Securing Secret Sharing Against Leakage and Tampering Ashutosh - - PowerPoint PPT Presentation

โ–ถ
securing secret sharing against leakage and tampering
SMART_READER_LITE
LIVE PREVIEW

Securing Secret Sharing Against Leakage and Tampering Ashutosh - - PowerPoint PPT Presentation

Securing Secret Sharing Against Leakage and Tampering Ashutosh Kumar Based on joint works with Vipul Goyal, Raghu Meka, and Amit Sahai Secret Sharing secret s n s 1 s i Correctness: Any out of parties can


slide-1
SLIDE 1

Securing Secret Sharing Against Leakage and Tampering

Ashutosh Kumar

Based on joint works with Vipul Goyal, Raghu Meka, and Amit Sahai

slide-2
SLIDE 2

Secret Sharing

Correctness: Any out of parties can reconstruct the secret

t n

Secrecy: Secret remains hidden given less than shares

t

secret

s1 sn ๐–ณ๐—‚๐–ป๐—Œ๐–ฟ si โ€ฆ โ€ฆ

[Blakley79] and [Shamir79]

slide-3
SLIDE 3

Shamirโ€™s -out-of- Scheme

2 n

secret

slide-4
SLIDE 4

Shamirโ€™s -out-of- Scheme

2 n

secret

slide-5
SLIDE 5

Shamirโ€™s -out-of- Scheme

2 n

s1 s2 s3

secret

s4

slide-6
SLIDE 6

Shamirโ€™s -out-of- Scheme

2 n

s1 s2 s3

secret

s4

Correctness: Any points determine the line

2

slide-7
SLIDE 7

Shamirโ€™s -out-of- Scheme

2 n

s1 s2 s3

secret

s4

Correctness: Any points determine the line

2

Secrecy: point does not

1

slide-8
SLIDE 8

What if everyone is slightly โ€˜corruptโ€™?

Typically modeled as side-channel attacks

slide-9
SLIDE 9

What if everyone is slightly โ€˜corruptโ€™?

Passive Adversary: Leakage-Resilience Typically modeled as side-channel attacks

slide-10
SLIDE 10

What if everyone is slightly โ€˜corruptโ€™?

Passive Adversary: Leakage-Resilience Tampering Adversary: Non-Malleability Typically modeled as side-channel attacks

slide-11
SLIDE 11

What if everyone is slightly โ€˜corruptโ€™?

Passive Adversary: Leakage-Resilience Tampering Adversary: Non-Malleability Typically modeled as side-channel attacks Long history in cryptography

slide-12
SLIDE 12

What if everyone is slightly โ€˜corruptโ€™?

Passive Adversary: Leakage-Resilience Tampering Adversary: Non-Malleability Our Goal: Protect secret sharing from such side channel attacks. Typically modeled as side-channel attacks Long history in cryptography

slide-13
SLIDE 13

Agenda

Leakage-Resilience Non-Malleability

slide-14
SLIDE 14

Leakage?

s1 sn ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ๐–ณ๐—‚๐–ป๐—Œ๐–ฟ si โ€ฆ โ€ฆ

secret

slide-15
SLIDE 15

Leakage?

Just give me one bit from each share.

s1 sn ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ๐–ณ๐—‚๐–ป๐—Œ๐–ฟ si โ€ฆ โ€ฆ

secret

slide-16
SLIDE 16

Leakage?

Just give me one bit from each share.

s1 sn ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ๐–ณ๐—‚๐–ป๐—Œ๐–ฟ c1 cn si ci โ€ฆ โ€ฆ โ€ฆ โ€ฆ

secret

slide-17
SLIDE 17

Leakage?

Just give me one bit from each share. Shamirโ€™s scheme is insecure for some parameter regime! โ€จ [Guruswami-Wootters 16]

s1 sn ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ๐–ณ๐—‚๐–ป๐—Œ๐–ฟ c1 cn si ci โ€ฆ โ€ฆ โ€ฆ โ€ฆ

secret

slide-18
SLIDE 18

Leakage-Resilient Secret Sharing

Dziembowski and Pietrzak 07, Goyal-K 18 Benhamouda, Degwekar, Ishai, and Rabin 18

Leakage-Resilience: Secret statistically hidden even โ€จ given leakage from each share.

ci โ€ฆ โ€ฆ f1(s1) fi(si) fn(sn) s1 sn c1 cn si โ€ฆ โ€ฆ

secret

slide-19
SLIDE 19

Limitations of Model

Except for [Davi, Dziembowski, and Venturi 10]

n = 2

  • Individual Leakageโ€จ
  • Non-adaptive Leakageโ€จ

ci โ€ฆ โ€ฆ f1(s1) fi(si) fn(sn) s1 sn c1 cn si โ€ฆ โ€ฆ

secret

slide-20
SLIDE 20

Modeling Leakage

Adversary runs a multi-party communication protocol โ€จ and โ€˜learnsโ€™ transcript

  • Constraint 1: Total leakage/communicationโ€จ
  • Constraint 2: Type of protocols allowed

[K,Meka,Sahai 19]

slide-21
SLIDE 21

Bounded Collusion Protocols (BCP)

s1 sn s2

โ€ฆ

s3

  • party Collusion Protocol (CP): โ€จ

Each round parties collude and write a bit on the public board

p p

  • = collusion bound
  • = leakage bound

p ฮผ

slide-22
SLIDE 22

Bounded Collusion Protocols (BCP)

s1 sn s2

โ€ฆ

b1 โ† f1(s1, s2) s3

  • party Collusion Protocol (CP): โ€จ

Each round parties collude and write a bit on the public board

p p

Round 1: b1

  • = collusion bound
  • = leakage bound

p ฮผ

slide-23
SLIDE 23

Bounded Collusion Protocols (BCP)

s1 sn s2

โ€ฆ

s3

  • party Collusion Protocol (CP): โ€จ

Each round parties collude and write a bit on the public board

p p

Round 1: b1

  • = collusion bound
  • = leakage bound

p ฮผ

slide-24
SLIDE 24

Bounded Collusion Protocols (BCP)

s1 sn s2

โ€ฆ

s3 b2 โ† f2(s2, s3)

  • party Collusion Protocol (CP): โ€จ

Each round parties collude and write a bit on the public board

p p

Round 1: b1 Round 2: b2

  • = collusion bound
  • = leakage bound

p ฮผ

slide-25
SLIDE 25

Bounded Collusion Protocols (BCP)

s1 sn s2

โ€ฆ

s3

  • party Collusion Protocol (CP): โ€จ

Each round parties collude and write a bit on the public board

p p

Round 1: b1 Round 2: b2

  • = collusion bound
  • = leakage bound

p ฮผ

slide-26
SLIDE 26

Bounded Collusion Protocols (BCP)

s1 sn s2

โ€ฆ

s3

  • party Collusion Protocol (CP): โ€จ

Each round parties collude and write a bit on the public board

p p

Round 1: b1 Round 2: b2 Round :

โ‹ฎ ฮผ bฮผ

  • = collusion bound
  • = leakage bound

p ฮผ

slide-27
SLIDE 27

Bounded Collusion Protocols (BCP)

s1 sn s2

โ€ฆ

s3

  • party Collusion Protocol (CP): โ€จ

Each round parties collude and write a bit on the public board

p p

  • Joint leakage
  • Overlapping leakage
  • Adaptive

Round 1: b1 Round 2: b2 Round :

โ‹ฎ ฮผ bฮผ

  • = collusion bound
  • = leakage bound

p ฮผ

slide-28
SLIDE 28

BCPs in Communication Complexity

  • party CP: Number-in-hand (NIH)

1

slide-29
SLIDE 29

BCPs in Communication Complexity

  • party CP: Number-on-forehead (NOF)

[Chandra, Furst, Lipton 83] [Babai, Nisan, Szegedy 89]

(n โˆ’ 1)

  • party CP: Number-in-hand (NIH)

1

slide-30
SLIDE 30

BCPs in Communication Complexity

  • party CP: Number-on-forehead (NOF)

[Chandra, Furst, Lipton 83] [Babai, Nisan, Szegedy 89]

(n โˆ’ 1)

  • party CP: Number-in-hand (NIH)

1

  • party CP interpolates between the two

p

slide-31
SLIDE 31

Leakage-Resilience against BCPs

s1 sn s2 โ€ฆ snโˆ’1

Round 1: Round :

b1 โ‹ฎ ฮผ bฮผ

Secret Sharing: โ€จ Any can recover secret No can recover

t t โˆ’ 1

Leakage-Resilience: Secret statistically hiddenโ€จ given -party CP transcript

p

secret

  • party CP

p

  • LRSS:

(p, t, n)

slide-32
SLIDE 32

Our Result for LRSS

Efficient

  • LRSS for

(p, t, n) p = O(log n)

[K,Meka,Sahai 19]

slide-33
SLIDE 33

Our Result for LRSS

Efficient

  • LRSS for

(p, t, n) p = O(log n)

Theorem: Compile any scheme into leakage-resilient one โ€จ against -party CP .โ€จ

p

New share = Old share +2p โ‹… log n โ‹… (ฮผ + log(1/ฯต))

[K,Meka,Sahai 19]

slide-34
SLIDE 34

Why BCPs?

Worst possible adversary: p = t โˆ’ 1

slide-35
SLIDE 35

Why BCPs?

Worst possible adversary: p = t โˆ’ 1 Useful Primitive:

  • Allows for composition.
  • Ex: Disjoint leakage
  • for non-malleability

p = 2

slide-36
SLIDE 36

Logarithmic Barrier

Observation: Efficient

  • LRSS for

bits of โ€จ non-adaptive leakage and share size will imply โ€จ reconstruction fn.

(p, p + 1,n) p2 2po(1) โˆ‰ ๐–ก๐–ฃ๐–ฃ0

Leakage-resilience implies communication lower bounds.

[Williams 14]: [Murray, Williams 18]:

๐–ฎ๐–ฅ๐–ธ๐–ฐ โŠ„ ๐–ก๐–ฃ๐–ฃ0 ๐–ฎ๐–ฑ๐–ฐ โŠ„ ๐–ก๐–ฃ๐–ฃ0

slide-37
SLIDE 37

Concurrent and Independent Work

[Badrinarayanan and Srinivasan 19]

  • out-of-n LRSS

Positive rate NMSS Multi-Tampering NMSS [Aggarwal et al. 19] Compiler for LRSS Multi-Tampering NMSS Threshold signatures [Srinivasan and Vasudevan 19] Rate efficient LRSS Rate efficient NMSS An application to MPC

O(1)

Their Focus: โ€จ Good rate for individual โ€จ and non-adaptive leakage.

slide-38
SLIDE 38

Concurrent and Independent Work

[Badrinarayanan and Srinivasan 19]

  • out-of-n LRSS

Positive rate NMSS Multi-Tampering NMSS [Aggarwal et al. 19] Compiler for LRSS Multi-Tampering NMSS Threshold signatures [Srinivasan and Vasudevan 19] Rate efficient LRSS Rate efficient NMSS An application to MPC

O(1)

Our Focus: Joint and adaptive leakage. Rate for constant .

1/log n p

Their Focus: โ€จ Good rate for individual โ€จ and non-adaptive leakage.

slide-39
SLIDE 39

Our Construction for LRSS

Efficient

  • LRSS for

(p, t, n) p = O(log n)

Simple construction using NOF lower bounds

slide-40
SLIDE 40

Outline

  • Phase 1:
  • LRSS

(p, p + 1,p + 1)

NOF lower bounds

โ†“

slide-41
SLIDE 41

Outline

  • Phase 1:
  • LRSS

(p, p + 1,p + 1)

  • Phase 2:
  • LRSS
  • LRSS

(p, p + 1,p + 1) โ†’ (p, p + 1,n)

Increase # of parties

โ†“

NOF lower bounds

โ†“

slide-42
SLIDE 42

Outline

  • Phase 1:
  • LRSS

(p, p + 1,p + 1)

  • Phase 2:
  • LRSS
  • LRSS

(p, p + 1,p + 1) โ†’ (p, p + 1,n)

  • Phase 3:
  • LRSS
  • LRSS

(p, p + 1,n) โ†’ (p, t, n)

Increase # of parties

โ†“

Increase threshold

โ†“

NOF lower bounds

โ†“

slide-43
SLIDE 43

Phase 1:

  • LRSS

(p, p + 1,p + 1)

: Total leakage allowedโ€จ : error in leakage-resilience

ฮผ ฯต

Main ingredient: โ€จ

  • โ€˜hardโ€™ for โ€จ

NOF protocols with communication.

๐–ฆ : ({0,1}r)p+1 โ†’ {0,1} ฯต ฮผ

[Babai, Nisan, and Szegedy 89]: โ€จ Explicit with

๐–ฆ r = 2p(ฮผ + log(1/ฯต))

slide-44
SLIDE 44

Phase 1:

  • LRSS

(p, p + 1,p + 1)

slide-45
SLIDE 45

Phase 1:

  • LRSS

(p, p + 1,p + 1)

๐–ณ๐—‚๐–ป๐—Œ๐–ฟ(m)

slide-46
SLIDE 46

Phase 1:

  • LRSS

(p, p + 1,p + 1)

  • ๐–ฒ๐–ป๐—ˆ๐–พ๐—‰๐—‡ a1, โ€ฆ, ap+1 โˆˆ {0,1}r

๐–ณ๐—‚๐–ป๐—Œ๐–ฟ(m)

slide-47
SLIDE 47

Phase 1:

  • LRSS

(p, p + 1,p + 1)

  • ๐–ฒ๐–ป๐—ˆ๐–พ๐—‰๐—‡ a1, โ€ฆ, ap+1 โˆˆ {0,1}r
  • a โ† ๐–ฆ(a1, โ€ฆ, ap+1)

๐–ณ๐—‚๐–ป๐—Œ๐–ฟ(m)

slide-48
SLIDE 48

Phase 1:

  • LRSS

(p, p + 1,p + 1)

  • ๐–ฒ๐–ป๐—ˆ๐–พ๐—‰๐—‡ a1, โ€ฆ, ap+1 โˆˆ {0,1}r
  • a โ† ๐–ฆ(a1, โ€ฆ, ap+1)
  • b1, โ€ฆ, bp+1 โ† ๐–ธ๐–ฏ๐–ฒp+1

p+1(m โŠ• a)

๐–ณ๐—‚๐–ป๐—Œ๐–ฟ(m)

slide-49
SLIDE 49

Phase 1:

  • LRSS

(p, p + 1,p + 1)

  • ๐–ฒ๐–ป๐—ˆ๐–พ๐—‰๐—‡ a1, โ€ฆ, ap+1 โˆˆ {0,1}r
  • a โ† ๐–ฆ(a1, โ€ฆ, ap+1)
  • b1, โ€ฆ, bp+1 โ† ๐–ธ๐–ฏ๐–ฒp+1

p+1(m โŠ• a)

  • sharei โ† ai, bi

๐–ณ๐—‚๐–ป๐—Œ๐–ฟ(m)

slide-50
SLIDE 50

Phase 1:

  • LRSS

(p, p + 1,p + 1)

  • ๐–ฒ๐–ป๐—ˆ๐–พ๐—‰๐—‡ a1, โ€ฆ, ap+1 โˆˆ {0,1}r
  • a โ† ๐–ฆ(a1, โ€ฆ, ap+1)
  • b1, โ€ฆ, bp+1 โ† ๐–ธ๐–ฏ๐–ฒp+1

p+1(m โŠ• a)

  • sharei โ† ai, bi

๐–ณ๐—‚๐–ป๐—Œ๐–ฟ(m) ๐–ฒ๐–ฟ๐–ฝ(m)

slide-51
SLIDE 51

Phase 1:

  • LRSS

(p, p + 1,p + 1)

  • ๐–ฒ๐–ป๐—ˆ๐–พ๐—‰๐—‡ a1, โ€ฆ, ap+1 โˆˆ {0,1}r
  • a โ† ๐–ฆ(a1, โ€ฆ, ap+1)
  • b1, โ€ฆ, bp+1 โ† ๐–ธ๐–ฏ๐–ฒp+1

p+1(m โŠ• a)

  • sharei โ† ai, bi

๐–ณ๐—‚๐–ป๐—Œ๐–ฟ(m)

  • a โ† ๐–ฆ(a1, โ€ฆ, ap+1)

๐–ฒ๐–ฟ๐–ฝ(m)

slide-52
SLIDE 52

Phase 1:

  • LRSS

(p, p + 1,p + 1)

  • ๐–ฒ๐–ป๐—ˆ๐–พ๐—‰๐—‡ a1, โ€ฆ, ap+1 โˆˆ {0,1}r
  • a โ† ๐–ฆ(a1, โ€ฆ, ap+1)
  • b1, โ€ฆ, bp+1 โ† ๐–ธ๐–ฏ๐–ฒp+1

p+1(m โŠ• a)

  • sharei โ† ai, bi

๐–ณ๐—‚๐–ป๐—Œ๐–ฟ(m)

  • a โ† ๐–ฆ(a1, โ€ฆ, ap+1)
  • m โ† a โŠ• b1 โŠ• โ€ฆ โŠ• bp+1

๐–ฒ๐–ฟ๐–ฝ(m)

slide-53
SLIDE 53

Phase 1:

  • LRSS

(p, p + 1,p + 1)

Leakage-Resilience: โ€จ Not resilient NOF protocol for

โ†’ ๐–ฆ

  • ๐–ฒ๐–ป๐—ˆ๐–พ๐—‰๐—‡ a1, โ€ฆ, ap+1 โˆˆ {0,1}r

a โ† ๐–ฆ(a1, โ€ฆ, ap+1) b1, โ€ฆ, bp+1 โ† ๐–ธ๐–ฏ๐–ฒp+1

p+1(m โŠ• a)

sharei โ† ai, bi

๐–ณ๐—‚๐–ป๐—Œ๐–ฟ(m)

  • โ€˜hardโ€™ for โ€จ

NOF protocols with communication.

๐–ฆ : ({0,1}r)p+1 โ†’ {0,1} ฯต ฮผ

slide-54
SLIDE 54

Phase 2: Lifting โ€จ to

(p, p + 1,p + 1) (p, p + 1,n)

Naive: For every subset of parties, create an instance of scheme

p + 1 (p, p + 1,p + 1)

Share length: โ€จ Inefficient for

๐–ฏ๐—†๐–พ โ‹… np p = ฯ‰(1)

slide-55
SLIDE 55

Scatter and Reuse Shares

independent instances of

  • LRSS

M (p, p + 1,p + 1)

s1

1, โ€ฆ, s1 p+1

s2

1, โ€ฆ, s2 p+1

sM

1 , โ€ฆ, sM p+1

โ‹ฎ parties

n

3 2 1 1 p p + 1 p 1 2

โ†’

Scattering Matrix [Kurosawa and Stinson 90s]

instances

M

slide-56
SLIDE 56

Scatter and Reuse Shares

independent instances of

  • LRSS

M (p, p + 1,p + 1)

s1

1, โ€ฆ, s1 p+1

s2

1, โ€ฆ, s2 p+1

sM

1 , โ€ฆ, sM p+1

โ‹ฎ parties

n

3 2 1 1 p p + 1 p 1 2

โ†’

Scattering Matrix [Kurosawa and Stinson 90s] s1

3

s1

2

s1

1

s2

1

s2

p

s2

p+1

sM

p

sM

1

sM

2

โ†’

Scattered Shares

n M

slide-57
SLIDE 57

Scatter and Reuse Shares

independent instances of

  • LRSS

M (p, p + 1,p + 1)

s1

1, โ€ฆ, s1 p+1

s2

1, โ€ฆ, s2 p+1

sM

1 , โ€ฆ, sM p+1

โ‹ฎ parties

n

3 2 1 1 p p + 1 p 1 2

โ†’

Scattering Matrix [Kurosawa and Stinson 90s] s1

3

s1

2

s1

1

s2

1

s2

p

s2

p+1

sM

p

sM

1

sM

2

โ†’

Scattered Shares

n

Final share of party i โ† ๐–ฝ๐—‰๐—†๐—๐—‡๐—ˆi

M

slide-58
SLIDE 58

M n

3 2 1 1 p p + 1 p 1 2

Any parties โ€จ can reconstruct

p + 1 โ†“

Scatter and Reuse Shares

columns row โ€จ containing

โˆ€ p + 1 โˆƒ {1,โ€ฆ, p + 1}

What property of scattering matrix?

slide-59
SLIDE 59

columns row โ€จ containing

โˆ€ p + 1 โˆƒ {1,โ€ฆ, p + 1}

Perfect hash functions:

M = 2p log n

[Fredman, Komlos, and Szemeredi 84] [Alon, Yuster and Zwick 95] [Naor, Schulman and Srinivasan 95]

โ†‘

How to construct such a matrix?

Scatter and Reuse Shares

M n

3 2 1 1 p p + 1 p 1 2

slide-60
SLIDE 60

Phase 2: Lifting โ€จ to

(p, p + 1,p + 1) (p, p + 1,n)

  • Share length:

โ€จ โ€จ

  • Secrecy: Immediateโ€จ

โ€จ

  • Leakage-resilience: Hybrid argument

๐–ฏ๐—†๐–พ โ‹… (2p โ‹… log n)

slide-61
SLIDE 61

Disjoint subsets?

Handling overlapping collusions in base schemeโ€จ is crucial for scattering. Weaker adversary:

  • Partition into disjoint subsets of size
  • Non-adaptively leak from each subset

p

Donโ€™t know how to handle without NOF .

p = ฯ‰(1)

slide-62
SLIDE 62

Phase 3: Lifting โ€จ to

(p, p + 1,n) (p, t, n)

  • Secrecy: From

โ€จ

  • Leakage-resilience: From

๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œt

n

๐–ฌ๐–ฒ๐–ณ๐—‚๐–ป๐—Œ๐–ฟp+1

n

  • a, b โ† ๐–ธ๐–ฏ๐–ฒ๐Ÿฅ

๐Ÿฅ(m)

a1, โ€ฆ, an โ† ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œt

n(a)

b1, โ€ฆ, bn โ† ๐–ฌ๐–ฒ๐–ณ๐—‚๐–ป๐—Œ๐–ฟp+1

n

(b) sharei โ† ai, bi

slide-63
SLIDE 63

Phase 3: Lifting โ€จ to

(p, p + 1,n) (p, t, n)

  • Secrecy: From

โ€จ

  • Leakage-resilience: From

๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œt

n

๐–ฌ๐–ฒ๐–ณ๐—‚๐–ป๐—Œ๐–ฟp+1

n

  • a, b โ† ๐–ธ๐–ฏ๐–ฒ๐Ÿฅ

๐Ÿฅ(m)

a1, โ€ฆ, an โ† ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œt

n(a)

b1, โ€ฆ, bn โ† ๐–ฌ๐–ฒ๐–ณ๐—‚๐–ป๐—Œ๐–ฟp+1

n

(b) sharei โ† ai, bi

โˆŽ

slide-64
SLIDE 64

Agenda

Leakage-Resilience Non-Malleability

slide-65
SLIDE 65

s1 s2 s3

What if a party tampers?

s4

secret

slide-66
SLIDE 66

What if a party tampers?

s1 s2 s3 s4

slide-67
SLIDE 67

What if a party tampers?

secret

s1 s2 s3 s4

Error Correction: Only 1 set of collinear triples

slide-68
SLIDE 68

What if a party tampers?

secret

s1 s2 s3 s4

Error Correction: Only 1 set of collinear triples How about 3 parties?

slide-69
SLIDE 69

What if a party tampers?

s1 s2 s3

secret

slide-70
SLIDE 70

s1 s2 s3

What if a party tampers?

slide-71
SLIDE 71

s1 s2 s3

What if a party tampers?

slide-72
SLIDE 72

s1 s2 s3

Cannot correct an error with only 3 parties.

What if a party tampers?

slide-73
SLIDE 73

s1 s2 s3

Cannot correct an error with only 3 parties.

What if a party tampers?

Can achieve weaker guarantee ofโ€จ Error Detection: Non-collinear points

slide-74
SLIDE 74

What if everyone tampers?

s1 s2 s3

secret

slide-75
SLIDE 75

What if everyone tampers?

s1 s2 s3

Overwritesโ€จ with 0

slide-76
SLIDE 76

What if everyone tampers?

s1 s2 s3

Overwritesโ€จ with 0

slide-77
SLIDE 77

What if everyone tampers?

s1 s2 s3

Cannot even detect errors!

Overwritesโ€จ with 0

slide-78
SLIDE 78

What if everyone tampers?

s1 s2 s3

Cannot even detect errors!

Overwritesโ€จ with 0

But notice: Original secret was โ€˜destroyedโ€™.

slide-79
SLIDE 79

Modeling โ€˜Destructionโ€™

s1 sn s2 โ€ฆ หœ s1 หœ sn หœ s2 โ€ฆ

Any t

หœ m

Inspired from Non-Malleable Codes:

[Dziembowski, Pietrzak, Wichs 10]

slide-80
SLIDE 80

Modeling โ€˜Destructionโ€™

s1 sn s2 โ€ฆ หœ s1 หœ sn หœ s2 โ€ฆ

Any t

หœ m s1 sn s2 โ€ฆ 1 หœ s1 หœ sn หœ s2 โ€ฆ

Any t

หœ m

โ‰ 

Inspired from Non-Malleable Codes:

[Dziembowski, Pietrzak, Wichs 10]

slide-81
SLIDE 81

Modeling โ€˜Destructionโ€™

s1 sn s2 โ€ฆ หœ s1 หœ sn หœ s2 โ€ฆ

Any t

หœ m s1 sn s2 โ€ฆ 1 หœ s1 หœ sn หœ s2 โ€ฆ

Any t

หœ m

โ‰  โ‰ˆฯต

Inspired from Non-Malleable Codes:

[Dziembowski, Pietrzak, Wichs 10]

slide-82
SLIDE 82

Non-Malleable Secret Sharing

s1 sn s2 โ€ฆ m หœ s1 หœ sn หœ s2 โ€ฆ

Any t

หœ m

NMSS:โ€จ โ€จ The distribution of tamperedโ€จ secret is either identical orโ€จ statistically independent of the original secret.

[Goyal-K 18]

slide-83
SLIDE 83

Non-Malleable Secret Sharing

s1 sn s2 โ€ฆ m หœ s1 หœ sn หœ s2 โ€ฆ

Any t

หœ m

NMSS:โ€จ โ€จ The distribution of tamperedโ€จ secret is either identical orโ€จ statistically independent of the original secret.

[Goyal-K 18]

Intuition: Secret hidden even after learning tampered secret.

slide-84
SLIDE 84

Shamirโ€™s scheme is Malleable

s1 s2 s3 ๐—๐–ฟ๐–ฝ๐—Œ๐–ฟ๐—Ž

slide-85
SLIDE 85

Shamirโ€™s scheme is Malleable

s1 s2 s3 ๐—๐–ฟ๐–ฝ๐—Œ๐–ฟ๐—Ž s1 + 1 s2 + 1 s3 + 1

slide-86
SLIDE 86

Shamirโ€™s scheme is Malleable

s1 s2 s3 ๐—๐–ฟ๐–ฝ๐—Œ๐–ฟ๐—Ž s1 + 1 s2 + 1 s3 + 1 ๐—๐–ฟ๐–ฝ๐—Œ๐–ฟ๐—Ž + 1

slide-87
SLIDE 87

Shamirโ€™s scheme is Malleable

s1 s2 s3 ๐—๐–ฟ๐–ฝ๐—Œ๐–ฟ๐—Ž s1 + 1 s2 + 1 s3 + 1 ๐—๐–ฟ๐–ฝ๐—Œ๐–ฟ๐—Ž + 1

In fact, all linear schemes are malleable.

slide-88
SLIDE 88

Our Results for NMSS

Theorem [Goyal-K 18]: Compile any scheme into โ€จ non-malleable one against individual tampering.

slide-89
SLIDE 89

Our Results for NMSS

Theorem [Goyal-K 18]: Compile any scheme into โ€จ non-malleable one against individual tampering. Theorem [K, Meka, Sahai 19]: Allow tampering โ€จ to depend on individual leakage.

slide-90
SLIDE 90

Our Results for NMSS

Theorem [Goyal-K 18]: Compile any scheme into โ€จ non-malleable one against individual tampering.

  • out-of- NMSS โ€จ

studied as NM Codes

2 2 Theorem [K, Meka, Sahai 19]: Allow tampering โ€จ to depend on individual leakage.

slide-91
SLIDE 91

Joint Tampering?

[Goyal-K 18]

slide-92
SLIDE 92

Joint Tampering?

[Goyal-K 18]

Theorem: -out-of- scheme that is non-malleableโ€จ against joint tampering in two subsetsโ€จ (except equal sized subsets).

t n

slide-93
SLIDE 93

Outline for NMSS

  • Ingredient 1: -out-of- NMSS

2 2

Non-Malleable Codes

โ†“

slide-94
SLIDE 94

Outline for NMSS

  • Ingredient 1: -out-of- NMSS

2 2

  • Ingredient 2: A pair of โ€˜unfriendlyโ€™ SS schemes

Non-Malleable Codes

โ†“

slide-95
SLIDE 95

Outline for NMSS

  • Ingredient 1: -out-of- NMSS

2 2

  • Ingredient 2: A pair of โ€˜unfriendlyโ€™ SS schemes

โ†“

Non-Malleable Codes

โ†“

slide-96
SLIDE 96

Outline for NMSS

  • Ingredient 1: -out-of- NMSS

2 2

  • Ingredient 2: A pair of โ€˜unfriendlyโ€™ SS schemes

โ†“

Our Compiler for NMSS Non-Malleable Codes

โ†“

slide-97
SLIDE 97

l r m หœ l หœ r หœ m

  • out-of- NMSS

2 2

slide-98
SLIDE 98

l r m หœ l หœ r หœ m

Follows from split-state โ€จ non-malleable codes

2

  • out-of- NMSS

2 2

slide-99
SLIDE 99

l r m หœ l หœ r หœ m

Follows from split-state โ€จ non-malleable codes

2

  • out-of- NMSS

2 2

[Dziembowski, Pietrzak, Wichs 10] [Liu, Lysyanskaya 12] [Dziembowski, Kazana, Obremski 13] [Aggarwal, Dodis, Lovett 14] โ€ฆ

slide-100
SLIDE 100
  • out-of- NMSS?

3 n

slide-101
SLIDE 101

๐–ณ๐—‚๐–ป๐—Œ๐–ฟ(m)

  • out-of- NMSS?

3 n

slide-102
SLIDE 102
  • l, r โ† ๐–ฎ๐–ญ๐–ณ๐—‚๐–ป๐—Œ๐–ฟ2

2(m)

๐–ณ๐—‚๐–ป๐—Œ๐–ฟ(m)

  • out-of- NMSS?

3 n

l r m

slide-103
SLIDE 103
  • l, r โ† ๐–ฎ๐–ญ๐–ณ๐—‚๐–ป๐—Œ๐–ฟ2

2(m)

  • l1, โ€ฆ, ln โ† ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ3

n(l)

๐–ณ๐—‚๐–ป๐—Œ๐–ฟ(m)

  • out-of- NMSS?

3 n

l1 l2 l3

โ€ฆ

l r m

slide-104
SLIDE 104
  • l, r โ† ๐–ฎ๐–ญ๐–ณ๐—‚๐–ป๐—Œ๐–ฟ2

2(m)

  • l1, โ€ฆ, ln โ† ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ3

n(l)

  • r1, โ€ฆ, rn โ† ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ3

n(r)

๐–ณ๐—‚๐–ป๐—Œ๐–ฟ(m)

  • out-of- NMSS?

3 n

l1 l2 l3 r1 r2 r3

โ€ฆ

l r m

slide-105
SLIDE 105
  • l, r โ† ๐–ฎ๐–ญ๐–ณ๐—‚๐–ป๐—Œ๐–ฟ2

2(m)

  • l1, โ€ฆ, ln โ† ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ3

n(l)

  • r1, โ€ฆ, rn โ† ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ3

n(r)

  • sharei โ† li, ri

๐–ณ๐—‚๐–ป๐—Œ๐–ฟ(m)

  • out-of- NMSS?

3 n

l1 l2 l3 r1 r2 r3

โ€ฆ

l r m

slide-106
SLIDE 106
  • l, r โ† ๐–ฎ๐–ญ๐–ณ๐—‚๐–ป๐—Œ๐–ฟ2

2(m)

  • l1, โ€ฆ, ln โ† ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ3

n(l)

  • r1, โ€ฆ, rn โ† ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ3

n(r)

  • sharei โ† li, ri

๐–ณ๐—‚๐–ป๐—Œ๐–ฟ(m)

  • out-of- NMSS?

3 n

l1 l2 l3 r1 r2 r3

โ€ฆ

Secrecy: Both and hidden given shares

l r 2

l r m

slide-107
SLIDE 107
  • l, r โ† ๐–ฎ๐–ญ๐–ณ๐—‚๐–ป๐—Œ๐–ฟ2

2(m)

l1, โ€ฆ, ln โ† ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ3

n(l)

r1, โ€ฆ, rn โ† ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ3

n(r)

sharei โ† li, ri

๐–ณ๐—‚๐–ป๐—Œ๐–ฟ

l1 l2 l3 r1 r2 r3

l r

โ€ฆ

m

Non-Malleability?

slide-108
SLIDE 108
  • l, r โ† ๐–ฎ๐–ญ๐–ณ๐—‚๐–ป๐—Œ๐–ฟ2

2(m)

l1, โ€ฆ, ln โ† ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ3

n(l)

r1, โ€ฆ, rn โ† ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ3

n(r)

sharei โ† li, ri

๐–ณ๐—‚๐–ป๐—Œ๐–ฟ

l1 l2 l3 r1 r2 r3

l r

โ€ฆ

m

Non-Malleability?

หœ l1 หœ l2 หœ l3 หœ r1 หœ r2 หœ r3

โ€ฆ

slide-109
SLIDE 109
  • l, r โ† ๐–ฎ๐–ญ๐–ณ๐—‚๐–ป๐—Œ๐–ฟ2

2(m)

l1, โ€ฆ, ln โ† ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ3

n(l)

r1, โ€ฆ, rn โ† ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ3

n(r)

sharei โ† li, ri

๐–ณ๐—‚๐–ป๐—Œ๐–ฟ

l1 l2 l3 r1 r2 r3

l r

โ€ฆ

m

Non-Malleability?

หœ l1 หœ l2 หœ l3 หœ r1 หœ r2 หœ r3

หœ l หœ r

โ€ฆ

หœ m

slide-110
SLIDE 110
  • l, r โ† ๐–ฎ๐–ญ๐–ณ๐—‚๐–ป๐—Œ๐–ฟ2

2(m)

l1, โ€ฆ, ln โ† ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ3

n(l)

r1, โ€ฆ, rn โ† ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ3

n(r)

sharei โ† li, ri

๐–ณ๐—‚๐–ป๐—Œ๐–ฟ

l1 l2 l3 r1 r2 r3

l r

โ€ฆ

m

Non-Malleability?

To show: uncorrelated with

หœ m m

หœ l1 หœ l2 หœ l3 หœ r1 หœ r2 หœ r3

หœ l หœ r

โ€ฆ

หœ m

slide-111
SLIDE 111
  • l, r โ† ๐–ฎ๐–ญ๐–ณ๐—‚๐–ป๐—Œ๐–ฟ2

2(m)

l1, โ€ฆ, ln โ† ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ3

n(l)

r1, โ€ฆ, rn โ† ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ3

n(r)

sharei โ† li, ri

๐–ณ๐—‚๐–ป๐—Œ๐–ฟ

l1 l2 l3 r1 r2 r3

l r

โ€ฆ

m

Non-Malleability?

To show: uncorrelated with

หœ m m

หœ l1 หœ l2 หœ l3 หœ r1 หœ r2 หœ r3

หœ l หœ r

โ€ฆ

หœ m Lets rely on ๐–ฎ๐–ญ๐–ณ๐—‚๐–ป๐—Œ๐–ฟ2

2

slide-112
SLIDE 112
  • l, r โ† ๐–ฎ๐–ญ๐–ณ๐—‚๐–ป๐—Œ๐–ฟ2

2(m)

l1, โ€ฆ, ln โ† ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ3

n(l)

r1, โ€ฆ, rn โ† ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ3

n(r)

sharei โ† li, ri

๐–ณ๐—‚๐–ป๐—Œ๐–ฟ

l1 l2 l3 r1 r2 r3

l r

โ€ฆ

m

Non-Malleability?

หœ l1 หœ l2 หœ l3 หœ r1 หœ r2 หœ r3

หœ l หœ r

โ€ฆ

หœ m

slide-113
SLIDE 113
  • l, r โ† ๐–ฎ๐–ญ๐–ณ๐—‚๐–ป๐—Œ๐–ฟ2

2(m)

l1, โ€ฆ, ln โ† ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ3

n(l)

r1, โ€ฆ, rn โ† ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ3

n(r)

sharei โ† li, ri

๐–ณ๐—‚๐–ป๐—Œ๐–ฟ

l1 l2 l3 r1 r2 r3

l r

โ€ฆ

m

Non-Malleability?

หœ l1 หœ l2 หœ l3 หœ r1 หœ r2 หœ r3

หœ l หœ r

โ€ฆ

หœ m Problem: and are not tampered independently

l r

slide-114
SLIDE 114
  • l, r โ† ๐–ฎ๐–ญ๐–ณ๐—‚๐–ป๐—Œ๐–ฟ2

2(m)

l1, โ€ฆ, ln โ† ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ3

n(l)

r1, โ€ฆ, rn โ† ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ3

n(r)

sharei โ† li, ri

๐–ณ๐—‚๐–ป๐—Œ๐–ฟ

l1 l2 l3 r1 r2 r3

l r

โ€ฆ

m

Non-Malleability?

หœ l1 หœ l2 หœ l3 หœ r1 หœ r2 หœ r3

หœ l หœ r

โ€ฆ

หœ m Problem: and are not tampered independently

l r

Root cause: Schemes sharing are are โ€˜friendlyโ€™

l r

slide-115
SLIDE 115

โ€˜Unfriendlyโ€™ SS schemes

Idea: Use different thresholds for and

l r

slide-116
SLIDE 116

โ€˜Unfriendlyโ€™ SS schemes

  • l, r โ† ๐–ฎ๐–ญ๐–ณ๐—‚๐–ป๐—Œ๐–ฟ2

2(m)

l1, โ€ฆ, ln โ† ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ3

n(l)

r1, โ€ฆ, rn โ† ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ2

n(r)

sharei โ† li, ri

๐–ณ๐—‚๐–ป๐—Œ๐–ฟ

Idea: Use different thresholds for and

l r

slide-117
SLIDE 117

โ€˜Unfriendlyโ€™ SS schemes

  • li, ri โ† sharei

l โ† ๐–ฒ๐–ฟ๐–ฝ3

n(l1, l2, l3)

r โ† ๐–ฒ๐–ฟ๐–ฝ2

n(r1, r2)

m โ† ๐–ฎ๐–ญ๐–ฒ๐–ฟ๐–ฝ2

2(l, r)

  • l, r โ† ๐–ฎ๐–ญ๐–ณ๐—‚๐–ป๐—Œ๐–ฟ2

2(m)

l1, โ€ฆ, ln โ† ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ3

n(l)

r1, โ€ฆ, rn โ† ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ2

n(r)

sharei โ† li, ri

๐–ณ๐—‚๐–ป๐—Œ๐–ฟ ๐–ฒ๐–ฟ๐–ฝ

Idea: Use different thresholds for and

l r

slide-118
SLIDE 118

โ€˜Unfriendlyโ€™ SS schemes

  • li, ri โ† sharei

l โ† ๐–ฒ๐–ฟ๐–ฝ3

n(l1, l2, l3)

r โ† ๐–ฒ๐–ฟ๐–ฝ2

n(r1, r2)

m โ† ๐–ฎ๐–ญ๐–ฒ๐–ฟ๐–ฝ2

2(l, r)

  • l, r โ† ๐–ฎ๐–ญ๐–ณ๐—‚๐–ป๐—Œ๐–ฟ2

2(m)

l1, โ€ฆ, ln โ† ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ3

n(l)

r1, โ€ฆ, rn โ† ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ2

n(r)

sharei โ† li, ri

๐–ณ๐—‚๐–ป๐—Œ๐–ฟ ๐–ฒ๐–ฟ๐–ฝ

Secrecy: still hidden

l

Idea: Use different thresholds for and

l r

slide-119
SLIDE 119

Non-Malleability?

l1 l2 l3 r1 r2 r3 หœ l1 หœ l2 หœ l3 หœ r1 หœ r2 หœ r3

l r หœ l หœ r

โ€ฆ โ€ฆ

slide-120
SLIDE 120

Non-Malleability?

  • fixed given

and

หœ r หœ r1 หœ r2

l1 l2 l3 r1 r2 r3 หœ l1 หœ l2 หœ l3 หœ r1 หœ r2 หœ r3

l r หœ l หœ r

โ€ฆ โ€ฆ

slide-121
SLIDE 121

Non-Malleability?

  • fixed given

and

หœ r หœ r1 หœ r2

  • can depend on and

l1 l2

l1 l2 l3 r1 r2 r3 หœ l1 หœ l2 หœ l3 หœ r1 หœ r2 หœ r3

l r หœ l หœ r

โ€ฆ โ€ฆ

slide-122
SLIDE 122

Non-Malleability?

  • fixed given

and

หœ r หœ r1 หœ r2

  • can depend on and

l1 l2

  • two shares hides l

l1 l2 l3 r1 r2 r3 หœ l1 หœ l2 หœ l3 หœ r1 หœ r2 หœ r3

l r หœ l หœ r

โ€ฆ โ€ฆ

slide-123
SLIDE 123

Non-Malleability?

  • fixed given

and

หœ r หœ r1 หœ r2

  • can depend on and

l1 l2

  • two shares hides l
  • independent of

หœ r l

l1 l2 l3 r1 r2 r3 หœ l1 หœ l2 หœ l3 หœ r1 หœ r2 หœ r3

l r หœ l หœ r

โ€ฆ โ€ฆ

slide-124
SLIDE 124

Non-Malleability?

  • fixed given

and

หœ r หœ r1 หœ r2

  • can depend on and

l1 l2

  • two shares hides l
  • independent of

หœ r l

l1 l2 l3 r1 r2 r3 หœ l1 หœ l2 หœ l3 หœ r1 หœ r2 หœ r3

l r หœ l หœ r

โ€ฆ โ€ฆ

slide-125
SLIDE 125

Non-Malleability?

  • fixed given

and

หœ r หœ r1 หœ r2

  • can depend on and

l1 l2

  • two shares hides l
  • independent of

หœ r l

l1 l2 l3 r1 r2 r3 หœ l1 หœ l2 หœ l3 หœ r1 หœ r2 หœ r3

l r หœ l หœ r

โ€ฆ โ€ฆ

slide-126
SLIDE 126

Non-Malleability?

  • Problem: not independent of

หœ l r

  • fixed given

and

หœ r หœ r1 หœ r2

  • can depend on and

l1 l2

  • two shares hides l
  • independent of

หœ r l

l1 l2 l3 r1 r2 r3 หœ l1 หœ l2 หœ l3 หœ r1 หœ r2 หœ r3

l r หœ l หœ r

โ€ฆ โ€ฆ

slide-127
SLIDE 127

Use Leakage-Resilience

  • li, ri โ† sharei

l โ† ๐–ฒ๐–ฟ๐–ฝ3

n(l1, l2, l3)

r โ† ๐–ฌ๐–ฒ๐–ฒ๐–ฟ๐–ฝ2

n(r1, r2)

m โ† ๐–ฎ๐–ญ๐–ฒ๐–ฟ๐–ฝ2

2(l, r)

  • l, r โ† ๐–ฎ๐–ญ๐–ณ๐—‚๐–ป๐—Œ๐–ฟ2

2(m)

l1, โ€ฆ, ln โ† ๐–ณ๐—‚๐–ป๐—‡๐—ƒ๐—Œ3

n(l)

r1, โ€ฆ, rn โ† ๐–ฌ๐–ฒ๐–ณ๐—‚๐–ป๐—Œ๐–ฟ2

n(r)

sharei โ† li, ri

๐–ณ๐—‚๐–ป๐—Œ๐–ฟ ๐–ฒ๐–ฟ๐–ฝ

Secrecy: same as before

slide-128
SLIDE 128

Non-Malleability?

l1 l2 l3 r1 r2 r3 หœ l1 หœ l2 หœ l3 หœ r1 หœ r2 หœ r3

l r หœ l หœ r

โ€ฆ โ€ฆ

slide-129
SLIDE 129

Non-Malleability?

l1 l2 l3 r1 r2 r3 หœ l1 หœ l2 หœ l3 หœ r1 หœ r2 หœ r3

l r หœ l หœ r

โ€ฆ โ€ฆ

Idea: Think of as leakage from

หœ li ri

slide-130
SLIDE 130

Non-Malleability?

  • independent of

หœ l1, หœ l2, หœ l3 r

l1 l2 l3 r1 r2 r3 หœ l1 หœ l2 หœ l3 หœ r1 หœ r2 หœ r3

l r หœ l หœ r

โ€ฆ โ€ฆ

Idea: Think of as leakage from

หœ li ri

slide-131
SLIDE 131

Non-Malleability?

  • independent of

หœ l1, หœ l2, หœ l3 r

  • depends on

หœ l หœ l1, หœ l2, หœ l3

l1 l2 l3 r1 r2 r3 หœ l1 หœ l2 หœ l3 หœ r1 หœ r2 หœ r3

l r หœ l หœ r

โ€ฆ โ€ฆ

Idea: Think of as leakage from

หœ li ri

slide-132
SLIDE 132

Non-Malleability?

  • independent of

หœ l1, หœ l2, หœ l3 r

  • depends on

หœ l หœ l1, หœ l2, หœ l3

  • independent of

หœ l r

l1 l2 l3 r1 r2 r3 หœ l1 หœ l2 หœ l3 หœ r1 หœ r2 หœ r3

l r หœ l หœ r

โ€ฆ โ€ฆ

Idea: Think of as leakage from

หœ li ri

slide-133
SLIDE 133

Non-Malleability?

  • independent of

หœ l1, หœ l2, หœ l3 r

  • depends on

หœ l หœ l1, หœ l2, หœ l3

  • independent of

หœ l r

  • independent of

หœ r l

l1 l2 l3 r1 r2 r3 หœ l1 หœ l2 หœ l3 หœ r1 หœ r2 หœ r3

l r หœ l หœ r

โ€ฆ โ€ฆ

Idea: Think of as leakage from

หœ li ri

slide-134
SLIDE 134

Non-Malleability?

  • independent of

หœ l1, หœ l2, หœ l3 r

  • depends on

หœ l หœ l1, หœ l2, หœ l3

  • independent of

หœ l r

  • independent of

หœ r l

l1 l2 l3 r1 r2 r3 หœ l1 หœ l2 หœ l3 หœ r1 หœ r2 หœ r3

l r หœ l หœ r

โ€ฆ โ€ฆ

Idea: Think of as leakage from

หœ li ri

Can now rely on ๐–ฎ๐–ญ๐–ณ๐—‚๐–ป๐—Œ๐–ฟ2

2

slide-135
SLIDE 135

Non-Malleability?

  • independent of

หœ l1, หœ l2, หœ l3 r

  • depends on

หœ l หœ l1, หœ l2, หœ l3

  • independent of

หœ l r

  • independent of

หœ r l

l1 l2 l3 r1 r2 r3 หœ l1 หœ l2 หœ l3 หœ r1 หœ r2 หœ r3

l r หœ l หœ r

โ€ฆ โ€ฆ

Idea: Think of as leakage from

หœ li ri

โˆŽ*

Can now rely on ๐–ฎ๐–ญ๐–ณ๐—‚๐–ป๐—Œ๐–ฟ2

2

slide-136
SLIDE 136

Compiler for NMSS

  • li, ri โ† sharei

l โ† ๐–ฒ๐–ฟ๐–ฝ(l1, โ€ฆ) r โ† ๐–ฌ๐–ฒ๐–ฒ๐–ฟ๐–ฝ2

n(r1, r2)

m โ† ๐–ฎ๐–ญ๐–ฒ๐–ฟ๐–ฝ2

2(l, r)

  • l, r โ† ๐–ฎ๐–ญ๐–ณ๐—‚๐–ป๐—Œ๐–ฟ2

2(m)

l1, โ€ฆ, ln โ† ๐–ณ๐—‚๐–ป๐—Œ๐–ฟ(l) r1, โ€ฆ, rn โ† ๐–ฌ๐–ฒ๐–ณ๐—‚๐–ป๐—Œ๐–ฟ2

n(r)

sharei โ† li, ri

๐–ฎ๐–ญ๐–ณ๐—‚๐–ป๐—Œ๐–ฟ ๐–ฎ๐–ญ๐–ฒ๐–ฟ๐–ฝ

Separately take care of authorized pairs.

slide-137
SLIDE 137

Open Problems

slide-138
SLIDE 138

Open Problems

Leakage from disjoint subsets?

slide-139
SLIDE 139

Open Problems

Leakage from disjoint subsets?

slide-140
SLIDE 140

Open Problems

Leakage from disjoint subsets? Tampering in overlapping subsets?

slide-141
SLIDE 141

Open Problems

Leakage from disjoint subsets? Tampering in overlapping subsets?

slide-142
SLIDE 142

Open Problems

Leakage from disjoint subsets? Tampering in overlapping subsets? Leakage-resilient multi-party computation?โ€จ โ€จ

slide-143
SLIDE 143

Open Problems

Leakage from disjoint subsets? Tampering in overlapping subsets? Leakage-resilient multi-party computation?โ€จ โ€จ Joint-leakage in non-malleable schemes?

slide-144
SLIDE 144

Thank you.

Questions?