Statistical Zaps and New Oblivious Transfer Protocols Vipul Goyal - - PowerPoint PPT Presentation

β–Ά
statistical zaps and new
SMART_READER_LITE
LIVE PREVIEW

Statistical Zaps and New Oblivious Transfer Protocols Vipul Goyal - - PowerPoint PPT Presentation

1 Statistical Zaps and New Oblivious Transfer Protocols Vipul Goyal Abhishek Jain Zhengzhong Jin Giulio Malavolta Carnegie Mellon University Carnegie Mellon Johns Hopkins Johns Hopkins University of California, University University


slide-1
SLIDE 1

Statistical Zaps and New Oblivious Transfer Protocols

Vipul Goyal

Carnegie Mellon University Johns Hopkins University Johns Hopkins University

Carnegie Mellon University University of California, Berkeley

Abhishek Jain Zhengzhong Jin Giulio Malavolta

1

slide-2
SLIDE 2

Statistical Security in 2-party Protocols

2

slide-3
SLIDE 3

Statistical Security in 2-party Protocols

  • Everlasting security Computational unbounded adversary can’t break.
  • Hard to achieve
  • Impossible for both parties to achieve for general functionalities
  • Focus of this work: One-side Statistical Security
  • Interactive Proof Systems: Statistical Privacy for Prover
  • Oblivious Transfer: Statistical Privacy for Receiver

2

slide-4
SLIDE 4

Statistical Security in 2-party Protocols

  • Everlasting security Computational unbounded adversary can’t break.
  • Hard to achieve
  • Impossible for both parties to achieve for general functionalities
  • Focus of this work: One-side Statistical Security
  • Interactive Proof Systems: Statistical Privacy for Prover
  • Oblivious Transfer: Statistical Privacy for Receiver

2

slide-5
SLIDE 5

Interactive Proof System

Prover Verifier

𝑦 ∈ 𝑀 πœ• : witness

3

slide-6
SLIDE 6

Interactive Proof System

Prover Verifier

𝑦 ∈ 𝑀 πœ• : witness

3

slide-7
SLIDE 7

Interactive Proof System

Prover Verifier

𝑦 ∈ 𝑀 πœ• : witness

Accept/Reject

3

slide-8
SLIDE 8

Witness Indistinguishability (WI)

Prover

Malicious Verifier

𝑦 ∈ 𝑀

πœ• ∈ witness(𝑦)

Prover

Malicious Verifier

𝑦 ∈ 𝑀

πœ•β€² ∈ witness(𝑦)

β‰ˆ

4

slide-9
SLIDE 9

Witness Indistinguishability (WI)

Prover

Malicious Verifier

𝑦 ∈ 𝑀

πœ• ∈ witness(𝑦)

Prover

Malicious Verifier

𝑦 ∈ 𝑀

πœ•β€² ∈ witness(𝑦)

β‰ˆ

  • Unlike zero-knowledge, WI can be achieved in 2-round

4

slide-10
SLIDE 10

Zaps: 2-round Public-Coin WI [DN00]

Prover Verifier

𝑦 ∈ 𝑀

5

slide-11
SLIDE 11

Zaps: 2-round Public-Coin WI [DN00]

Prover Verifier

𝑦 ∈ 𝑀

5

slide-12
SLIDE 12

Zaps: 2-round Public-Coin WI [DN00]

Prover Verifier

𝑦 ∈ 𝑀

5

slide-13
SLIDE 13

Zaps: 2-round Public-Coin WI [DN00]

Prover Verifier

𝑦 ∈ 𝑀

Public Verifiable

5

slide-14
SLIDE 14

Zaps: 2-round Public-Coin WI [DN00]

Prover Verifier

Public Coin: Verifier only uses public random coins

𝑦 ∈ 𝑀

Public Verifiable

5

slide-15
SLIDE 15

Zaps: 2-round Public-Coin WI [DN00]

Prover Verifier

Public Coin: Verifier only uses public random coins

𝑦 ∈ 𝑀

Public Verifiable Many Applications:

  • Round-efficient secure multiparty computation [HHPV18]
  • Resettable-secure protocols [DGS09]

……

5

slide-16
SLIDE 16

Previous Works

[DN00] Zaps and NIZK proofs in common random string model are equivalent.

6

slide-17
SLIDE 17

Previous Works

[DN00] Zaps and NIZK proofs in common random string model are equivalent. NIZKs

  • Quadratic Residuosity Assumption [DMP88]
  • Trapdoor permutation [FLS90]
  • Decisional Linear Assumption [GOS06]

6

slide-18
SLIDE 18

Previous Works

[DN00] Zaps and NIZK proofs in common random string model are equivalent. NIZKs

  • Quadratic Residuosity Assumption [DMP88]
  • Trapdoor permutation [FLS90]
  • Decisional Linear Assumption [GOS06]

6

slide-19
SLIDE 19

Previous Works

[DN00] Zaps and NIZK proofs in common random string model are equivalent. NIZKs

  • Quadratic Residuosity Assumption [DMP88]
  • Trapdoor permutation [FLS90]
  • Decisional Linear Assumption [GOS06]

Zaps

6

slide-20
SLIDE 20

Previous Works

[DN00] Zaps and NIZK proofs in common random string model are equivalent. NIZKs

  • Quadratic Residuosity Assumption [DMP88]
  • Trapdoor permutation [FLS90]
  • Decisional Linear Assumption [GOS06]
  • [BP15] Zaps from Indistinguishability Obfuscation
  • Above works are computational Zap proofs

Zaps

6

slide-21
SLIDE 21

Previous Works

[DN00] Zaps and NIZK proofs in common random string model are equivalent. NIZKs

  • Quadratic Residuosity Assumption [DMP88]
  • Trapdoor permutation [FLS90]
  • Decisional Linear Assumption [GOS06]
  • [BP15] Zaps from Indistinguishability Obfuscation
  • Above works are computational Zap proofs

Zaps

6

slide-22
SLIDE 22

Question (1): Does there exist statistical Zaps?

7

slide-23
SLIDE 23

Result (1): Statistical Zaps from quasi-poly hard Learning with Errors Question (1): Does there exist statistical Zaps?

7

slide-24
SLIDE 24

Result (1): Statistical Zaps from quasi-poly hard Learning with Errors Question (1): Does there exist statistical Zaps? [KKS18] achieves statistical private-coin WI.

7

slide-25
SLIDE 25

Oblivious Transfer (OT)

Sender Receiver

𝑛0 𝑛1

𝛾 ∈ {0,1}

8

slide-26
SLIDE 26

Oblivious Transfer (OT)

Sender Receiver

𝑛0 𝑛1

𝛾 ∈ {0,1}

8

slide-27
SLIDE 27

Oblivious Transfer (OT)

Sender Receiver

𝑛0 𝑛1 𝑛0 𝑛1

𝛾 ∈ {0,1}

8

slide-28
SLIDE 28

Oblivious Transfer (OT)

Sender Receiver

𝑛0 𝑛1 𝑛0 𝑛1

Get 𝑛𝛾 𝛾 ∈ {0,1}

8

slide-29
SLIDE 29

Oblivious Transfer (OT)

Sender Receiver

𝑛0 𝑛1 𝑛0 𝑛1

Get 𝑛𝛾 Sender-Privacy: 𝑛1βˆ’π›Ύ is hidden 𝛾 ∈ {0,1}

8

slide-30
SLIDE 30

Oblivious Transfer (OT)

Sender Receiver

𝑛0 𝑛1 𝑛0 𝑛1

Get 𝑛𝛾 Sender-Privacy: 𝑛1βˆ’π›Ύ is hidden Receiver-Privacy: 𝛾 is hidden to the sender 𝛾 ∈ {0,1}

8

slide-31
SLIDE 31

Oblivious Transfer (OT)

Sender Receiver

𝑛0 𝑛1 𝑛0 𝑛1

Get 𝑛𝛾 Sender-Privacy: 𝑛1βˆ’π›Ύ is hidden Receiver-Privacy: 𝛾 is hidden to the sender 𝛾 ∈ {0,1} Many Applications:

  • Secure multiparty computation [Yao86, GMW87]
  • 2-round WI [JKKR17, BGI+17, KKS18]
  • Non-malleable commitment [KS17]

8

slide-32
SLIDE 32

Natural Question

2-round statistical sender-private OT in plain model

[NP01, AIR01, Kal05, HK12, BD18]

9

slide-33
SLIDE 33

Can we construct 2-round statistical receiver-private OT?

Natural Question

2-round statistical sender-private OT in plain model

[NP01, AIR01, Kal05, HK12, BD18]

9

slide-34
SLIDE 34

Can we construct 2-round statistical receiver-private OT?

Natural Question

Impossible! 2-round statistical sender-private OT in plain model

[NP01, AIR01, Kal05, HK12, BD18]

9

slide-35
SLIDE 35

Can we construct 2-round statistical receiver-private OT? Sender Non-uniform Malicious Receiver

Natural Question

Impossible! 2-round statistical sender-private OT in plain model

[NP01, AIR01, Kal05, HK12, BD18]

9

slide-36
SLIDE 36

Can we construct 2-round statistical receiver-private OT? Sender Non-uniform Malicious Receiver

  • 𝑒1

OT

1(𝛾 = 0; 𝑠 0)

OT

1(𝛾 = 1; 𝑠 1)

Natural Question

Impossible! 2-round statistical sender-private OT in plain model

[NP01, AIR01, Kal05, HK12, BD18]

9

slide-37
SLIDE 37

Can we construct 2-round statistical receiver-private OT? Sender Non-uniform Malicious Receiver

  • 𝑒1

OT

1(𝛾 = 0; 𝑠 0)

OT

1(𝛾 = 1; 𝑠 1)

𝑛0 𝑛1

Natural Question

Impossible! 2-round statistical sender-private OT in plain model

[NP01, AIR01, Kal05, HK12, BD18]

9

slide-38
SLIDE 38

Can we construct 2-round statistical receiver-private OT? Sender Non-uniform Malicious Receiver

  • 𝑒1

OT

1(𝛾 = 0; 𝑠 0)

OT

1(𝛾 = 1; 𝑠 1)

𝑛0 𝑛1 𝑛0 𝑛1

Compromise sender-privacy

Natural Question

Impossible! 2-round statistical sender-private OT in plain model

[NP01, AIR01, Kal05, HK12, BD18]

9

slide-39
SLIDE 39

Can we construct 2-round statistical receiver-private OT? Sender Non-uniform Malicious Receiver

  • 𝑒1

OT

1(𝛾 = 0; 𝑠 0)

OT

1(𝛾 = 1; 𝑠 1)

𝑛0 𝑛1 𝑛0 𝑛1

Compromise sender-privacy

  • [KKS18] 3-round protocol from super-poly hardness assumptions

Natural Question

Impossible! 2-round statistical sender-private OT in plain model

[NP01, AIR01, Kal05, HK12, BD18]

9

slide-40
SLIDE 40

Question (2): Based on polynomial hardness assumptions, does there exist 3-round statistical receiver-private OT in the plain model?

10

slide-41
SLIDE 41

Result (2): 3-round statistical receiver-private OT from

poly-hardness

Construction (1): 2-round statistical sender-private OT Construction (2): Computational Diffie-Hellman assumption

Question (2): Based on polynomial hardness assumptions, does there exist 3-round statistical receiver-private OT in the plain model?

10

slide-42
SLIDE 42

Result (2): 3-round statistical receiver-private OT from

poly-hardness

Construction (1): 2-round statistical sender-private OT Construction (2): Computational Diffie-Hellman assumption

Question (2): Based on polynomial hardness assumptions, does there exist 3-round statistical receiver-private OT in the plain model?

OT reversal

10

slide-43
SLIDE 43

Technical Details Part I: Statistical Zaps

11

slide-44
SLIDE 44

Statistical Zaps

Prover Verifier

𝑦 ∈ 𝑀

Public Verifiable

12

slide-45
SLIDE 45

Starting Idea

  • Compress a Ξ£-protocol via a Correlation Intractable Hash (CIH) H𝑙 β‹…

𝑙

[CGH98, KRR17, CCRR18, HL18, CCH+19, PS19]

V P

𝛽 𝛾 𝛿

𝚻-protocol

𝑦 ∈ 𝑀

13

slide-46
SLIDE 46

Starting Idea

  • Compress a Ξ£-protocol via a Correlation Intractable Hash (CIH) H𝑙 β‹…

𝑙

[CGH98, KRR17, CCRR18, HL18, CCH+19, PS19]

V P

𝛽 𝛾 𝛿

𝚻-protocol

𝑦 ∈ 𝑀

13

slide-47
SLIDE 47

Starting Idea

  • Compress a Ξ£-protocol via a Correlation Intractable Hash (CIH) H𝑙 β‹…

𝑙

[CGH98, KRR17, CCRR18, HL18, CCH+19, PS19]

V P

𝛽 𝛾 𝛿

𝚻-protocol

𝑦 ∈ 𝑀

V P

𝑦 ∈ 𝑀

13

slide-48
SLIDE 48

Starting Idea

  • Compress a Ξ£-protocol via a Correlation Intractable Hash (CIH) H𝑙 β‹…

𝑙

[CGH98, KRR17, CCRR18, HL18, CCH+19, PS19]

V P

𝛽 𝛾 𝛿

𝚻-protocol

𝑦 ∈ 𝑀

V P key 𝑙 for CIH

𝑦 ∈ 𝑀

13

slide-49
SLIDE 49

Starting Idea

  • Compress a Ξ£-protocol via a Correlation Intractable Hash (CIH) H𝑙 β‹…

𝑙

[CGH98, KRR17, CCRR18, HL18, CCH+19, PS19]

V P

𝛽 𝛾 𝛿

𝚻-protocol

𝑦 ∈ 𝑀

V P

Prepare 𝛽 key 𝑙 for CIH 𝑦 ∈ 𝑀

13

slide-50
SLIDE 50

Starting Idea

  • Compress a Ξ£-protocol via a Correlation Intractable Hash (CIH) H𝑙 β‹…

𝑙

[CGH98, KRR17, CCRR18, HL18, CCH+19, PS19]

V P

𝛽 𝛾 𝛿

𝚻-protocol

𝑦 ∈ 𝑀

V P

Prepare 𝛽 𝛾 = H𝑙(𝛽) key 𝑙 for CIH 𝑦 ∈ 𝑀

13

slide-51
SLIDE 51

Starting Idea

  • Compress a Ξ£-protocol via a Correlation Intractable Hash (CIH) H𝑙 β‹…

𝑙

[CGH98, KRR17, CCRR18, HL18, CCH+19, PS19]

V P

𝛽 𝛾 𝛿

𝚻-protocol

𝑦 ∈ 𝑀

V P

Prepare 𝛽 𝛾 = H𝑙(𝛽) key 𝑙 for CIH 𝑦 ∈ 𝑀 Compute 𝛿

13

slide-52
SLIDE 52

Starting Idea

  • Compress a Ξ£-protocol via a Correlation Intractable Hash (CIH) H𝑙 β‹…

𝑙

[CGH98, KRR17, CCRR18, HL18, CCH+19, PS19]

V P

𝛽 𝛾 𝛿

𝚻-protocol

𝑦 ∈ 𝑀

V P

𝛽, 𝛿 Prepare 𝛽 𝛾 = H𝑙(𝛽) key 𝑙 for CIH 𝑦 ∈ 𝑀 Compute 𝛿

13

slide-53
SLIDE 53

Correlation Intractable Hash (CIH)

A CIH is a hash function H𝑙 β‹…

𝑙:

βˆ€ 𝐷, let 𝑙 ← 0,1 poly(πœ‡), it’s hard to find an 𝑦, such that 𝑦 H𝑙(β‹…) 𝐷(β‹…) H𝑙 𝑦 = 𝐷(𝑦) β‹…

14

slide-54
SLIDE 54

Idea for Security

𝚻-protocol

V P 𝛽 = Com 𝑛 𝛾 𝛿 V 𝛽, 𝛿 Prepare 𝛽 𝛾 = CIH𝑙(𝛽) CIH key 𝑙 P

𝑦 ∈ 𝑀 𝑦 ∈ 𝑀

15

slide-55
SLIDE 55

Idea for Security

𝚻-protocol

V P 𝛽 = Com 𝑛 𝛾 𝛿 V 𝛽, 𝛿 Prepare 𝛽 𝛾 = CIH𝑙(𝛽) CIH key 𝑙 P

𝑦 ∈ 𝑀 𝑦 ∈ 𝑀

  • WI: follows from hiding property of the commitment

15

slide-56
SLIDE 56

Idea for Security

  • Soundness: Extract π‘›βˆ— from π›½βˆ— using a trapdoor

Given π‘›βˆ—, the (only) accepting π›Ύβˆ— is efficiently computable Verifier accepts β‡’ π›Ύβˆ— = CIH𝑙 π›½βˆ— = 𝐷 π›½βˆ—

  • Hiding & Extractable commitments can be built in CRS model

β‡’ Zaps in CRS model 𝚻-protocol

V V CIH key 𝑙

Cheating Prover π›½βˆ— = Com π‘›βˆ—

π›Ύβˆ— π›Ώβˆ—

Cheating Prover

𝑦 βˆ‰ 𝑀 𝑦 βˆ‰ 𝑀

π›½βˆ—, π›Ώβˆ—

15

slide-57
SLIDE 57

Idea for Security

  • Soundness: Extract π‘›βˆ— from π›½βˆ— using a trapdoor

Given π‘›βˆ—, the (only) accepting π›Ύβˆ— is efficiently computable Verifier accepts β‡’ π›Ύβˆ— = CIH𝑙 π›½βˆ— = 𝐷 π›½βˆ—

  • Hiding & Extractable commitments can be built in CRS model

β‡’ Zaps in CRS model 𝚻-protocol

V V CIH key 𝑙

Cheating Prover π›½βˆ— = Com π‘›βˆ—

π›Ύβˆ— π›Ώβˆ—

Cheating Prover

𝑦 βˆ‰ 𝑀 𝑦 βˆ‰ 𝑀

π›½βˆ—, π›Ώβˆ—

15

slide-58
SLIDE 58

Idea for Security

  • Soundness: Extract π‘›βˆ— from π›½βˆ— using a trapdoor

Given π‘›βˆ—, the (only) accepting π›Ύβˆ— is efficiently computable Verifier accepts β‡’ π›Ύβˆ— = CIH𝑙 π›½βˆ— = 𝐷 π›½βˆ—

  • Hiding & Extractable commitments can be built in CRS model

β‡’ Zaps in CRS model 𝚻-protocol

V V CIH key 𝑙

Cheating Prover π›½βˆ— = Com π‘›βˆ—

π›Ύβˆ— π›Ώβˆ—

Cheating Prover

𝑦 βˆ‰ 𝑀 𝑦 βˆ‰ 𝑀

π›½βˆ—, π›Ώβˆ—

15

slide-59
SLIDE 59

Idea for Security

  • Soundness: Extract π‘›βˆ— from π›½βˆ— using a trapdoor

Given π‘›βˆ—, the (only) accepting π›Ύβˆ— is efficiently computable Verifier accepts β‡’ π›Ύβˆ— = CIH𝑙 π›½βˆ— = 𝐷 π›½βˆ—

  • Hiding & Extractable commitments can be built in CRS model

β‡’ Zaps in CRS model 𝚻-protocol

V V CIH key 𝑙

Cheating Prover π›½βˆ— = Com π‘›βˆ—

π›Ύβˆ— π›Ώβˆ—

Cheating Prover

𝑦 βˆ‰ 𝑀 𝑦 βˆ‰ 𝑀

π›½βˆ—, π›Ώβˆ— π›Ύβˆ— = 𝐷(π›½βˆ—)

15

slide-60
SLIDE 60

Idea for Security

  • Soundness: Extract π‘›βˆ— from π›½βˆ— using a trapdoor

Given π‘›βˆ—, the (only) accepting π›Ύβˆ— is efficiently computable Verifier accepts β‡’ π›Ύβˆ— = CIH𝑙 π›½βˆ— = 𝐷 π›½βˆ—

  • Hiding & Extractable commitments can be built in CRS model

β‡’ Zaps in CRS model 𝚻-protocol

V V CIH key 𝑙

Cheating Prover π›½βˆ— = Com π‘›βˆ—

π›Ύβˆ— π›Ώβˆ—

Cheating Prover

𝑦 βˆ‰ 𝑀 𝑦 βˆ‰ 𝑀

π›½βˆ—, π›Ώβˆ— π›Ύβˆ— = 𝐷(π›½βˆ—)

15

slide-61
SLIDE 61

Idea for Security

  • Soundness: Extract π‘›βˆ— from π›½βˆ— using a trapdoor

Given π‘›βˆ—, the (only) accepting π›Ύβˆ— is efficiently computable Verifier accepts β‡’ π›Ύβˆ— = CIH𝑙 π›½βˆ— = 𝐷 π›½βˆ—

  • Hiding & Extractable commitments can be built in CRS model

β‡’ Zaps in CRS model 𝚻-protocol

V V CIH key 𝑙

Cheating Prover π›½βˆ— = Com π‘›βˆ—

π›Ύβˆ— π›Ώβˆ—

Cheating Prover

𝑦 βˆ‰ 𝑀 𝑦 βˆ‰ 𝑀

π›½βˆ—, π›Ώβˆ— π›Ύβˆ— = 𝐷(π›½βˆ—)

Contradicts CIH!

15

slide-62
SLIDE 62

Idea for Security

  • Soundness: Extract π‘›βˆ— from π›½βˆ— using a trapdoor

Given π‘›βˆ—, the (only) accepting π›Ύβˆ— is efficiently computable Verifier accepts β‡’ π›Ύβˆ— = CIH𝑙 π›½βˆ— = 𝐷 π›½βˆ—

  • Hiding & Extractable commitments can be built in CRS model

β‡’ Zaps in CRS model 𝚻-protocol

V V CIH key 𝑙

Cheating Prover π›½βˆ— = Com π‘›βˆ—

π›Ύβˆ— π›Ώβˆ—

Cheating Prover

𝑦 βˆ‰ 𝑀 𝑦 βˆ‰ 𝑀

π›½βˆ—, π›Ώβˆ— π›Ύβˆ— = 𝐷(π›½βˆ—)

Contradicts CIH!

15

slide-63
SLIDE 63

Idea for Security

  • Soundness: Extract π‘›βˆ— from π›½βˆ— using a trapdoor

Given π‘›βˆ—, the (only) accepting π›Ύβˆ— is efficiently computable Verifier accepts β‡’ π›Ύβˆ— = CIH𝑙 π›½βˆ— = 𝐷 π›½βˆ—

  • Hiding & Extractable commitments can be built in CRS model

β‡’ Zaps in CRS model 𝚻-protocol

V V CIH key 𝑙

Cheating Prover π›½βˆ— = Com π‘›βˆ—

π›Ύβˆ— π›Ώβˆ—

Cheating Prover

𝑦 βˆ‰ 𝑀 𝑦 βˆ‰ 𝑀

π›½βˆ—, π›Ώβˆ— π›Ύβˆ— = 𝐷(π›½βˆ—)

Contradicts CIH!

15

slide-64
SLIDE 64

Hiding & Extractability in Plain Model

  • Use a 2-round statistical sender-private oblivious transfer

16

slide-65
SLIDE 65

Hiding & Extractability in Plain Model

V P

  • Use a 2-round statistical sender-private oblivious transfer

16

slide-66
SLIDE 66

Hiding & Extractability in Plain Model

V P

  • Use a 2-round statistical sender-private oblivious transfer

Prepare 𝑛, 𝑐′ ←$ 0,1 𝑐 ←$ 0,1

16

slide-67
SLIDE 67

Hiding & Extractability in Plain Model

V P Receiver(𝑐) Sender

  • Use a 2-round statistical sender-private oblivious transfer

Prepare 𝑛, 𝑐′ ←$ 0,1 𝑐 ←$ 0,1

16

slide-68
SLIDE 68

Hiding & Extractability in Plain Model

V P Receiver(𝑐) Sender

  • Use a 2-round statistical sender-private oblivious transfer

Prepare 𝑛, 𝑐′ ←$ 0,1 𝑐 ←$ 0,1

16

slide-69
SLIDE 69

Hiding & Extractability in Plain Model

V P

𝑛 βŠ₯

Receiver(𝑐) Sender

  • Use a 2-round statistical sender-private oblivious transfer

Prepare 𝑛, 𝑐′ ←$ 0,1 𝑐 ←$ 0,1

Put in 𝑐′-position

16

slide-70
SLIDE 70

Hiding & Extractability in Plain Model

V P

𝑛 βŠ₯

Receiver(𝑐) Sender

  • Use a 2-round statistical sender-private oblivious transfer

Prepare 𝑛, 𝑐′ ←$ 0,1 𝑐 ←$ 0,1

Put in 𝑐′-position

16

slide-71
SLIDE 71

Hiding & Extractability in Plain Model

V P

𝑛 βŠ₯

Receiver(𝑐) Sender

  • Use a 2-round statistical sender-private oblivious transfer

Prepare 𝑛, 𝑐′ ←$ 0,1 𝑐 ←$ 0,1

Put in 𝑐′-position 𝑛 βŠ₯ 𝑐 = 𝑐′, extract π‘›βˆš With Pr = 1/2,

16

slide-72
SLIDE 72

𝑐 β‰  𝑐′, hide π‘›βˆš

Hiding & Extractability in Plain Model

V P

𝑛 βŠ₯

Receiver(𝑐) Sender

  • Use a 2-round statistical sender-private oblivious transfer

Prepare 𝑛, 𝑐′ ←$ 0,1 𝑐 ←$ 0,1

Put in 𝑐′-position 𝑛 βŠ₯ With Pr = 1/2,

16

slide-73
SLIDE 73

𝚻-protocol V P 𝛽 = Com 𝑛 𝛾 𝛿

β€˜Weakly Secure’ Statistical Zaps

17

slide-74
SLIDE 74

𝚻-protocol V P 𝛽 = Com 𝑛 𝛾 𝛿

β€˜Weakly Secure’ Statistical Zaps

17

slide-75
SLIDE 75

𝛽, 𝛿 Prepare 𝛽 𝛾 = CIH𝑙(𝛽) CIH key 𝑙 𝚻-protocol V P 𝛽 = Com 𝑛 𝛾 𝛿 V P

β€˜Weakly Secure’ Statistical Zaps

Compute 𝛿

17

slide-76
SLIDE 76

𝛽, 𝛿 Prepare 𝛽 𝛾 = CIH𝑙(𝛽) CIH key 𝑙 𝚻-protocol V P 𝛽 = Com 𝑛 𝛾 𝛿 V P

β€˜Weakly Secure’ Statistical Zaps

𝑐′ ←$ 0,1 𝑐 ←$ 0,1 Compute 𝛿

17

slide-77
SLIDE 77

𝛽, 𝛿 Prepare 𝛽 𝛾 = CIH𝑙(𝛽) CIH key 𝑙 𝚻-protocol V P 𝛽 = Com 𝑛 𝛾 𝛿 V P

β€˜Weakly Secure’ Statistical Zaps

𝑐′ ←$ 0,1 𝑐 ←$ 0,1 Receiver(𝑐) Compute 𝛿

17

slide-78
SLIDE 78

𝛽, 𝛿 Prepare 𝛽 𝛾 = CIH𝑙(𝛽) CIH key 𝑙 𝚻-protocol V P 𝛽 = Com 𝑛 𝛾 𝛿 V P OT

1,

β€˜Weakly Secure’ Statistical Zaps

𝑐′ ←$ 0,1 𝑐 ←$ 0,1 Receiver(𝑐) Compute 𝛿

17

slide-79
SLIDE 79

𝛽, 𝛿 𝛾 = CIH𝑙(𝛽) CIH key 𝑙 𝚻-protocol V P 𝛽 = Com 𝑛 𝛾 𝛿 V P Prepare 𝑛 OT

1,

β€˜Weakly Secure’ Statistical Zaps

𝑐′ ←$ 0,1 𝑐 ←$ 0,1 Receiver(𝑐) Compute 𝛿

17

slide-80
SLIDE 80

𝛽, 𝛿 𝛾 = CIH𝑙(𝛽) CIH key 𝑙 𝚻-protocol V P 𝛽 = Com 𝑛 𝛾 𝛿 V P Prepare 𝑛 OT

1,

β€˜Weakly Secure’ Statistical Zaps

𝑐′ ←$ 0,1 𝑐 ←$ 0,1 Receiver(𝑐) Sender Compute 𝛿

17

slide-81
SLIDE 81

𝛽, 𝛿 𝛾 = CIH𝑙(OT2) CIH key 𝑙 𝚻-protocol V P 𝛽 = Com 𝑛 𝛾 𝛿 V P Prepare 𝑛 OT

1,

β€˜Weakly Secure’ Statistical Zaps

𝑐′ ←$ 0,1 𝑐 ←$ 0,1 Receiver(𝑐) Sender Compute 𝛿

17

slide-82
SLIDE 82

𝛾 = CIH𝑙(OT2) CIH key 𝑙 OT2, 𝛿 𝚻-protocol V P 𝛽 = Com 𝑛 𝛾 𝛿 V P Prepare 𝑛 OT

1,

β€˜Weakly Secure’ Statistical Zaps

𝑐′ ←$ 0,1 𝑐 ←$ 0,1 Receiver(𝑐) Sender Compute 𝛿

17

slide-83
SLIDE 83

𝛾 = CIH𝑙(OT2) CIH key 𝑙 OT2, 𝛿 𝚻-protocol V P 𝛽 = Com 𝑛 𝛾 𝛿 V P Prepare 𝑛 OT

1,

β€˜Weakly Secure’ Statistical Zaps

𝑐′ ←$ 0,1 𝑐 ←$ 0,1

  • Statistical WI with err β‰ˆ 1/2 (when 𝑐 β‰  𝑐′)
  • Computational Soundness

Receiver(𝑐) Sender Compute 𝛿

17

slide-84
SLIDE 84

𝛾 = CIH𝑙(OT2) CIH key 𝑙 OT2, 𝛿 𝚻-protocol V P 𝛽 = Com 𝑛 𝛾 𝛿 V P Prepare 𝑛 OT

1,

β€˜Weakly Secure’ Statistical Zaps

𝑐′ ←$ 0,1 𝑐 ←$ 0,1

  • Statistical WI with err β‰ˆ 1/2 (when 𝑐 β‰  𝑐′)
  • Computational Soundness

Receiver(𝑐) Sender Compute 𝛿

17

slide-85
SLIDE 85

𝛾 = CIH𝑙(OT2) CIH key 𝑙 OT2, 𝛿 𝚻-protocol V P 𝛽 = Com 𝑛 𝛾 𝛿 V P Prepare 𝑛 OT

1,

β€˜Weakly Secure’ Statistical Zaps

𝑐′ ←$ 0,1 𝑐 ←$ 0,1

  • Statistical WI with err β‰ˆ 1/2 (when 𝑐 β‰  𝑐′)
  • Computational Soundness

Receiver(𝑐) Sender Compute 𝛿

17

slide-86
SLIDE 86

Amplify the Security

Receiver Sender

18

slide-87
SLIDE 87

Amplify the Security

Receiver Sender 𝒄′ ← 0,1 π‘š 𝒄 ← 0,1 π‘š

18

slide-88
SLIDE 88

Amplify the Security

Receiver Sender 𝒄′ ← 0,1 π‘š 𝒄 ← 0,1 π‘š

18

slide-89
SLIDE 89

Amplify the Security

… βŠ₯ 𝑛 βŠ₯ … Receiver Sender 𝒄′-th position 2π‘š-positions 𝒄′ ← 0,1 π‘š 𝒄 ← 0,1 π‘š

18

slide-90
SLIDE 90

Amplify the Security

… βŠ₯ 𝑛 βŠ₯ … Receiver Sender 𝒄′-th position 2π‘š-positions 𝒄′ ← 0,1 π‘š 𝒄 ← 0,1 π‘š

18

slide-91
SLIDE 91

Amplify the Security

… βŠ₯ 𝑛 βŠ₯ … Receiver Sender 𝒄′-th position 𝒄-th position … βŠ₯ 𝑛 βŠ₯ … 2π‘š-positions 𝒄′ ← 0,1 π‘š 𝒄 ← 0,1 π‘š

18

slide-92
SLIDE 92

Amplify the Security

… βŠ₯ 𝑛 βŠ₯ … Receiver Sender 𝒄′-th position … βŠ₯ 𝑛 βŠ₯ … 2π‘š-positions 𝒄′ ← 0,1 π‘š 𝒄 ← 0,1 π‘š

18

slide-93
SLIDE 93

Amplify the Security

… βŠ₯ 𝑛 βŠ₯ … Receiver Sender 𝒄′-th position … βŠ₯ 𝑛 βŠ₯ … 2π‘š-positions With Pr = 1 βˆ’ 2βˆ’π‘š, 𝒄 β‰  𝒄′, hide π‘›βˆš 𝒄′ ← 0,1 π‘š 𝒄 ← 0,1 π‘š

18

slide-94
SLIDE 94

… βŠ₯ 𝑛 βŠ₯ …

Amplify the Security

… βŠ₯ 𝑛 βŠ₯ … Receiver Sender 𝒄′-th position 2π‘š-positions With Pr = 2βˆ’π‘š, 𝒄 = 𝒄′, extract π‘›βˆš 𝒄′ ← 0,1 π‘š 𝒄 ← 0,1 π‘š

18

slide-95
SLIDE 95

… βŠ₯ 𝑛 βŠ₯ …

Amplify the Security

… βŠ₯ 𝑛 βŠ₯ … Receiver Sender 𝒄′-th position

  • Can be abstracted as a 2-round statistical hiding extractable

commitment [KKS18]

2π‘š-positions With Pr = 2βˆ’π‘š, 𝒄 = 𝒄′, extract π‘›βˆš 𝒄′ ← 0,1 π‘š 𝒄 ← 0,1 π‘š

18

slide-96
SLIDE 96

𝚻-protocol V P 𝛽 = Com 𝑛 𝛾 𝛿 V P OT2, 𝛿 Prepare 𝑛 𝛾 = CIH𝑙(OT2) OT

1, CIH key 𝑙

𝒄′ ←$ 0,1 π‘š 𝒄 ←$ 0,1 π‘š Receiver(𝒄) Sender πšπ›πͺ𝐭 Compute 𝛿

19

slide-97
SLIDE 97
  • Statistical WI with err β‰ˆ 1/2π‘š (negligible)
  • Computational Soundness via Complexity Leveraging
  • Public Coin Property : OT

1 is pseudorandom

𝚻-protocol V P 𝛽 = Com 𝑛 𝛾 𝛿 V P OT2, 𝛿 Prepare 𝑛 𝛾 = CIH𝑙(OT2) OT

1, CIH key 𝑙

𝒄′ ←$ 0,1 π‘š 𝒄 ←$ 0,1 π‘š Receiver(𝒄) Sender πšπ›πͺ𝐭 Compute 𝛿

19

slide-98
SLIDE 98
  • Statistical WI with err β‰ˆ 1/2π‘š (negligible)
  • Computational Soundness via Complexity Leveraging
  • Public Coin Property : OT

1 is pseudorandom

𝚻-protocol V P 𝛽 = Com 𝑛 𝛾 𝛿 V P OT2, 𝛿 Prepare 𝑛 𝛾 = CIH𝑙(OT2) OT

1, CIH key 𝑙

𝒄′ ←$ 0,1 π‘š 𝒄 ←$ 0,1 π‘š Receiver(𝒄) Sender πšπ›πͺ𝐭 Compute 𝛿

19

slide-99
SLIDE 99
  • Statistical WI with err β‰ˆ 1/2π‘š (negligible)
  • Computational Soundness via Complexity Leveraging
  • Public Coin Property : OT

1 is pseudorandom

𝚻-protocol V P 𝛽 = Com 𝑛 𝛾 𝛿 V P OT2, 𝛿 Prepare 𝑛 𝛾 = CIH𝑙(OT2) OT

1, CIH key 𝑙

𝒄′ ←$ 0,1 π‘š 𝒄 ←$ 0,1 π‘š Receiver(𝒄) Sender πšπ›πͺ𝐭 Compute 𝛿

19

slide-100
SLIDE 100
  • Statistical WI with err β‰ˆ 1/2π‘š (negligible)
  • Computational Soundness via Complexity Leveraging
  • Public Coin Property : OT

1 is pseudorandom

𝚻-protocol V P 𝛽 = Com 𝑛 𝛾 𝛿 V P OT2, 𝛿 Prepare 𝑛 𝛾 = CIH𝑙(OT2) OT

1, CIH key 𝑙

𝒄′ ←$ 0,1 π‘š 𝒄 ←$ 0,1 π‘š Receiver(𝒄) Sender

Statistical Zaps

πšπ›πͺ𝐭 Compute 𝛿

19

slide-101
SLIDE 101

Technical Details Part II: Oblivious Transfer (OT)

20

slide-102
SLIDE 102

Technical Details Part II: Oblivious Transfer (OT)

3-round Statistical Receiver-Private OT Statistical Hash Commitment 2-round Statistical Sender-Private OT Computational Diffie-Hellman

20

slide-103
SLIDE 103

Technical Details Part II: Oblivious Transfer (OT)

3-round Statistical Receiver-Private OT Statistical Hash Commitment 2-round Statistical Sender-Private OT Computational Diffie-Hellman

20

slide-104
SLIDE 104

Statistical Receiver-Private OT

Sender Receiver(𝛾 ∈ {0,1})

𝑛0 𝑛1 𝑛0 𝑛1

Get 𝑛𝛾

21

slide-105
SLIDE 105

Statistical Receiver-Private OT

Sender Receiver(𝛾 ∈ {0,1})

𝑛0 𝑛1 𝑛0 𝑛1

Get 𝑛𝛾

Statistical Receiver-Privacy: 𝛾 is statistical hidden

21

slide-106
SLIDE 106

Main Tool: Statistical Hash Commitments (SHC)

22

slide-107
SLIDE 107

Main Tool: Statistical Hash Commitments (SHC)

Committer(𝛾 ∈ {0,1}) Receiver

22

slide-108
SLIDE 108

Main Tool: Statistical Hash Commitments (SHC)

Committer(𝛾 ∈ {0,1}) Receiver Committing Phase:

22

slide-109
SLIDE 109

Main Tool: Statistical Hash Commitments (SHC)

Committer(𝛾 ∈ {0,1}) Receiver Committing Phase:

22

slide-110
SLIDE 110

Main Tool: Statistical Hash Commitments (SHC)

Committer(𝛾 ∈ {0,1}) Receiver Committing Phase: Opening Phase:

22

slide-111
SLIDE 111

Hash value for 𝛾 = 0:

Main Tool: Statistical Hash Commitments (SHC)

Committer(𝛾 ∈ {0,1}) Receiver Hash value for 𝛾 = 1: Committing Phase: Opening Phase:

22

slide-112
SLIDE 112

Hash value for 𝛾 = 0:

Main Tool: Statistical Hash Commitments (SHC)

Committer(𝛾 ∈ {0,1}) Receiver Hash value for 𝛾 = 1: Committing Phase: Opening Phase:

𝛾,

22

slide-113
SLIDE 113

Hash value for 𝛾 = 0:

Main Tool: Statistical Hash Commitments (SHC)

Committer(𝛾 ∈ {0,1}) Receiver Hash value for 𝛾 = 1: Committing Phase: Opening Phase: Check

=?

𝛾,

22

slide-114
SLIDE 114

Statistical Hash Commitments (SHC): Statistical Hiding Property

Committer 𝛾 = 0 Malicious Receiver

β‰ˆπ‘‘

Malicious Receiver Committer 𝛾 = 1

23

slide-115
SLIDE 115

Statistical Hash Commitments (SHC): Computational Binding

Hash value for 𝛾 = 0: Malicious Committer Receiver Hash value for 𝛾 = 1: Committing Phase:

24

slide-116
SLIDE 116

Statistical Hash Commitments (SHC): Computational Binding

Hash value for 𝛾 = 0: Malicious Committer Receiver Hash value for 𝛾 = 1: Committing Phase:

Computational Binding:

it’s hard for committer to find both

24

slide-117
SLIDE 117

3-round Statistical Receiver-Private OT from SHC

25

slide-118
SLIDE 118

3-round Statistical Receiver-Private OT from SHC

Receiver(𝑐 ∈ {0,1}) Sender(𝑛0, 𝑛1)

25

slide-119
SLIDE 119

3-round Statistical Receiver-Private OT from SHC

Receiver(𝑐 ∈ {0,1}) Sender(𝑛0, 𝑛1) Hash values for opening: Committing Phase

𝑐

25

slide-120
SLIDE 120

3-round Statistical Receiver-Private OT from SHC

Receiver(𝑐 ∈ {0,1}) Sender(𝑛0, 𝑛1) β„Žπ‘‘(β‹…) : Goldreich-Levin hardcore predicate Hash values for opening: Committing Phase

𝑐

25

slide-121
SLIDE 121

3-round Statistical Receiver-Private OT from SHC

Receiver(𝑐 ∈ {0,1}) Sender(𝑛0, 𝑛1)

β„Žπ‘‘ βŠ• 𝑛0 β„Žπ‘‘ βŠ• 𝑛1

β„Žπ‘‘(β‹…) : Goldreich-Levin hardcore predicate Hash values for opening: Committing Phase

𝑐

25

slide-122
SLIDE 122

3-round Statistical Receiver-Private OT from SHC

Receiver(𝑐 ∈ {0,1}) Sender(𝑛0, 𝑛1)

β„Žπ‘‘ βŠ• 𝑛0 β„Žπ‘‘ βŠ• 𝑛1

β„Žπ‘‘(β‹…) : Goldreich-Levin hardcore predicate Hash values for opening: Committing Phase

𝑐

  • Statistical Hiding β‡’ Statistical Receiver-Private
  • Computational Binding β‡’ Computational Sender-Private

25

slide-123
SLIDE 123

Statistical Hash Commitment from 2-round OT

Receiver Committer(𝛾 ∈ 0,1 )

26

slide-124
SLIDE 124

Statistical Hash Commitment from 2-round OT

Receiver Committer(𝛾 ∈ 0,1 ) Secure 2-Party Computation from 2-round OT

← 0,1 πœ‡ 𝛾 0,1 πœ‡ β†’

26

slide-125
SLIDE 125

Statistical Hash Commitment from 2-round OT

Receiver Committer(𝛾 ∈ 0,1 )

  • r

Secure 2-Party Computation from 2-round OT

← 0,1 πœ‡ 𝛾 0,1 πœ‡ β†’

If 𝛾 = 0 If 𝛾 = 1

0: 1:

26

slide-126
SLIDE 126

Statistical Hash Commitment from 2-round OT

Receiver Committer(𝛾 ∈ 0,1 )

  • r

Secure 2-Party Computation from 2-round OT

← 0,1 πœ‡ 𝛾 0,1 πœ‡ β†’ = βŠ•

Where

If 𝛾 = 0 If 𝛾 = 1

0: 1:

26

slide-127
SLIDE 127

Statistical Hash Commitment from 2-round OT

Receiver Committer(𝛾 ∈ 0,1 ) ο‚Ÿ Statistical Sender-Privacy of OT β‡’ Statistical Hiding ο‚Ÿ Computational Hiding of β‡’ Computational Binding

  • r

Secure 2-Party Computation from 2-round OT

← 0,1 πœ‡ 𝛾 0,1 πœ‡ β†’ = βŠ•

Where

If 𝛾 = 0 If 𝛾 = 1

0: 1:

26

slide-128
SLIDE 128

Thank you!

Summary of Results

  • Statistical Zaps from quasi-poly hardness Learning with Errors
  • 3-round statistical receiver-private oblivious transfer from poly hardness
  • 2-round statistical sender-private oblivious transfer
  • Computational Diffie-Hellman Assumption

Full version : ia.cr/2020/235

27