Robustly Reusable Fuzzy Extractor from Standard Assumptions Yunhua - - PowerPoint PPT Presentation
Robustly Reusable Fuzzy Extractor from Standard Assumptions Yunhua - - PowerPoint PPT Presentation
Robustly Reusable Fuzzy Extractor from Standard Assumptions Yunhua Wen and Shengli Liu Shanghai Jiao Tong University Problem Randomness is crucial in cryptography (e.g. sk). However, uniformly distributed and accurately reproducible
Problem
- Randomness is crucial in cryptography (e.g. sk).
- However, uniformly distributed and accurately reproducible string is rare in
practice.
- There are many imperfect random sources, e.g.
Physically Unclonable Functions (PUFs) Biometric Information
Problem
- Randomness is crucial in cryptography (e.g. sk).
- However, uniformly distributed and accurately reproducible string is rare in
practice.
- There are many imperfect random sources, e.g.
Physically Unclonable Functions (PUFs) Biometric Information
Problem: How to use such imperfect random sources in cryptography?
Fuzzy Extractor
- Gen(w)
- Input: a weak random secret w.
- Output: the extracted key R and a public helper string P
.
- Rep(w’, P)
- Input: a noisy version w’ and the public helper string P
.
- Output: the extracted key R’.
Gen
W R P
Rep
W’ R’ P
Fuzzy Extractor
- Gen(w)
- Input: a weak random secret w.
- Output: the extracted key R and a public helper string P
.
- Rep(w’, P)
- Input: a noisy version w’ and the public helper string P
.
- Output: the extracted key R’.
Gen
W R P
Rep
W’ R’ P
Correctness: If w’ is close enough to w, R’=R. Security: R is pseudorandom given P .
Applications
Gen
R P
Enc
m C
Rep
P R
Dec
C m
Users do not need to store the secret key R. Application in Encryption and Decryption:
Robust Fuzzy Extractor
Gen
R P
Enc
m C
Rep
P’ R’
Dec
C m’
The user may get a wrong key R’ without notifications.
Robust Fuzzy Extractor
Gen
R P
Enc
m C
Rep
P’
Security:If P is modified, then Rep will output .
Failure
Reusable Fuzzy Extractor
- Biometric is unique and cannot be changed or created.
- The security of multi-extraction from the same noisy source is not
guaranteed by fuzzy extractor.
. . .
sk1
<latexit sha1_base64="JgBloVbAcfdqwB87xrJ6F5wSc=">ACx3icjVHLSsNAFD2Nr1pfVZdugkVwVRIRdFl0o7sKthVqKcl02obmxWRSLMWFP+BW/0z8A/0L74xTUIvohCRnzr3nzNx7/TQMuk4rwVrYXFpeaW4Wlpb39jcKm/vNLMkF4w3WBIm4sb3Mh4GMW/IQIb8JhXci/yQt/zRuYq3xlxkQRJfy0nKO5E3iIN+wDypqGzUdbvlilN19LngWtABWbVk/ILbtFDAoYcEThiSMIhPGT0tOHCQUpcB1PiBKFAxznuUSJtTlmcMjxiR/Qd0K5t2Jj2yjPTakanhPQKUto4IE1CeYKwOs3W8Vw7K/Y376n2VHeb0N83XhGxEkNi/9LNMv+rU7VI9HGqawioplQzqjpmXHLdFXVz+0tVkhxS4hTuUVwQZlo567OtNZmuXfXW0/E3nalYtWcmN8e7uiUN2P05znQPKq6TtW9Oq7Uzsyoi9jDPg5pnieo4QJ1NMh7iEc84dm6tBJrbN19ploFo9nFt2U9fAnXZCR</latexit><latexit sha1_base64="JgBloVbAcfdqwB87xrJ6F5wSc=">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</latexit><latexit sha1_base64="JgBloVbAcfdqwB87xrJ6F5wSc=">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</latexit><latexit sha1_base64="JgBloVbAcfdqwB87xrJ6F5wSc=">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</latexit>sk2
<latexit sha1_base64="6l+5XTJqwS4y0umxge8kwfB1dmU=">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</latexit><latexit sha1_base64="6l+5XTJqwS4y0umxge8kwfB1dmU=">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</latexit><latexit sha1_base64="6l+5XTJqwS4y0umxge8kwfB1dmU=">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</latexit><latexit sha1_base64="6l+5XTJqwS4y0umxge8kwfB1dmU=">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</latexit>Reusable Fuzzy Extractor
Perturbations
Gen Gen Gen
. . . . . .
Chosen by Adversary
Reusable Fuzzy Extractor
Perturbations
Gen Gen Gen
. . . . . .
Chosen by Adversary Rj is pseudorandom even given (P1, R1, …,Pj, …,Pn, Rn)
Related Works
FE schemes Robustness? Reusability?
[DRS04], [FMR13] [Boyen04], [ABCG16], [CFPRS16], [ACEK17], [WL18], [WLH18] [BDKOS05], [DKRS06], [KR08], [CDFPW08]
No fuzzy extractor considers robustness and reusability simultaneously.
Our Contribution
- We formally defined robustly reusable fuzzy extractor(rrFE).
- We constructed the first rrFE based on standard assumptions.
Robustly Reusable Fuzzy Extractor
Perturbations
Gen Gen Gen
. . . . . .
Rj is pseudorandom even given (P1, R1, …,Pj, …,Pn, Rn) Chosen by Adversary
Robustly Reusable Fuzzy Extractor
Perturbations
Gen Gen Gen
. . . . . .
Rj is pseudorandom even given (P1, R1, …,Pj, …,Pn, Rn) Chosen by Adversary It is hard for adversary to forge Pj’, st., Rep does not
- utput bot, even if it gets (P1,
R1, …,Pj, R j,…,Pn, Rn).
Building Blocks
- Homomorphic Secure Sketch (SS)
- Homomorphic Extractor (Ext)
- Symmetric Key Encapsulation Mechanism (SKEM)
- Homomorphic Lossy Algebraic Filter (LAF)
Building Block-Secure Sketch
- SS.Gen(w)
- Input: a weak random secret w.
- Output: a sketch s.
- SS.Rec(w’, s)
- Input: a noisy version w’ and the sketch s.
- Output: w.
SS.Gen
W S
SS.Rec
W’ W S
- Correctness: For w’ close to w, w can be recovered from s.
- Privacy: s does not leak too much information of w.
Building Block-Secure Sketch
- SS.Gen(w)
- Input: a weak random secret w.
- Output: a sketch s.
- SS.Rec(w’, s)
- Input: a noisy version w’ and the sketch s.
- Output: w.
SS.Gen
W S
SS.Rec
W’ W S
Homomorphic secure sketch: SS.Gen(w+w’) = SS.Gen(w) + SS.Gen(w’).
- Correctness: For w’ close to w, w can be recovered from s.
- Privacy: s does not leak too much information of w.
Building Block—Extractor
Extractor Input: a weak secret w and a uniformly random seed i. Output: extracted key R = Ext(w; i).
Ext
W R i
Security: R is uniformly random, even conditioned on the seed i. (Ext(W; i), i) ≈ (Uniform, i).
Building Block—Extractor
Extractor Input: a weak secret w and a uniformly random seed i. Output: extracted key R = Ext(w; i).
Ext
W R i
Homomorphic extractor: Ext(w+w’, i) =Ext(w; i) + Ext(w’; i). Security: R is uniformly random, even conditioned on the seed i. (Ext(W; i), i) ≈ (Uniform, i).
Building Block—SKEM
Symmetric Key Encapsulation Mechanism is similar to traditional KEM.
- SKEM.Enc(pp, sk) (c, k).
- SKEM.Dec(c, sk)=k.
Key-shift
. . . . . .
ki is pseudorandom even given (c1, k1, …,cj, …,cn, kn)
sk
SKEM
sk1 skj skn
SKEM SKEM
(c1, k1) (cj, kj) (cn, kn)
Key-Shift Security
Building Block—LAF
tag=(t, t’)
Lossy Algebraic Filter (LAF)
X Y Y X
F(tag,X) F(tag,X)
Injective Lossy
F-1(Y) F-1(Y)
Building Block—LAF
tag=(t, t’)
Lossy Algebraic Filter (LAF)
X Y Y X
F(tag,X) F(tag,X)
Injective Lossy
F-1(Y) F-1(Y)
Building Block—LAF
tag=(t, t’)
Lossy Algebraic Filter (LAF)
X Y Y X
F(tag,X) F(tag,X)
Injective Lossy
F-1(Y) F-1(Y)
- Evasiveness: It is hard to find a non-injective tag without Ftd.
- Lossiness: If the tag is lossy, the function value is only depend on .
Building Block—LAF
Lossy Algebraic Filter (LAF)
Homomorphic LAF:
Sketch-and-Extract Paradigm
SS.Gen
S
Ext
W R i
Information reconciliation Privacy amplification
P R
Sketch-and-Extract Paradigm
SS.Gen
S
Ext
W R i
Information reconciliation Privacy amplification
The “sketch-and-extract” construction is a fuzzy extractor [DRS04].
P R
Sketch-and-Extract Paradigm
SS.Gen
S
Ext
W R i
Information reconciliation Privacy amplification
The “sketch-and-extract” construction is a fuzzy extractor [DRS04]. Not reusable: Same w, same R. Not robust: No authentication
P R
How to Achieve Reusability
SS.Gen
S
Ext
W R i
SKEM
K C
P
How to Achieve Reusability
SS.Gen
S
Ext
W R i
SKEM
K C
P
Homomorphic properties:
The ks-security of SKEM guarantees the privacy of k.
How to Achieve Robustness
SS.Gen
S
Ext
W sk i
SKEM
K C
P LAF
W
t y
R
For authentication
Seed i of Ext, Fpk of LAF and pp of SKEM are common reference string, which can be stored publicly, but can not be modified.
Reusability & Robustness
All tags are changed into lossy tags.
Reusability & Robustness
All tags are changed into lossy tags.
Enough entropy is left for Ext to extract a key and for LAF to authenticate.
Instantiation
- Homomorphic Ext and SS have information theoretical instantiations.
- Homomorphic LAF can be constructed by the DLIN assumption.
- Key-shift secure SKEM can be constructed by the DDH assumption.
Our rrFE is based on standard assumptions.
Summary
- Our contribution
- We constructed the first robustly reusable fuzzy extractor from standard
assumption.
- Open problem
- Robustly reusable FE for arbitrary correlated inputs.