Securing Secret Sharing Against Leakage and Tampering Ashutosh - - PowerPoint PPT Presentation
Securing Secret Sharing Against Leakage and Tampering Ashutosh - - PowerPoint PPT Presentation
Securing Secret Sharing Against Leakage and Tampering Ashutosh Kumar Based on joint works with Vipul Goyal, Raghu Meka, and Amit Sahai Secret Sharing secret s n s 1 s i Correctness: Any out of parties can
Secret Sharing
Correctness: Any out of parties can reconstruct the secret
t n
Secrecy: Secret remains hidden given less than shares
t
secret
s1 sn ๐ณ๐๐ป๐๐ฟ si โฆ โฆ
[Blakley79] and [Shamir79]
Shamirโs -out-of- Scheme
2 n
secret
Shamirโs -out-of- Scheme
2 n
secret
Shamirโs -out-of- Scheme
2 n
s1 s2 s3
secret
s4
Shamirโs -out-of- Scheme
2 n
s1 s2 s3
secret
s4
Correctness: Any points determine the line
2
Shamirโs -out-of- Scheme
2 n
s1 s2 s3
secret
s4
Correctness: Any points determine the line
2
Secrecy: point does not
1
What if everyone is slightly โcorruptโ?
Typically modeled as side-channel attacks
What if everyone is slightly โcorruptโ?
Passive Adversary: Leakage-Resilience Typically modeled as side-channel attacks
What if everyone is slightly โcorruptโ?
Passive Adversary: Leakage-Resilience Tampering Adversary: Non-Malleability Typically modeled as side-channel attacks
What if everyone is slightly โcorruptโ?
Passive Adversary: Leakage-Resilience Tampering Adversary: Non-Malleability Typically modeled as side-channel attacks Long history in cryptography
What if everyone is slightly โcorruptโ?
Passive Adversary: Leakage-Resilience Tampering Adversary: Non-Malleability Our Goal: Protect secret sharing from such side channel attacks. Typically modeled as side-channel attacks Long history in cryptography
Agenda
Leakage-Resilience Non-Malleability
Leakage?
s1 sn ๐ณ๐๐ป๐๐๐๐ณ๐๐ป๐๐ฟ si โฆ โฆ
secret
Leakage?
Just give me one bit from each share.
s1 sn ๐ณ๐๐ป๐๐๐๐ณ๐๐ป๐๐ฟ si โฆ โฆ
secret
Leakage?
Just give me one bit from each share.
s1 sn ๐ณ๐๐ป๐๐๐๐ณ๐๐ป๐๐ฟ c1 cn si ci โฆ โฆ โฆ โฆ
secret
Leakage?
Just give me one bit from each share. Shamirโs scheme is insecure for some parameter regime! โจ [Guruswami-Wootters 16]
s1 sn ๐ณ๐๐ป๐๐๐๐ณ๐๐ป๐๐ฟ c1 cn si ci โฆ โฆ โฆ โฆ
secret
Leakage-Resilient Secret Sharing
Dziembowski and Pietrzak 07, Goyal-K 18 Benhamouda, Degwekar, Ishai, and Rabin 18
Leakage-Resilience: Secret statistically hidden even โจ given leakage from each share.
ci โฆ โฆ f1(s1) fi(si) fn(sn) s1 sn c1 cn si โฆ โฆ
secret
Limitations of Model
Except for [Davi, Dziembowski, and Venturi 10]
n = 2
- Individual Leakageโจ
- Non-adaptive Leakageโจ
ci โฆ โฆ f1(s1) fi(si) fn(sn) s1 sn c1 cn si โฆ โฆ
secret
Modeling Leakage
Adversary runs a multi-party communication protocol โจ and โlearnsโ transcript
- Constraint 1: Total leakage/communicationโจ
- Constraint 2: Type of protocols allowed
[K,Meka,Sahai 19]
Bounded Collusion Protocols (BCP)
s1 sn s2
โฆ
s3
- party Collusion Protocol (CP): โจ
Each round parties collude and write a bit on the public board
p p
- = collusion bound
- = leakage bound
p ฮผ
Bounded Collusion Protocols (BCP)
s1 sn s2
โฆ
b1 โ f1(s1, s2) s3
- party Collusion Protocol (CP): โจ
Each round parties collude and write a bit on the public board
p p
Round 1: b1
- = collusion bound
- = leakage bound
p ฮผ
Bounded Collusion Protocols (BCP)
s1 sn s2
โฆ
s3
- party Collusion Protocol (CP): โจ
Each round parties collude and write a bit on the public board
p p
Round 1: b1
- = collusion bound
- = leakage bound
p ฮผ
Bounded Collusion Protocols (BCP)
s1 sn s2
โฆ
s3 b2 โ f2(s2, s3)
- party Collusion Protocol (CP): โจ
Each round parties collude and write a bit on the public board
p p
Round 1: b1 Round 2: b2
- = collusion bound
- = leakage bound
p ฮผ
Bounded Collusion Protocols (BCP)
s1 sn s2
โฆ
s3
- party Collusion Protocol (CP): โจ
Each round parties collude and write a bit on the public board
p p
Round 1: b1 Round 2: b2
- = collusion bound
- = leakage bound
p ฮผ
Bounded Collusion Protocols (BCP)
s1 sn s2
โฆ
s3
- party Collusion Protocol (CP): โจ
Each round parties collude and write a bit on the public board
p p
Round 1: b1 Round 2: b2 Round :
โฎ ฮผ bฮผ
- = collusion bound
- = leakage bound
p ฮผ
Bounded Collusion Protocols (BCP)
s1 sn s2
โฆ
s3
- party Collusion Protocol (CP): โจ
Each round parties collude and write a bit on the public board
p p
- Joint leakage
- Overlapping leakage
- Adaptive
Round 1: b1 Round 2: b2 Round :
โฎ ฮผ bฮผ
- = collusion bound
- = leakage bound
p ฮผ
BCPs in Communication Complexity
- party CP: Number-in-hand (NIH)
1
BCPs in Communication Complexity
- party CP: Number-on-forehead (NOF)
[Chandra, Furst, Lipton 83] [Babai, Nisan, Szegedy 89]
(n โ 1)
- party CP: Number-in-hand (NIH)
1
BCPs in Communication Complexity
- party CP: Number-on-forehead (NOF)
[Chandra, Furst, Lipton 83] [Babai, Nisan, Szegedy 89]
(n โ 1)
- party CP: Number-in-hand (NIH)
1
- party CP interpolates between the two
p
Leakage-Resilience against BCPs
s1 sn s2 โฆ snโ1
Round 1: Round :
b1 โฎ ฮผ bฮผ
Secret Sharing: โจ Any can recover secret No can recover
t t โ 1
Leakage-Resilience: Secret statistically hiddenโจ given -party CP transcript
p
secret
- party CP
p
- LRSS:
(p, t, n)
Our Result for LRSS
Efficient
- LRSS for
(p, t, n) p = O(log n)
[K,Meka,Sahai 19]
Our Result for LRSS
Efficient
- LRSS for
(p, t, n) p = O(log n)
Theorem: Compile any scheme into leakage-resilient one โจ against -party CP .โจ
p
New share = Old share +2p โ log n โ (ฮผ + log(1/ฯต))
[K,Meka,Sahai 19]
Why BCPs?
Worst possible adversary: p = t โ 1
Why BCPs?
Worst possible adversary: p = t โ 1 Useful Primitive:
- Allows for composition.
- Ex: Disjoint leakage
- for non-malleability
p = 2
Logarithmic Barrier
Observation: Efficient
- LRSS for
bits of โจ non-adaptive leakage and share size will imply โจ reconstruction fn.
(p, p + 1,n) p2 2po(1) โ ๐ก๐ฃ๐ฃ0
Leakage-resilience implies communication lower bounds.
[Williams 14]: [Murray, Williams 18]:
๐ฎ๐ฅ๐ธ๐ฐ โ ๐ก๐ฃ๐ฃ0 ๐ฎ๐ฑ๐ฐ โ ๐ก๐ฃ๐ฃ0
Concurrent and Independent Work
[Badrinarayanan and Srinivasan 19]
- out-of-n LRSS
Positive rate NMSS Multi-Tampering NMSS [Aggarwal et al. 19] Compiler for LRSS Multi-Tampering NMSS Threshold signatures [Srinivasan and Vasudevan 19] Rate efficient LRSS Rate efficient NMSS An application to MPC
O(1)
Their Focus: โจ Good rate for individual โจ and non-adaptive leakage.
Concurrent and Independent Work
[Badrinarayanan and Srinivasan 19]
- out-of-n LRSS
Positive rate NMSS Multi-Tampering NMSS [Aggarwal et al. 19] Compiler for LRSS Multi-Tampering NMSS Threshold signatures [Srinivasan and Vasudevan 19] Rate efficient LRSS Rate efficient NMSS An application to MPC
O(1)
Our Focus: Joint and adaptive leakage. Rate for constant .
1/log n p
Their Focus: โจ Good rate for individual โจ and non-adaptive leakage.
Our Construction for LRSS
Efficient
- LRSS for
(p, t, n) p = O(log n)
Simple construction using NOF lower bounds
Outline
- Phase 1:
- LRSS
(p, p + 1,p + 1)
NOF lower bounds
โ
Outline
- Phase 1:
- LRSS
(p, p + 1,p + 1)
- Phase 2:
- LRSS
- LRSS
(p, p + 1,p + 1) โ (p, p + 1,n)
Increase # of parties
โ
NOF lower bounds
โ
Outline
- Phase 1:
- LRSS
(p, p + 1,p + 1)
- Phase 2:
- LRSS
- LRSS
(p, p + 1,p + 1) โ (p, p + 1,n)
- Phase 3:
- LRSS
- LRSS
(p, p + 1,n) โ (p, t, n)
Increase # of parties
โ
Increase threshold
โ
NOF lower bounds
โ
Phase 1:
- LRSS
(p, p + 1,p + 1)
: Total leakage allowedโจ : error in leakage-resilience
ฮผ ฯต
Main ingredient: โจ
- โhardโ for โจ
NOF protocols with communication.
๐ฆ : ({0,1}r)p+1 โ {0,1} ฯต ฮผ
[Babai, Nisan, and Szegedy 89]: โจ Explicit with
๐ฆ r = 2p(ฮผ + log(1/ฯต))
Phase 1:
- LRSS
(p, p + 1,p + 1)
Phase 1:
- LRSS
(p, p + 1,p + 1)
๐ณ๐๐ป๐๐ฟ(m)
Phase 1:
- LRSS
(p, p + 1,p + 1)
- ๐ฒ๐ป๐๐พ๐๐ a1, โฆ, ap+1 โ {0,1}r
๐ณ๐๐ป๐๐ฟ(m)
Phase 1:
- LRSS
(p, p + 1,p + 1)
- ๐ฒ๐ป๐๐พ๐๐ a1, โฆ, ap+1 โ {0,1}r
- a โ ๐ฆ(a1, โฆ, ap+1)
๐ณ๐๐ป๐๐ฟ(m)
Phase 1:
- LRSS
(p, p + 1,p + 1)
- ๐ฒ๐ป๐๐พ๐๐ a1, โฆ, ap+1 โ {0,1}r
- a โ ๐ฆ(a1, โฆ, ap+1)
- b1, โฆ, bp+1 โ ๐ธ๐ฏ๐ฒp+1
p+1(m โ a)
๐ณ๐๐ป๐๐ฟ(m)
Phase 1:
- LRSS
(p, p + 1,p + 1)
- ๐ฒ๐ป๐๐พ๐๐ a1, โฆ, ap+1 โ {0,1}r
- a โ ๐ฆ(a1, โฆ, ap+1)
- b1, โฆ, bp+1 โ ๐ธ๐ฏ๐ฒp+1
p+1(m โ a)
- sharei โ ai, bi
๐ณ๐๐ป๐๐ฟ(m)
Phase 1:
- LRSS
(p, p + 1,p + 1)
- ๐ฒ๐ป๐๐พ๐๐ a1, โฆ, ap+1 โ {0,1}r
- a โ ๐ฆ(a1, โฆ, ap+1)
- b1, โฆ, bp+1 โ ๐ธ๐ฏ๐ฒp+1
p+1(m โ a)
- sharei โ ai, bi
๐ณ๐๐ป๐๐ฟ(m) ๐ฒ๐ฟ๐ฝ(m)
Phase 1:
- LRSS
(p, p + 1,p + 1)
- ๐ฒ๐ป๐๐พ๐๐ a1, โฆ, ap+1 โ {0,1}r
- a โ ๐ฆ(a1, โฆ, ap+1)
- b1, โฆ, bp+1 โ ๐ธ๐ฏ๐ฒp+1
p+1(m โ a)
- sharei โ ai, bi
๐ณ๐๐ป๐๐ฟ(m)
- a โ ๐ฆ(a1, โฆ, ap+1)
๐ฒ๐ฟ๐ฝ(m)
Phase 1:
- LRSS
(p, p + 1,p + 1)
- ๐ฒ๐ป๐๐พ๐๐ a1, โฆ, ap+1 โ {0,1}r
- a โ ๐ฆ(a1, โฆ, ap+1)
- b1, โฆ, bp+1 โ ๐ธ๐ฏ๐ฒp+1
p+1(m โ a)
- sharei โ ai, bi
๐ณ๐๐ป๐๐ฟ(m)
- a โ ๐ฆ(a1, โฆ, ap+1)
- m โ a โ b1 โ โฆ โ bp+1
๐ฒ๐ฟ๐ฝ(m)
Phase 1:
- LRSS
(p, p + 1,p + 1)
Leakage-Resilience: โจ Not resilient NOF protocol for
โ ๐ฆ
- ๐ฒ๐ป๐๐พ๐๐ a1, โฆ, ap+1 โ {0,1}r
a โ ๐ฆ(a1, โฆ, ap+1) b1, โฆ, bp+1 โ ๐ธ๐ฏ๐ฒp+1
p+1(m โ a)
sharei โ ai, bi
๐ณ๐๐ป๐๐ฟ(m)
- โhardโ for โจ
NOF protocols with communication.
๐ฆ : ({0,1}r)p+1 โ {0,1} ฯต ฮผ
Phase 2: Lifting โจ to
(p, p + 1,p + 1) (p, p + 1,n)
Naive: For every subset of parties, create an instance of scheme
p + 1 (p, p + 1,p + 1)
Share length: โจ Inefficient for
๐ฏ๐๐พ โ np p = ฯ(1)
Scatter and Reuse Shares
independent instances of
- LRSS
M (p, p + 1,p + 1)
s1
1, โฆ, s1 p+1
s2
1, โฆ, s2 p+1
sM
1 , โฆ, sM p+1
โฎ parties
n
3 2 1 1 p p + 1 p 1 2
โ
Scattering Matrix [Kurosawa and Stinson 90s]
instances
M
Scatter and Reuse Shares
independent instances of
- LRSS
M (p, p + 1,p + 1)
s1
1, โฆ, s1 p+1
s2
1, โฆ, s2 p+1
sM
1 , โฆ, sM p+1
โฎ parties
n
3 2 1 1 p p + 1 p 1 2
โ
Scattering Matrix [Kurosawa and Stinson 90s] s1
3
s1
2
s1
1
s2
1
s2
p
s2
p+1
sM
p
sM
1
sM
2
โ
Scattered Shares
n M
Scatter and Reuse Shares
independent instances of
- LRSS
M (p, p + 1,p + 1)
s1
1, โฆ, s1 p+1
s2
1, โฆ, s2 p+1
sM
1 , โฆ, sM p+1
โฎ parties
n
3 2 1 1 p p + 1 p 1 2
โ
Scattering Matrix [Kurosawa and Stinson 90s] s1
3
s1
2
s1
1
s2
1
s2
p
s2
p+1
sM
p
sM
1
sM
2
โ
Scattered Shares
n
Final share of party i โ ๐ฝ๐๐๐๐๐i
M
M n
3 2 1 1 p p + 1 p 1 2
Any parties โจ can reconstruct
p + 1 โ
Scatter and Reuse Shares
columns row โจ containing
โ p + 1 โ {1,โฆ, p + 1}
What property of scattering matrix?
columns row โจ containing
โ p + 1 โ {1,โฆ, p + 1}
Perfect hash functions:
M = 2p log n
[Fredman, Komlos, and Szemeredi 84] [Alon, Yuster and Zwick 95] [Naor, Schulman and Srinivasan 95]
โ
How to construct such a matrix?
Scatter and Reuse Shares
M n
3 2 1 1 p p + 1 p 1 2
Phase 2: Lifting โจ to
(p, p + 1,p + 1) (p, p + 1,n)
- Share length:
โจ โจ
- Secrecy: Immediateโจ
โจ
- Leakage-resilience: Hybrid argument
๐ฏ๐๐พ โ (2p โ log n)
Disjoint subsets?
Handling overlapping collusions in base schemeโจ is crucial for scattering. Weaker adversary:
- Partition into disjoint subsets of size
- Non-adaptively leak from each subset
p
Donโt know how to handle without NOF .
p = ฯ(1)
Phase 3: Lifting โจ to
(p, p + 1,n) (p, t, n)
- Secrecy: From
โจ
- Leakage-resilience: From
๐ณ๐๐ป๐๐๐t
n
๐ฌ๐ฒ๐ณ๐๐ป๐๐ฟp+1
n
- a, b โ ๐ธ๐ฏ๐ฒ๐ฅ
๐ฅ(m)
a1, โฆ, an โ ๐ณ๐๐ป๐๐๐t
n(a)
b1, โฆ, bn โ ๐ฌ๐ฒ๐ณ๐๐ป๐๐ฟp+1
n
(b) sharei โ ai, bi
Phase 3: Lifting โจ to
(p, p + 1,n) (p, t, n)
- Secrecy: From
โจ
- Leakage-resilience: From
๐ณ๐๐ป๐๐๐t
n
๐ฌ๐ฒ๐ณ๐๐ป๐๐ฟp+1
n
- a, b โ ๐ธ๐ฏ๐ฒ๐ฅ
๐ฅ(m)
a1, โฆ, an โ ๐ณ๐๐ป๐๐๐t
n(a)
b1, โฆ, bn โ ๐ฌ๐ฒ๐ณ๐๐ป๐๐ฟp+1
n
(b) sharei โ ai, bi
โ
Agenda
Leakage-Resilience Non-Malleability
s1 s2 s3
What if a party tampers?
s4
secret
What if a party tampers?
s1 s2 s3 s4
What if a party tampers?
secret
s1 s2 s3 s4
Error Correction: Only 1 set of collinear triples
What if a party tampers?
secret
s1 s2 s3 s4
Error Correction: Only 1 set of collinear triples How about 3 parties?
What if a party tampers?
s1 s2 s3
secret
s1 s2 s3
What if a party tampers?
s1 s2 s3
What if a party tampers?
s1 s2 s3
Cannot correct an error with only 3 parties.
What if a party tampers?
s1 s2 s3
Cannot correct an error with only 3 parties.
What if a party tampers?
Can achieve weaker guarantee ofโจ Error Detection: Non-collinear points
What if everyone tampers?
s1 s2 s3
secret
What if everyone tampers?
s1 s2 s3
Overwritesโจ with 0
What if everyone tampers?
s1 s2 s3
Overwritesโจ with 0
What if everyone tampers?
s1 s2 s3
Cannot even detect errors!
Overwritesโจ with 0
What if everyone tampers?
s1 s2 s3
Cannot even detect errors!
Overwritesโจ with 0
But notice: Original secret was โdestroyedโ.
Modeling โDestructionโ
s1 sn s2 โฆ ห s1 ห sn ห s2 โฆ
Any t
ห m
Inspired from Non-Malleable Codes:
[Dziembowski, Pietrzak, Wichs 10]
Modeling โDestructionโ
s1 sn s2 โฆ ห s1 ห sn ห s2 โฆ
Any t
ห m s1 sn s2 โฆ 1 ห s1 ห sn ห s2 โฆ
Any t
ห m
โ
Inspired from Non-Malleable Codes:
[Dziembowski, Pietrzak, Wichs 10]
Modeling โDestructionโ
s1 sn s2 โฆ ห s1 ห sn ห s2 โฆ
Any t
ห m s1 sn s2 โฆ 1 ห s1 ห sn ห s2 โฆ
Any t
ห m
โ โฯต
Inspired from Non-Malleable Codes:
[Dziembowski, Pietrzak, Wichs 10]
Non-Malleable Secret Sharing
s1 sn s2 โฆ m ห s1 ห sn ห s2 โฆ
Any t
ห m
NMSS:โจ โจ The distribution of tamperedโจ secret is either identical orโจ statistically independent of the original secret.
[Goyal-K 18]
Non-Malleable Secret Sharing
s1 sn s2 โฆ m ห s1 ห sn ห s2 โฆ
Any t
ห m
NMSS:โจ โจ The distribution of tamperedโจ secret is either identical orโจ statistically independent of the original secret.
[Goyal-K 18]
Intuition: Secret hidden even after learning tampered secret.
Shamirโs scheme is Malleable
s1 s2 s3 ๐๐ฟ๐ฝ๐๐ฟ๐
Shamirโs scheme is Malleable
s1 s2 s3 ๐๐ฟ๐ฝ๐๐ฟ๐ s1 + 1 s2 + 1 s3 + 1
Shamirโs scheme is Malleable
s1 s2 s3 ๐๐ฟ๐ฝ๐๐ฟ๐ s1 + 1 s2 + 1 s3 + 1 ๐๐ฟ๐ฝ๐๐ฟ๐ + 1
Shamirโs scheme is Malleable
s1 s2 s3 ๐๐ฟ๐ฝ๐๐ฟ๐ s1 + 1 s2 + 1 s3 + 1 ๐๐ฟ๐ฝ๐๐ฟ๐ + 1
In fact, all linear schemes are malleable.
Our Results for NMSS
Theorem [Goyal-K 18]: Compile any scheme into โจ non-malleable one against individual tampering.
Our Results for NMSS
Theorem [Goyal-K 18]: Compile any scheme into โจ non-malleable one against individual tampering. Theorem [K, Meka, Sahai 19]: Allow tampering โจ to depend on individual leakage.
Our Results for NMSS
Theorem [Goyal-K 18]: Compile any scheme into โจ non-malleable one against individual tampering.
- out-of- NMSS โจ
studied as NM Codes
2 2 Theorem [K, Meka, Sahai 19]: Allow tampering โจ to depend on individual leakage.
Joint Tampering?
[Goyal-K 18]
Joint Tampering?
[Goyal-K 18]
Theorem: -out-of- scheme that is non-malleableโจ against joint tampering in two subsetsโจ (except equal sized subsets).
t n
Outline for NMSS
- Ingredient 1: -out-of- NMSS
2 2
Non-Malleable Codes
โ
Outline for NMSS
- Ingredient 1: -out-of- NMSS
2 2
- Ingredient 2: A pair of โunfriendlyโ SS schemes
Non-Malleable Codes
โ
Outline for NMSS
- Ingredient 1: -out-of- NMSS
2 2
- Ingredient 2: A pair of โunfriendlyโ SS schemes
โ
Non-Malleable Codes
โ
Outline for NMSS
- Ingredient 1: -out-of- NMSS
2 2
- Ingredient 2: A pair of โunfriendlyโ SS schemes
โ
Our Compiler for NMSS Non-Malleable Codes
โ
l r m ห l ห r ห m
- out-of- NMSS
2 2
l r m ห l ห r ห m
Follows from split-state โจ non-malleable codes
2
- out-of- NMSS
2 2
l r m ห l ห r ห m
Follows from split-state โจ non-malleable codes
2
- out-of- NMSS
2 2
[Dziembowski, Pietrzak, Wichs 10] [Liu, Lysyanskaya 12] [Dziembowski, Kazana, Obremski 13] [Aggarwal, Dodis, Lovett 14] โฆ
- out-of- NMSS?
3 n
๐ณ๐๐ป๐๐ฟ(m)
- out-of- NMSS?
3 n
- l, r โ ๐ฎ๐ญ๐ณ๐๐ป๐๐ฟ2
2(m)
๐ณ๐๐ป๐๐ฟ(m)
- out-of- NMSS?
3 n
l r m
- l, r โ ๐ฎ๐ญ๐ณ๐๐ป๐๐ฟ2
2(m)
- l1, โฆ, ln โ ๐ณ๐๐ป๐๐๐3
n(l)
๐ณ๐๐ป๐๐ฟ(m)
- out-of- NMSS?
3 n
l1 l2 l3
โฆ
l r m
- l, r โ ๐ฎ๐ญ๐ณ๐๐ป๐๐ฟ2
2(m)
- l1, โฆ, ln โ ๐ณ๐๐ป๐๐๐3
n(l)
- r1, โฆ, rn โ ๐ณ๐๐ป๐๐๐3
n(r)
๐ณ๐๐ป๐๐ฟ(m)
- out-of- NMSS?
3 n
l1 l2 l3 r1 r2 r3
โฆ
l r m
- l, r โ ๐ฎ๐ญ๐ณ๐๐ป๐๐ฟ2
2(m)
- l1, โฆ, ln โ ๐ณ๐๐ป๐๐๐3
n(l)
- r1, โฆ, rn โ ๐ณ๐๐ป๐๐๐3
n(r)
- sharei โ li, ri
๐ณ๐๐ป๐๐ฟ(m)
- out-of- NMSS?
3 n
l1 l2 l3 r1 r2 r3
โฆ
l r m
- l, r โ ๐ฎ๐ญ๐ณ๐๐ป๐๐ฟ2
2(m)
- l1, โฆ, ln โ ๐ณ๐๐ป๐๐๐3
n(l)
- r1, โฆ, rn โ ๐ณ๐๐ป๐๐๐3
n(r)
- sharei โ li, ri
๐ณ๐๐ป๐๐ฟ(m)
- out-of- NMSS?
3 n
l1 l2 l3 r1 r2 r3
โฆ
Secrecy: Both and hidden given shares
l r 2
l r m
- l, r โ ๐ฎ๐ญ๐ณ๐๐ป๐๐ฟ2
2(m)
l1, โฆ, ln โ ๐ณ๐๐ป๐๐๐3
n(l)
r1, โฆ, rn โ ๐ณ๐๐ป๐๐๐3
n(r)
sharei โ li, ri
๐ณ๐๐ป๐๐ฟ
l1 l2 l3 r1 r2 r3
l r
โฆ
m
Non-Malleability?
- l, r โ ๐ฎ๐ญ๐ณ๐๐ป๐๐ฟ2
2(m)
l1, โฆ, ln โ ๐ณ๐๐ป๐๐๐3
n(l)
r1, โฆ, rn โ ๐ณ๐๐ป๐๐๐3
n(r)
sharei โ li, ri
๐ณ๐๐ป๐๐ฟ
l1 l2 l3 r1 r2 r3
l r
โฆ
m
Non-Malleability?
ห l1 ห l2 ห l3 ห r1 ห r2 ห r3
โฆ
- l, r โ ๐ฎ๐ญ๐ณ๐๐ป๐๐ฟ2
2(m)
l1, โฆ, ln โ ๐ณ๐๐ป๐๐๐3
n(l)
r1, โฆ, rn โ ๐ณ๐๐ป๐๐๐3
n(r)
sharei โ li, ri
๐ณ๐๐ป๐๐ฟ
l1 l2 l3 r1 r2 r3
l r
โฆ
m
Non-Malleability?
ห l1 ห l2 ห l3 ห r1 ห r2 ห r3
ห l ห r
โฆ
ห m
- l, r โ ๐ฎ๐ญ๐ณ๐๐ป๐๐ฟ2
2(m)
l1, โฆ, ln โ ๐ณ๐๐ป๐๐๐3
n(l)
r1, โฆ, rn โ ๐ณ๐๐ป๐๐๐3
n(r)
sharei โ li, ri
๐ณ๐๐ป๐๐ฟ
l1 l2 l3 r1 r2 r3
l r
โฆ
m
Non-Malleability?
To show: uncorrelated with
ห m m
ห l1 ห l2 ห l3 ห r1 ห r2 ห r3
ห l ห r
โฆ
ห m
- l, r โ ๐ฎ๐ญ๐ณ๐๐ป๐๐ฟ2
2(m)
l1, โฆ, ln โ ๐ณ๐๐ป๐๐๐3
n(l)
r1, โฆ, rn โ ๐ณ๐๐ป๐๐๐3
n(r)
sharei โ li, ri
๐ณ๐๐ป๐๐ฟ
l1 l2 l3 r1 r2 r3
l r
โฆ
m
Non-Malleability?
To show: uncorrelated with
ห m m
ห l1 ห l2 ห l3 ห r1 ห r2 ห r3
ห l ห r
โฆ
ห m Lets rely on ๐ฎ๐ญ๐ณ๐๐ป๐๐ฟ2
2
- l, r โ ๐ฎ๐ญ๐ณ๐๐ป๐๐ฟ2
2(m)
l1, โฆ, ln โ ๐ณ๐๐ป๐๐๐3
n(l)
r1, โฆ, rn โ ๐ณ๐๐ป๐๐๐3
n(r)
sharei โ li, ri
๐ณ๐๐ป๐๐ฟ
l1 l2 l3 r1 r2 r3
l r
โฆ
m
Non-Malleability?
ห l1 ห l2 ห l3 ห r1 ห r2 ห r3
ห l ห r
โฆ
ห m
- l, r โ ๐ฎ๐ญ๐ณ๐๐ป๐๐ฟ2
2(m)
l1, โฆ, ln โ ๐ณ๐๐ป๐๐๐3
n(l)
r1, โฆ, rn โ ๐ณ๐๐ป๐๐๐3
n(r)
sharei โ li, ri
๐ณ๐๐ป๐๐ฟ
l1 l2 l3 r1 r2 r3
l r
โฆ
m
Non-Malleability?
ห l1 ห l2 ห l3 ห r1 ห r2 ห r3
ห l ห r
โฆ
ห m Problem: and are not tampered independently
l r
- l, r โ ๐ฎ๐ญ๐ณ๐๐ป๐๐ฟ2
2(m)
l1, โฆ, ln โ ๐ณ๐๐ป๐๐๐3
n(l)
r1, โฆ, rn โ ๐ณ๐๐ป๐๐๐3
n(r)
sharei โ li, ri
๐ณ๐๐ป๐๐ฟ
l1 l2 l3 r1 r2 r3
l r
โฆ
m
Non-Malleability?
ห l1 ห l2 ห l3 ห r1 ห r2 ห r3
ห l ห r
โฆ
ห m Problem: and are not tampered independently
l r
Root cause: Schemes sharing are are โfriendlyโ
l r
โUnfriendlyโ SS schemes
Idea: Use different thresholds for and
l r
โUnfriendlyโ SS schemes
- l, r โ ๐ฎ๐ญ๐ณ๐๐ป๐๐ฟ2
2(m)
l1, โฆ, ln โ ๐ณ๐๐ป๐๐๐3
n(l)
r1, โฆ, rn โ ๐ณ๐๐ป๐๐๐2
n(r)
sharei โ li, ri
๐ณ๐๐ป๐๐ฟ
Idea: Use different thresholds for and
l r
โUnfriendlyโ SS schemes
- li, ri โ sharei
l โ ๐ฒ๐ฟ๐ฝ3
n(l1, l2, l3)
r โ ๐ฒ๐ฟ๐ฝ2
n(r1, r2)
m โ ๐ฎ๐ญ๐ฒ๐ฟ๐ฝ2
2(l, r)
- l, r โ ๐ฎ๐ญ๐ณ๐๐ป๐๐ฟ2
2(m)
l1, โฆ, ln โ ๐ณ๐๐ป๐๐๐3
n(l)
r1, โฆ, rn โ ๐ณ๐๐ป๐๐๐2
n(r)
sharei โ li, ri
๐ณ๐๐ป๐๐ฟ ๐ฒ๐ฟ๐ฝ
Idea: Use different thresholds for and
l r
โUnfriendlyโ SS schemes
- li, ri โ sharei
l โ ๐ฒ๐ฟ๐ฝ3
n(l1, l2, l3)
r โ ๐ฒ๐ฟ๐ฝ2
n(r1, r2)
m โ ๐ฎ๐ญ๐ฒ๐ฟ๐ฝ2
2(l, r)
- l, r โ ๐ฎ๐ญ๐ณ๐๐ป๐๐ฟ2
2(m)
l1, โฆ, ln โ ๐ณ๐๐ป๐๐๐3
n(l)
r1, โฆ, rn โ ๐ณ๐๐ป๐๐๐2
n(r)
sharei โ li, ri
๐ณ๐๐ป๐๐ฟ ๐ฒ๐ฟ๐ฝ
Secrecy: still hidden
l
Idea: Use different thresholds for and
l r
Non-Malleability?
l1 l2 l3 r1 r2 r3 ห l1 ห l2 ห l3 ห r1 ห r2 ห r3
l r ห l ห r
โฆ โฆ
Non-Malleability?
- fixed given
and
ห r ห r1 ห r2
l1 l2 l3 r1 r2 r3 ห l1 ห l2 ห l3 ห r1 ห r2 ห r3
l r ห l ห r
โฆ โฆ
Non-Malleability?
- fixed given
and
ห r ห r1 ห r2
- can depend on and
l1 l2
l1 l2 l3 r1 r2 r3 ห l1 ห l2 ห l3 ห r1 ห r2 ห r3
l r ห l ห r
โฆ โฆ
Non-Malleability?
- fixed given
and
ห r ห r1 ห r2
- can depend on and
l1 l2
- two shares hides l
l1 l2 l3 r1 r2 r3 ห l1 ห l2 ห l3 ห r1 ห r2 ห r3
l r ห l ห r
โฆ โฆ
Non-Malleability?
- fixed given
and
ห r ห r1 ห r2
- can depend on and
l1 l2
- two shares hides l
- independent of
ห r l
l1 l2 l3 r1 r2 r3 ห l1 ห l2 ห l3 ห r1 ห r2 ห r3
l r ห l ห r
โฆ โฆ
Non-Malleability?
- fixed given
and
ห r ห r1 ห r2
- can depend on and
l1 l2
- two shares hides l
- independent of
ห r l
l1 l2 l3 r1 r2 r3 ห l1 ห l2 ห l3 ห r1 ห r2 ห r3
l r ห l ห r
โฆ โฆ
Non-Malleability?
- fixed given
and
ห r ห r1 ห r2
- can depend on and
l1 l2
- two shares hides l
- independent of
ห r l
l1 l2 l3 r1 r2 r3 ห l1 ห l2 ห l3 ห r1 ห r2 ห r3
l r ห l ห r
โฆ โฆ
Non-Malleability?
- Problem: not independent of
ห l r
- fixed given
and
ห r ห r1 ห r2
- can depend on and
l1 l2
- two shares hides l
- independent of
ห r l
l1 l2 l3 r1 r2 r3 ห l1 ห l2 ห l3 ห r1 ห r2 ห r3
l r ห l ห r
โฆ โฆ
Use Leakage-Resilience
- li, ri โ sharei
l โ ๐ฒ๐ฟ๐ฝ3
n(l1, l2, l3)
r โ ๐ฌ๐ฒ๐ฒ๐ฟ๐ฝ2
n(r1, r2)
m โ ๐ฎ๐ญ๐ฒ๐ฟ๐ฝ2
2(l, r)
- l, r โ ๐ฎ๐ญ๐ณ๐๐ป๐๐ฟ2
2(m)
l1, โฆ, ln โ ๐ณ๐๐ป๐๐๐3
n(l)
r1, โฆ, rn โ ๐ฌ๐ฒ๐ณ๐๐ป๐๐ฟ2
n(r)
sharei โ li, ri
๐ณ๐๐ป๐๐ฟ ๐ฒ๐ฟ๐ฝ
Secrecy: same as before
Non-Malleability?
l1 l2 l3 r1 r2 r3 ห l1 ห l2 ห l3 ห r1 ห r2 ห r3
l r ห l ห r
โฆ โฆ
Non-Malleability?
l1 l2 l3 r1 r2 r3 ห l1 ห l2 ห l3 ห r1 ห r2 ห r3
l r ห l ห r
โฆ โฆ
Idea: Think of as leakage from
ห li ri
Non-Malleability?
- independent of
ห l1, ห l2, ห l3 r
l1 l2 l3 r1 r2 r3 ห l1 ห l2 ห l3 ห r1 ห r2 ห r3
l r ห l ห r
โฆ โฆ
Idea: Think of as leakage from
ห li ri
Non-Malleability?
- independent of
ห l1, ห l2, ห l3 r
- depends on
ห l ห l1, ห l2, ห l3
l1 l2 l3 r1 r2 r3 ห l1 ห l2 ห l3 ห r1 ห r2 ห r3
l r ห l ห r
โฆ โฆ
Idea: Think of as leakage from
ห li ri
Non-Malleability?
- independent of
ห l1, ห l2, ห l3 r
- depends on
ห l ห l1, ห l2, ห l3
- independent of
ห l r
l1 l2 l3 r1 r2 r3 ห l1 ห l2 ห l3 ห r1 ห r2 ห r3
l r ห l ห r
โฆ โฆ
Idea: Think of as leakage from
ห li ri
Non-Malleability?
- independent of
ห l1, ห l2, ห l3 r
- depends on
ห l ห l1, ห l2, ห l3
- independent of
ห l r
- independent of
ห r l
l1 l2 l3 r1 r2 r3 ห l1 ห l2 ห l3 ห r1 ห r2 ห r3
l r ห l ห r
โฆ โฆ
Idea: Think of as leakage from
ห li ri
Non-Malleability?
- independent of
ห l1, ห l2, ห l3 r
- depends on
ห l ห l1, ห l2, ห l3
- independent of
ห l r
- independent of
ห r l
l1 l2 l3 r1 r2 r3 ห l1 ห l2 ห l3 ห r1 ห r2 ห r3
l r ห l ห r
โฆ โฆ
Idea: Think of as leakage from
ห li ri
Can now rely on ๐ฎ๐ญ๐ณ๐๐ป๐๐ฟ2
2
Non-Malleability?
- independent of
ห l1, ห l2, ห l3 r
- depends on
ห l ห l1, ห l2, ห l3
- independent of
ห l r
- independent of
ห r l
l1 l2 l3 r1 r2 r3 ห l1 ห l2 ห l3 ห r1 ห r2 ห r3
l r ห l ห r
โฆ โฆ
Idea: Think of as leakage from
ห li ri
โ*
Can now rely on ๐ฎ๐ญ๐ณ๐๐ป๐๐ฟ2
2
Compiler for NMSS
- li, ri โ sharei
l โ ๐ฒ๐ฟ๐ฝ(l1, โฆ) r โ ๐ฌ๐ฒ๐ฒ๐ฟ๐ฝ2
n(r1, r2)
m โ ๐ฎ๐ญ๐ฒ๐ฟ๐ฝ2
2(l, r)
- l, r โ ๐ฎ๐ญ๐ณ๐๐ป๐๐ฟ2
2(m)
l1, โฆ, ln โ ๐ณ๐๐ป๐๐ฟ(l) r1, โฆ, rn โ ๐ฌ๐ฒ๐ณ๐๐ป๐๐ฟ2
n(r)
sharei โ li, ri
๐ฎ๐ญ๐ณ๐๐ป๐๐ฟ ๐ฎ๐ญ๐ฒ๐ฟ๐ฝ
Separately take care of authorized pairs.
Open Problems
Open Problems
Leakage from disjoint subsets?
Open Problems
Leakage from disjoint subsets?
Open Problems
Leakage from disjoint subsets? Tampering in overlapping subsets?
Open Problems
Leakage from disjoint subsets? Tampering in overlapping subsets?
Open Problems
Leakage from disjoint subsets? Tampering in overlapping subsets? Leakage-resilient multi-party computation?โจ โจ
Open Problems
Leakage from disjoint subsets? Tampering in overlapping subsets? Leakage-resilient multi-party computation?โจ โจ Joint-leakage in non-malleable schemes?
Thank you.
Questions?