLIDE 56

Overview: rNISC in rOLE-hybrid model

R

x ∈ Fn

S

y ∈ Fn rOLE A,b x Ax +b f (x,y) ◮ Assume f is an arithmetic NC1 circuit or an arithmetic branching program over F ◮ [IK’02,AIK’14] encode y → (A,b) s.t. Ax +b reveals f (x,y) and nothing else ◮ Against malicious sender: detect if (A,b) is honestly generated, i.e. satisfies some simple arithmetic constraints Certified rOLE →

  • Ax +b,

if (A,b) satisfies constraints ⊥,

  • therwise
slide-57
SLIDE 57

Overview: rNISC in rOLE-hybrid model

R

x ∈ Fn

S

y ∈ Fn rOLE A,b x Ax +b f (x,y) ◮ Assume f is an arithmetic NC1 circuit or an arithmetic branching program over F ◮ [IK’02,AIK’14] encode y → (A,b) s.t. Ax +b reveals f (x,y) and nothing else ◮ Against malicious sender: detect if (A,b) is honestly generated, i.e. satisfies some simple arithmetic constraints Certified rOLE →

  • Ax +b,

if (A,b) satisfies constraints ⊥,

  • therwise
slide-58
SLIDE 58

Overview: rNISC in rOLE-hybrid model

R

x ∈ Fn

S

y ∈ Fn

Certified

rOLE A,b x

  • Ax +b

⊥ f (x,y) ◮ Assume f is an arithmetic NC1 circuit or an arithmetic branching program over F ◮ [IK’02,AIK’14] encode y → (A,b) s.t. Ax +b reveals f (x,y) and nothing else ◮ Against malicious sender: detect if (A,b) is honestly generated, i.e. satisfies some simple arithmetic constraints Certified rOLE →

  • Ax +b,

if (A,b) satisfies constraints ⊥,

  • therwise
slide-59
SLIDE 59

Overview: rNISC in rOLE-hybrid model

R

x ∈ Fn

S

y ∈ Fn

Certified

rOLE A,b x

  • Ax +b

⊥ f (x,y) ◮ Assume f is an arithmetic NC1 circuit or an arithmetic branching program over F ◮ [IK’02,AIK’14] encode y → (A,b) s.t. Ax +b reveals f (x,y) and nothing else ◮ Against malicious sender: detect if (A,b) is honestly generated, i.e. satisfies some simple arithmetic constraints Certified rOLE →

  • Ax +b,

if (A,b) satisfies constraints ⊥,

  • therwise
slide-60
SLIDE 60

Certified rOLE

R S

slide-61
SLIDE 61

Certified rOLE

R S

rOLE a1,b1 x1 a1x1 +b1 rOLE a2,b2 x2 a2x2 +b2 rOLE a3,b3 x3 a3x3 +b3 . . .

slide-62
SLIDE 62

Certified rOLE

R S

rOLE a1,b1 x1 a1x1 +b1 rOLE a2,b2 x2 a2x2 +b2 rOLE a3,b3 x3 a3x3 +b3 . . . Certified rOLE

slide-63
SLIDE 63

Certified rOLE

R S

rOLE a1,b1 x1 a1x1 +b1 rOLE a2,b2 x2 a2x2 +b2 rOLE a3,b3 x3 a3x3 +b3 . . . Certified rOLE ◮ Sender can prove (a1,b1,a2,b2,...) satisfies arithmetic constraints

slide-64
SLIDE 64

Certified rOLE

R S

rOLE a1,b1 x1 a1x1 +b1 rOLE a2,b2 x2 a2x2 +b2 rOLE a3,b3 x3 a3x3 +b3 . . . Certified rOLE ◮ Sender can prove (a1,b1,a2,b2,...) satisfies arithmetic constraints ◮ Side product: reusable DV-NIZK in rOLE-hybrid model.

slide-65
SLIDE 65

Certified rOLE

R S

rOLE a1,b1 x1 a1x1 +b1 rOLE a2,b2 x2 a2x2 +b2 rOLE a3,b3 x3 a3x3 +b3 . . . Certified rOLE ◮ Sender can prove (a1,b1,a2,b2,...) satisfies arithmetic constraints ◮ Side product: reusable DV-NIZK in rOLE-hybrid model.

slide-66
SLIDE 66

Certified rOLE

R S

rOLE a1,b1 x1 a1x1 +b1 rOLE a2,b2 x2 a2x2 +b2 rOLE a3,b3 x3 a3x3 +b3 . . . Certified rOLE ◮ Sender can prove (a1,b1,a2,b2,...) satisfies arithmetic constraints ai = aj for some (i,j)

for general constraints → see eprint

◮ Side product: reusable DV-NIZK in rOLE-hybrid model.

slide-67
SLIDE 67

Certified rOLE

R S

. . . Certified rOLE axi +b = (aw +r)· ˆ xi − (r ˆ xi +r′) + (aˆ ˆ xi +b +r′)

slide-68
SLIDE 68

Certified rOLE

R

w ← F

S

rOLE w . . . Certified rOLE axi +b = (aw +r)· ˆ xi − (r ˆ xi +r′) + (aˆ ˆ xi +b +r′)

slide-69
SLIDE 69

Certified rOLE

R

w ← F

S

r ← F rOLE w a,r aw +r . . . Certified rOLE axi +b = (aw +r)· ˆ xi − (r ˆ xi +r′) + (aˆ ˆ xi +b +r′)

slide-70
SLIDE 70

Certified rOLE

R

w ← F

S

r ← F rOLE w a,r aw +r . . . Certified rOLE axi +b = (aw +r)· ˆ xi − (r ˆ xi +r′) + (aˆ ˆ xi +b +r′) Commitment(a)

slide-71
SLIDE 71

Certified rOLE

R

w ← F

S

r ← F rOLE w a,r aw +r . . . Certified rOLE axi +b = (aw +r)· ˆ xi − (r ˆ xi +r′) + (aˆ ˆ xi +b +r′) Target Commitment(a)

slide-72
SLIDE 72

Certified rOLE

R

w ← F ˆ xi ← F

S

r ← F rOLE w a,r aw +r rOLE ˆ xi rOLE ˆ ˆ xi = xi −w ˆ xi . . . Certified rOLE axi +b = (aw +r)· ˆ xi − (r ˆ xi +r′) + (aˆ ˆ xi +b +r′) Target Commitment(a)

slide-73
SLIDE 73

Certified rOLE

R

w ← F ˆ xi ← F

S

r ← F r′ ← F rOLE w a,r aw +r rOLE ˆ xi r,r′ r ˆ xi +r′ rOLE ˆ ˆ xi = xi −w ˆ xi a,b +r′ aˆ ˆ xi +b +r′ . . . Certified rOLE axi +b = (aw +r)· ˆ xi − (r ˆ xi +r′) + (aˆ ˆ xi +b +r′) Target Commitment(a)

slide-74
SLIDE 74

Certified rOLE

R

w ← F ˆ xi ← F

S

r ← F r′ ← F rOLE w a,r aw +r rOLE ˆ xi r,r′ r ˆ xi +r′ rOLE ˆ ˆ xi = xi −w ˆ xi a,b +r′ aˆ ˆ xi +b +r′ . . . Certified rOLE axi +b = (aw +r)· ˆ xi − (r ˆ xi +r′) + (aˆ ˆ xi +b +r′) Target Commitment(a) rOLE outputs

slide-75
SLIDE 75

Certified rOLE

R

w ← F ˆ xi ← F

S

r ← F r′ ← F rOLE w a,r aw +r rOLE ˆ xi r,r′ r ˆ xi +r′ rOLE ˆ ˆ xi = xi −w ˆ xi a,b +r′ aˆ ˆ xi +b +r′ . . . Certified rOLE axi +b = (aw +r)· ˆ xi − (r ˆ xi +r′) + (aˆ ˆ xi +b +r′) Target Commitment(a) rOLE outputs

slide-76
SLIDE 76

Certified rOLE

R

w, ˆ xi ← F

S

r,r′ ← F rOLE w a,r rOLE ˆ xi r,r′ rOLE ˆ ˆ xi = xi −w ˆ xi a,b +r′ Certified rOLE axi +b = (aw +r)· ˆ xi − (r ˆ xi +r′) + e(aˆ ˆ xi +b +r′) Target Commitment(a) rOLE outputs

slide-77
SLIDE 77

Certified rOLE

R

w, ˆ xi ← F

S

r,r′ ← F rOLE w a,r rOLE ˆ xi r,r′ rOLE ˆ ˆ xi = xi −w ˆ xi a,b +r′ Certified rOLE axi +b = (aw +r)· ˆ xi − (r ˆ xi +r′) + e(aˆ ˆ xi +b +r′) Target Commitment(a) rOLE outputs ◮ Correctness: Above equation.

slide-78
SLIDE 78

Certified rOLE

R

w, ˆ xi ← F

S

r,r′ ← F rOLE w a,r rOLE ˆ xi r,r′ rOLE ˆ ˆ xi = xi −w ˆ xi a,b +r′ Certified rOLE axi +b = (aw +r)· ˆ xi − (r ˆ xi +r′) + e(aˆ ˆ xi +b +r′) Target Commitment(a) rOLE outputs ◮ Correctness: Above equation. ◮ UC-secure against Receiver: xi := w ˆ xi + ˆ ˆ xi.

slide-79
SLIDE 79

Certified rOLE

R

w, ˆ xi ← F

S

r,r′ ← F rOLE w a,r rOLE ˆ xi r,r′ rOLE ˆ ˆ xi = xi −w ˆ xi a,b +r′ Certified rOLE axi +b = (aw +r)· ˆ xi − (r ˆ xi +r′) + e(aˆ ˆ xi +b +r′) Target Commitment(a) rOLE outputs ◮ Correctness: Above equation. ◮ UC-secure against Receiver: xi := w ˆ xi + ˆ ˆ xi. ◮ “Strong” UC-secure against Sender:

slide-80
SLIDE 80

Certified rOLE

R

w, ˆ xi ← F

S

r,r′ ← F rOLE w a,r rOLE ˆ xi r,r′ rOLE ˆ ˆ xi = xi −w ˆ xi a,b +r′ Certified rOLE axi +b = (aw +r)· ˆ xi − (r ˆ xi +r′) + e(aˆ ˆ xi +b +r′) Target Commitment(a) rOLE outputs ◮ Correctness: Above equation. ◮ UC-secure against Receiver: xi := w ˆ xi + ˆ ˆ xi. ◮ “Strong” UC-secure against Sender:

slide-81
SLIDE 81

Certified rOLE

R

w, ˆ xi ← F

S

r,r′ ← F rOLE w a,r rOLE ˆ xi r,r′ rOLE ˆ ˆ xi = xi −w ˆ xi a,b +r′ Certified rOLE axi +b = (aw +r)· ˆ xi − (r ˆ xi +r′) + e(aˆ ˆ xi +b +r′) Target Commitment(a) rOLE outputs ◮ Correctness: Above equation. ◮ UC-secure against Receiver: xi := w ˆ xi + ˆ ˆ xi. ◮ “Strong” UC-secure against Sender: Deviate = ⇒ random output

slide-82
SLIDE 82

Certified rOLE

R

w, ˆ xi ← F

S

r,r′ ← F rOLE w a,r rOLE ˆ xi r,r′ rOLE ˆ ˆ xi = xi −w ˆ xi a,b +r′ Certified rOLE axi +b = (aw +r)· ˆ xi − (r ˆ xi +r′) + e(aˆ ˆ xi +b +r′) Target Commitment(a) rOLE outputs ◮ Correctness: Above equation. ◮ UC-secure against Receiver: xi := w ˆ xi + ˆ ˆ xi. ◮ “Strong” not yet UC-secure against Sender: Deviate = ⇒ random output

slide-83
SLIDE 83

Our Results

NEW primitive: Oblivious linear function evaluation (OLE) S R

x ∈ F a,b ∈ F get ax +b ∈ F

Theorem 2

An information-theoretical UC-secure reusable NISC protocol in rOLE-hybrid model.

Theorem 3

An UC-secure 2-msg reusable OLE protocol in the CRS setting, under Paillier assumption.

slide-84
SLIDE 84

Our Results

NEW primitive: Oblivious linear function evaluation (OLE) S R

x ∈ F a,b ∈ F get ax +b ∈ F

Theorem 2

An information-theoretical UC-secure reusable NISC protocol in rOLE-hybrid model.

Theorem 3

An UC-secure 2-msg reusable OLE protocol in the CRS setting, under Paillier assumption.

slide-85
SLIDE 85

rOLE from Paillier

Dual-mode (similar to OT from [PVW’08]) Mode I

S R

x a,b crs ← D1 Mode II

S R

x a,b crs ← D2

slide-86
SLIDE 86

rOLE from Paillier

Dual-mode (similar to OT from [PVW’08]) Mode I

S R

x a,b crs ← D1 Enc( x ) Mode II

S R

x a,b crs ← D2

slide-87
SLIDE 87

rOLE from Paillier

Dual-mode (similar to OT from [PVW’08]) Mode I

S R

x a,b crs ← D1 Enc( x ) Enc(a−r ) Enc( b +rx) Mode II

S R

x a,b crs ← D2

slide-88
SLIDE 88

rOLE from Paillier

Dual-mode (similar to OT from [PVW’08]) Mode I

S R

x a,b crs ← D1 Enc( x ) Enc(a−r ) Enc( b +rx) Efficient simulator against unbounded malicious receiver Mode II

S R

x a,b crs ← D2

slide-89
SLIDE 89

rOLE from Paillier

Dual-mode (similar to OT from [PVW’08]) Mode I

S R

x a,b crs ← D1 Enc( x ) Enc(a−r ) Enc( b +rx) Efficient simulator against unbounded malicious receiver Mode II

S R

x a,b crs ← D2 Enc( 0 )

slide-90
SLIDE 90

rOLE from Paillier

Dual-mode (similar to OT from [PVW’08]) Mode I

S R

x a,b crs ← D1 Enc( x ) Enc(a−r ) Enc( b +rx) Efficient simulator against unbounded malicious receiver Mode II

S R

x a,b crs ← D2 Enc( 0 ) Enc( a ) Enc( b )

slide-91
SLIDE 91

rOLE from Paillier

Dual-mode (similar to OT from [PVW’08]) Mode I

S R

x a,b crs ← D1 Enc( x ) Enc(a−r ) Enc( b +rx) Efficient simulator against unbounded malicious receiver Mode II

S R

x a,b crs ← D2 Enc( 0 ) Enc( a ) Enc( b ) Efficient simulator against unbounded malicious sender

slide-92
SLIDE 92

rOLE from Paillier

Dual-mode (similar to OT from [PVW’08]) D1 is indistinguishable from D2 Mode I

S R

x a,b crs ← D1 Enc( x ) Enc(a−r ) Enc( b +rx) Efficient simulator against unbounded malicious receiver Mode II

S R

x a,b crs ← D2 Enc( 0 ) Enc( a ) Enc( b ) Efficient simulator against unbounded malicious sender

slide-93
SLIDE 93

Paillier Encryption Scheme

KeyGen public key, trapdoor

slide-94
SLIDE 94

Paillier Encryption Scheme

KeyGen public key, trapdoor x Encr( x ) x Encrypt Decrypt randomness r trapdoor

slide-95
SLIDE 95

Paillier Encryption Scheme

KeyGen public key, trapdoor x Encr( x ) x Encrypt Decrypt randomness r trapdoor Enc0( x ) x Decrypt

slide-96
SLIDE 96

Paillier Encryption Scheme

KeyGen public key, trapdoor x Encr( x ) x Encrypt Decrypt randomness r trapdoor Enc0( x ) x Decrypt Encr( x ) · Encs( y ) = Encr+s( x +y )

slide-97
SLIDE 97

rOLE from Paillier

S R

x a,b

slide-98
SLIDE 98

rOLE from Paillier

S R

x a,b CRS (Mode I) h = Enc0( 1 ) w = Encα( 0 ) W0 = Encβ( 1 )

slide-99
SLIDE 99

rOLE from Paillier

S R

x a,b sample sk CRS (Mode I) h = Enc0( 1 ) w = Encα( 0 ) W0 = Encβ( 1 ) W1 = wskW x

0 = Encxβ+α·sk( x )

slide-100
SLIDE 100

rOLE from Paillier

S R

x a,b sample sk sample r CRS (Mode I) h = Enc0( 1 ) w = Encα( 0 ) W0 = Encβ( 1 ) W1 = wskW x

0 = Encxβ+α·sk( x )

v = wr = Encrα( 0 ) V0 = haW −r = Enc−rβ( a−r ) V1 = hbW r

1 = Encrxβ+rα·sk( b +rx )

slide-101
SLIDE 101

rOLE from Paillier

S R

x a,b sample sk sample r CRS (Mode I) h = Enc0( 1 ) w = Encα( 0 ) W0 = Encβ( 1 ) W1 = wskW x

0 = Encxβ+α·sk( x )

v = wr = Encrα( 0 ) V0 = haW −r = Enc−rβ( a−r ) V1 = hbW r

1 = Encrxβ+rα·sk( b +rx )

vskV x

0 V1 = Enc0( ax +b )

slide-102
SLIDE 102

rOLE from Paillier

S R

x a,b sample sk sample r CRS (Mode II) h = Enc0( 1 ) w = Encα( 0 ) W0 = Encβ( 0 ) W1 = wskW x

0 = Encxβ+α·sk( x )

v = wr = Encrα( 0 ) V0 = haW −r = Enc−rβ( a−r ) V1 = hbW r

1 = Encrxβ+rα·sk( b +rx )

vskV x

0 V1 = Enc0( ax +b )

slide-103
SLIDE 103

rOLE from Paillier

S R

x a,b sample sk sample r CRS (Mode II) h = Enc0( 1 ) w = Encα( 0 ) W0 = Encβ( 0 ) W1 = wskW x

0 = Encxβ+α·sk( 0 )

v = wr = Encrα( 0 ) V0 = haW −r = Enc−rβ( a−r ) V1 = hbW r

1 = Encrxβ+rα·sk( b +rx )

vskV x

0 V1 = Enc0( ax +b )

slide-104
SLIDE 104

rOLE from Paillier

S R

x a,b sample sk sample r CRS (Mode II) h = Enc0( 1 ) w = Encα( 0 ) W0 = Encβ( 0 ) W1 = wskW x

0 = Encxβ+α·sk( 0 )

v = wr = Encrα( 0 ) V0 = haW −r = Enc−rβ( a ) V1 = hbW r

1 = Encrxβ+rα·sk(

b ) vskV x

0 V1 = Enc0( ax +b )

slide-105
SLIDE 105

rOLE from Paillier

S R

x a,b sample sk sample r CRS (Mode II) h = Enc0( 1 ) w = Encα( 0 ) W0 = Encβ( 0 ) W1 = wskW x

0 = Encxβ+α·sk( 0 )

v = wr = Encrα( 0 ) V0 = haW −r = Enc−rβ( a ) V1 = hbW r

1 = Encrxβ+rα·sk(

b ) vskV x

0 V1 = Enc0( ax +b )

“Strong” UC-security requires a machenism to detect malicious sender

slide-106
SLIDE 106

Our Results

◮ (!∃ IT rNISC/rOT) There is no information-theoretical reusable NISC protocol in rOT-hybrid model. ◮ (IT rNISC/rOLE for arithmetic NC1) Information-theoretical UC-secure reusable NISC protocol for any arithmetic NC1 circuit

  • r arithmetic branching program in rOLE-hybrid model.

◮ (IT rNIZK/rOLE) Information-theoretical UC-secure reusable NIZK protocol in rOLE-hybrid model; O(1) calls per gate. ◮ Previous two + Garbled circuit → (rNISC/rOLE) UC-secure reusable NISC for general circuits; IT secure against sender; poly(λ) calls per gate. ◮ (rOLE protocol from Paillier) UC-secure reusable 2-message OLE protocol in CRS model; one-side IT secure; c.c. O(1) group elements per call.

slide-107
SLIDE 107

Our Results

◮ rNISC in CRS model assuming the security of Paillier encryption. ◮ rNIZK in CRS model assuming the security of Paillier encryption. c.c. O(1) group elements per gate. ◮ Statistical designated-verifier NIZK argument for NP in CRS model assuming Paillier. ◮ Push cryptograph to offline phase. In offline phase: prepare random ((a,b),(x,ax +b)); In online phase: consume the prepared randomness.

slide-108
SLIDE 108

Our Results

◮ rNISC in CRS model assuming the security of Paillier encryption. ◮ rNIZK in CRS model assuming the security of Paillier encryption. c.c. O(1) group elements per gate. ◮ Statistical designated-verifier NIZK argument for NP in CRS model assuming Paillier. ◮ Push cryptograph to offline phase. In offline phase: prepare random ((a,b),(x,ax +b)); In online phase: consume the prepared randomness.

slide-109
SLIDE 109

Our Results

◮ rNISC in CRS model assuming the security of Paillier encryption. ◮ rNIZK in CRS model assuming the security of Paillier encryption. c.c. O(1) group elements per gate. ◮ Statistical designated-verifier NIZK argument for NP in CRS model assuming Paillier. ◮ Push cryptograph to offline phase. In offline phase: prepare random ((a,b),(x,ax +b)); In online phase: consume the prepared randomness.