Robust Secret Sharing Schemes Against Local Adversaries
Allison Bishop Lewko Valerio Pastro
Columbia University
April 2, 2015
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 1 / 22
Robust Secret Sharing Schemes Against Local Adversaries Allison - - PowerPoint PPT Presentation
Robust Secret Sharing Schemes Against Local Adversaries Allison Bishop Lewko Valerio Pastro Columbia University April 2, 2015 Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 1 / 22 Secret Sharing (Informal) (Share , Rec) pair of
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 1 / 22
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 2 / 22
1 pick uniform a1, . . . , at ∈ F 2 define polynomial f (X) := s + t
3 compute si ← f (xi) 4 output (s1, . . . , sn)
1 Lagrange interpolation to recover f (X) 2 output f (0) Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 3 / 22
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 4 / 22
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 5 / 22
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 6 / 22
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 7 / 22
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 8 / 22
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 9 / 22
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 10 / 22
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 10 / 22
1Conceptually simpler; thanks to Daniel Wichs for fruitful discussions. Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 11 / 22
1 sample MAC key z ∈ X 2 (s1, . . . , sn) ← Shamir.Sharet(s) 3 (z1, . . . , zn) ← Shamir.Share1(z) 4 ti ← MACz(si) 5 output Si = (si, zi, ti) to Pi
1 z ← RS.Rec1(z1, . . . , zn) 2 set i ∈ G if ti = MACz(si) 3 s ← Shamir.Rect(sG) Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 12 / 22
1 sample MAC key z ∈ X 2 (s1, . . . , sn) ← Shamir.Sharet(s) 3 (z1, . . . , zn) ← Shamir.Share1(z) 4 ti ← MACz(si) 5 output Si = (si, zi, ti) to Pi
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 13 / 22
1 z ← RS.Rec1(z1, . . . , zn) 2 set i ∈ G if ti = MACz(si) 3 s ← Shamir.Rect(sG)
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 14 / 22
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 15 / 22
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 15 / 22
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 15 / 22
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 15 / 22
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 15 / 22
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 16 / 22
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 16 / 22
1 define an oblivious attack 2 link success of attack with share size Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 16 / 22
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 17 / 22
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 17 / 22
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 18 / 22
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 18 / 22
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 18 / 22
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 19 / 22
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 19 / 22
Share( s, r){1,...,t} = Share(sL, rL){1,...,t} Share(sL, rL)t+1 = Share(sR , rR )t+1 Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 19 / 22
Share( s, r){1,...,t} = Share(sL, rL){1,...,t} Share(sL, rL)t+1 = Share(sR , rR )t+1
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 19 / 22
Share( s, r){1,...,t} = Share(sL, rL){1,...,t} Share(sL, rL)t+1 = Share(sR , rR )t+1 Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 20 / 22
Share( s, r){1,...,t} = Share(sL, rL){1,...,t} Share(sL, rL)t+1 = Share(sR , rR )t+1 Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 20 / 22
s, r,sR,r R)[∃(sL, r L) | (
L
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 21 / 22
s, r,sR,r R)[∃(sL, r L) | (
L
L
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 21 / 22
s, r,sR,r R)[∃(sL, r L) | (
L
L
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 21 / 22
s, r,sR,r R)[∃(sL, r L) | (
L
L
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 21 / 22
s, r,sR,r R)[∃(sL, r L) | (
L
L
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 21 / 22
s, r,sR,r R)[∃(sL, r L) | (
L
L
RSSS & Loc Advs April 2, 2015 21 / 22
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 22 / 22
◮ info theoretic MPC: circumvent lower bounds? ◮ general MPC: more eff/practical protocols?
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 22 / 22
◮ info theoretic MPC: circumvent lower bounds? ◮ general MPC: more eff/practical protocols?
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 22 / 22
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 22 / 22
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 22 / 22
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 22 / 22
Lewko, Pastro (Columbia) RSSS & Loc Advs April 2, 2015 22 / 22