Somewhat Non-Committing Encryption and Efficient Adaptively Secure - - PowerPoint PPT Presentation

somewhat non committing encryption and efficient
SMART_READER_LITE
LIVE PREVIEW

Somewhat Non-Committing Encryption and Efficient Adaptively Secure - - PowerPoint PPT Presentation

Somewhat Non-Committing Encryption and Efficient Adaptively Secure Oblivious Transfer Hong-Sheng Zhou University of Connecticut Joint work with Juan Garay (AT&T) and Daniel Wichs (NYU) CRYPTO 2009 Outline Background New Approach


slide-1
SLIDE 1

Somewhat Non-Committing Encryption and Efficient Adaptively Secure Oblivious Transfer

Hong-Sheng Zhou

University of Connecticut Joint work with

Juan Garay (AT&T) and Daniel Wichs (NYU)

CRYPTO 2009

slide-2
SLIDE 2

Garay, Wichs and Zhou

Outline

Background New Approach to Adaptive Security Application: Efficient and Adaptively Secure Oblivious

Transfer

2

slide-3
SLIDE 3

Garay, Wichs and Zhou

Protocols that withstand wide variety of adversarial attacks The simulation paradigm [GMW’87];

arbitrary environments (Universal Composability [Canetti’01])

Static vs. Adaptive security

  • Corruptions before computation starts vs. on-the-fly
  • Adaptive security models: Erasure vs. Non-Erasure

Our Mission: “Strong” Security

3

slide-4
SLIDE 4

Garay, Wichs and Zhou

Protocols that withstand wide variety of adversarial attacks The simulation paradigm [GMW’87];

arbitrary environments (Universal Composability [Canetti’01])

Static vs. Adaptive security

  • Corruptions before computation starts vs. on-the-fly
  • Adaptive security models: Erasure vs. Non-Erasure

Our Mission: “Strong” Security

4

slide-5
SLIDE 5

Garay, Wichs and Zhou

Feasibility results: Possible to design adaptively secure

UC protocols for almost any task, assuming some trusted setup (e.g., CRS) [CLOS’02]

Alternative efficient approaches by sacrificing some

aspect of security [DN’03, KO’04, GMY’04, DI’05, JS’07, LP’07, Lindell’09, …]

  • static UC security
  • adaptive UC security in the erasure model
  • adaptive UC security for honest majority
  • ….

“Strong” Security: Partial History

5

slide-6
SLIDE 6

Garay, Wichs and Zhou

Adaptive UC security can be achieved efficiently, given an

efficient adaptively secure string-OT protocol [IPS’08]

6

“Strong” Security: Partial History (cont’d)

slide-7
SLIDE 7

Garay, Wichs and Zhou

Efficient (constant-round, constant public-key op’s per bit)

adaptively UC secure bit- and string-OT protocols based on standard number-theoretic assumptions

“Semi-Adaptive” security for two-party tasks

  • Not allowed: Both parties start out honest and then become

corrupted

Compilers: Semi-Adaptive security ⇨ Adaptive security

Secure channels (“fully equivocal;” non-committing encryption)

  • “Somewhat equivocal” channels

Somewhat Non-Committing Encryption

  • Limited “equivocation,” much more efficient!

Our Results

7

slide-8
SLIDE 8

Garay, Wichs and Zhou

Simulation Paradigm: UC Security

[Canetti’01]: Universal Composition

IDEAL REAL

8

Definition: protocol is a secure realization of task if: For every real-world adversary There exists an ideal-world adversary (simulator) Two worlds indistinguishable to all environments

Alice Alice Bob Bob Alice Alice Bob Bob

slide-9
SLIDE 9

Garay, Wichs and Zhou

No constant round adaptively secure general 2-PC or MPC

protocol is known

Adaptive security hard even for basic tasks like “secure

channels”

Basic public-key encryption is not enough.

Why is adaptive security hard?

9

slide-10
SLIDE 10

Garay, Wichs and Zhou

Compute C = Encpk(m)

C pk

m m m m

Generate key pair (pk,sk) Compute m = Decsk(C)

Static security can be achieved based on Encryption

Why is adaptive security hard?

Example: Secure Channel

10

sender sender receiver receiver sender sender receiver receiver

IDEAL REAL

Uh oh… I’m busted! How do I explain C as an encryption of m?

slide-11
SLIDE 11

Garay, Wichs and Zhou

No constant round adaptively secure general 2-PC or MPC

protocol is known

Adaptive security hard even for basic tasks like “secure

channels”

Basic public-key encryption is not enough. Extend encryption to Non-Committing Encryption [CFGN’96]

Simulator can run a “fake” encryption protocol to produce a

ciphertext, and later explain the ciphertext as an encryption of some arbitrarily chosen plaintext

Done bit by bit [Beaver’97, DN’00] Very expensive for encrypting long message: O(1) public key

  • perations per bit of message

Why is adaptive security hard?

11

slide-12
SLIDE 12

Garay, Wichs and Zhou

Outline

Background New Approach to Adaptive Security Application: Efficient and Adaptively Secure Oblivious

Transfer

12

slide-13
SLIDE 13

Garay, Wichs and Zhou

Malicious Semi-Honest Adaptive Static

How? Use expensive generic zero-knowledge proofs

  • r cut-and-choose techniques

Previous Approach to Adaptive Security

Compiler

13

[CLOS’02] for multi-party tasks [CDMW’09] for oblivious transfer

slide-14
SLIDE 14

Garay, Wichs and Zhou

Malicious Semi-Honest Adaptive Semi-Adaptive Static

1, Introduce Semi-Adaptive Security 2, Develop a new compiler This work: two-party tasks

New Approach to Adaptive Security

New compiler

14

slide-15
SLIDE 15

Garay, Wichs and Zhou

Case 1: If no party is corrupted at the very beginning, then the adversary can’t corrupt any parties. Case 2: If there is a party corrupted at the very beginning, then the other party can be corrupted adaptively. Missing case: If no party is corrupted at the very beginning, either party (or both) can be corrupted during the protocol execution. Trusted setup can be simulated without knowing which party is corrupted. Take care of the corruptions in Cases 1 and 2.

Semi-Adaptive Security for 2-Party Tasks

15

Adversary Simulator (Ideal World Adversary)

slide-16
SLIDE 16

Garay, Wichs and Zhou

Case 2: If there is a party corrupted at the beginning, then the other party can be corrupted adaptively.

Alice Alice

Semi-Adaptive Security: Simulator

Bob Bob

16

Alice Alice Bob Bob

slide-17
SLIDE 17

Garay, Wichs and Zhou

Case 2: If there is a party corrupted at the beginning, then the other party can be corrupted adaptively.

Alice Alice

Semi-Adaptive Security: Simulator

Bob Bob

17

Alice Alice Bob Bob

slide-18
SLIDE 18

Garay, Wichs and Zhou

Conceptually simple: Use secure channels to

protect communication transcripts between parties.

Theorem: A semi-adaptively secure two-party

protocol with communication protected by secure channels is fully adaptively secure.

Compiler #1

18

slide-19
SLIDE 19

Garay, Wichs and Zhou

Proof Idea

19

Alice Alice Bob Bob Alice Alice Bob Bob

slide-20
SLIDE 20

Garay, Wichs and Zhou

A secure channel leaks very little info An -equivocal channel leaks much more info

  • Equivocal Channel: Much Cheaper!

20

slide-21
SLIDE 21

Garay, Wichs and Zhou

New compiler: Use -equivocal channels to protect

protocol communication

Theorem: A semi-adaptively secure protocol for

function with communication protected by -equivocal channels is fully adaptively

  • secure. Here

Very efficient with small input/output sizes (e.g., bit-OT) Proof idea: Communication between honest parties can

be explained as any one of the possible “protocol executions” that may have occurred.

Compiler #2

21

slide-22
SLIDE 22

Garay, Wichs and Zhou

Proof Idea

22

Alice Alice Bob Bob Alice Alice Bob Bob

slide-23
SLIDE 23

Garay, Wichs and Zhou

  • Equivocal Channel: Implementation

23

slide-24
SLIDE 24

Garay, Wichs and Zhou

Outline

Background New Approach to Adaptive Security Application: Efficient and Adaptively Secure Oblivious

Transfer

24

slide-25
SLIDE 25

Garay, Wichs and Zhou

sender sender receiver receiver input bit σ input bit σ

  • utput bit xσ
  • utput bit xσ

is x0 chosen?

  • r x1?

what is x1‐σ?

[Rabin’81, EGL’85,Crepau’87]

input bits (x0,x1) input bits (x0,x1)

1-out-of-2 Oblivious Transfer

25

slide-26
SLIDE 26

Garay, Wichs and Zhou

OT is the cornerstone of secure computation

[Yao’82,GMW’87,...,CLOS’02,...]

OT is complete [Kilian’88] Founding secure computation on OT efficiently [IPS’08] No efficient adaptively UC-secure OT until recently

(comparison later)

Why OT?

26

slide-27
SLIDE 27

Garay, Wichs and Zhou

Underlying building block: Dual Mode Encryption First truly efficient OT against malicious and static

adversaries in the UC framework

How to defend against adaptive adversaries?

[PVW’08]

PVW OT (Malicious+Static Adversary)

27

slide-28
SLIDE 28

Garay, Wichs and Zhou

Step 1: Make PVW OT Semi-Adaptively Secure

Extend Dual Mode Encryption to support adaptive security:

Enhanced Dual Mode Encryption

Change the CRS setup to be simulated without knowing which

party is corrupted

Coin-tossing protocol

Our Approach to Adaptively Secure OT

28

slide-29
SLIDE 29

Garay, Wichs and Zhou

Use Enhanced Dual Mode Encryption

29

slide-30
SLIDE 30

Garay, Wichs and Zhou

Use coin-tossing protocol to obtain the CRS for enhanced PVW

30

slide-31
SLIDE 31

Garay, Wichs and Zhou

Such coin tossing protocol is based on a CRS which can be simulated without knowing which party is corrupted

31

slide-32
SLIDE 32

Garay, Wichs and Zhou 32

slide-33
SLIDE 33

Garay, Wichs and Zhou

Step 1: Improve PVW OT to be Semi-Adaptively Secure Step 2:

Use an equivocal channel to protect the communication.

Equivocality parameter is

Our Approach to Adaptively Secure OT

33

slide-34
SLIDE 34

Garay, Wichs and Zhou

8-equivocal channel

34

slide-35
SLIDE 35

Garay, Wichs and Zhou

Assumptions: [CDMW’09]: general Ours: DDH and DCR

  • No. of public-key
  • perations

bit-OT string-OT (n bits ) [CDMW’09] Ours: based on Secure Channel Ours: based on Equivocal Channel

Comparison with [CDMW’09]

35

Efficiency:

slide-36
SLIDE 36

Garay, Wichs and Zhou

Thanks!

Somewhat full version available at eprint.iacr.org/2008/534

36