simplifying game based definitions
play

Simplifying Game-Based Definitions Indistinguishability up to - PowerPoint PPT Presentation

Simplifying Game-Based Definitions Indistinguishability up to correctness and its application to stateful AE Phillip Rogaway Yusi (James) Zhang University of California, Davis, USA C RYPTO 2018 1. Introduction 2. IND|C 3. Examples 1


  1. Simplifying Game-Based Definitions Indistinguishability up to correctness and its application to stateful AE Phillip Rogaway Yusi (“James”) Zhang University of California, Davis, USA C RYPTO 2018 1. Introduction 2. IND|C 3. Examples 1

  2. IND definition for formalizing cryptographic goals “Real” game “Ideal” game 1 or 0 2

  3. [PR18: Towards Bidirectional Ratcheted Key Exchange ] [FGMP15: Data is a Stream: Security of Stream-based Channels ] [DS18: Untagging Tor: A Formal Treatment of Onion Encryption ] 3

  4. AUTH i from Changes made There should be a “return r” here. in one year by [Boyd-Hale- the authors Mjolsnes- themselves. Stebila 2016] 4

  5. Problems with the IND paradigm 1. Defs can get so complicated/subtle they’re hard to debug/believe. 2. People mess up /are vague even with basic defns. [BHK 09/15: Subtleties in the Definition of IND-CCA? ] 3. Hard to justify your games capture what you want? 4. There’s no theory on how to use IND to create defns. 5

  6. Simplifying IND-based definitions Simple, naïve, Reasonable Definitional bogus definition Compiler definition 6

  7. IND|C Oracle editing Class Real Ideal utopian P P games Oracle Editing edited games P P 7

  8. IND|C Oracle editing by silencing 8

  9. IND|C Oracle editing by silencing Silencing function operates on a query-terminated transcript 9

  10. IND|C Silencing by fixedness Silencing function Silence if given t , the answer is operates on a query-terminated fixed across all Π ∈ C. transcript 10

  11. An important caveat Silencing function must be efficiently computable! … at least on the domain that matters: transcripts that can arise in or (for ) interactions with an adversary. 11

  12. The IND|C paradigm 1. Formalize syntax for a scheme P. Formalize the correctness condition C. 2. Design utopian games G, H (don’t exclude “trivial” wins). Along with C, this determines the IND|C security notion. 3. Verify that the silencing function is efficiently computable on (C,G,H). 12

  13. Example 1 IND-CCA-secure PKE A PKE scheme is a tuple of 3 algorithms. Correctness: 13

  14. Example 1 Conventional IND-CCA-secure PKE G 1 H 1 Must invalidate trivial wins: Exclusion-style • Penalty-style • 14

  15. Example 1 IND|C-style CCA-secure PKE G 1 H 1 . Defining IND|C-CCA security . . for a PKE scheme P =( K , E , D ) . . . . . . . . . Theorem : IND|C-style CCA security is equivalent to conventional CCA security. 15

  16. Example 2 Stateful AE Bellare, Kohno, Namprempre (2002/2004) Kohno, Palacio, and Black (2003) Boyd, Hale, Mj ø lsnes, and Stebila (2016) 16

  17. Defining correctness Stateful AE How picky should the receiver be? Encrypting party sends messages 1, 2, 3, … A level set defines the set of permissible orderings for the receiver to have received at some point in time. means getting messages , in order, is acceptable. C2[ L ] 17

  18. Defining sAE Stateful AE G2 P H2 P G We have an sAE construction that satisfies our IND|C CCA security notion. 18

  19. IND|C variants All of these as expressive as initial version (with efficient computability side conditions) 1. Silence-then-forgive : instead of silence-then-shut-down 2. Ideal-side editing : Don’t silence G; instead, replace H responses with G responses if those are fixed 3. Penalty-style editing : Don’t silence: adjust Finalize so that the game outputs 0 if silencing would have happened 4. Symmetric silencing : For left-or-right games. Silence a query response if it is (a) fixed for a left-hand oracle, (b) fixed for a right-hand oracle, and (c) these fixed values are distinct 19

  20. Final comments Definitions coming out of IND|C are abstract (but can be concretely re-characterized) . A speculative proposal (but we expect broadly applicable). Might cover some of what UC does. (ideal game ≅ ideal functionality) 20

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend