synchronous constructive cry ryptography
play

Synchronous Constructive Cry ryptography Chen-Da Ueli Liu-Zhang - PowerPoint PPT Presentation

Synchronous Constructive Cry ryptography Chen-Da Ueli Liu-Zhang Maurer ETH Zurich ETH Zurich TCC 2020 R rounds R rounds Nave randomness generation 1 2 6


  1. Synchronous Constructive Cry ryptography Chen-Da Ueli Liu-Zhang Maurer ETH Zurich ETH Zurich TCC 2020

  2. 𝑐

  3. 𝑐 R rounds

  4. 𝑐 𝑐 𝑐 𝑐 𝑐 R rounds 𝑐

  5. NaΓ―ve randomness generation 𝑐 1 𝑐 𝑐 2 𝑐 6 𝑐 𝑐 𝑐 𝑐 𝑐 3 R rounds 𝑐 𝑐 5 𝑐 4

  6. NaΓ―ve randomness generation 𝑐 1 𝑐 𝑐 2 𝑐 6 𝑐 𝑐 𝑐 ΰ»„ 𝑐 𝑗 𝑐 𝑐 3 𝑗 R rounds 𝑐 𝑐 5 𝑐 4

  7. Composable Security Modularization Clean guarantees Composition Many existing composable frameworks [PW94,C01,N03,MR11,KT13,…]

  8. Generality vs Simplicity

  9. Generality vs Simplicity Can we design a simple framework for a meaningful restricted setting?

  10. Generality vs Simplicity Can we design a simple framework for a meaningful restricted setting? Precision Teaching Formal Verification

  11. Our Focus Asynchronous Computational Adaptive Permissionless Synchronous Inf. Theoretic Static Permissioned

  12. Future Extension Asynchronous Computational Adaptive Permissionless Synchronous Inf. Theoretic Static Permissioned

  13. Composable Synchronous Models Current models* are built on top of asynchronous model 1. Extra functionalities 2. Activation token 3. Message scheduling Our goal: minimal framework 1. Intuitive descriptions 2. Simple proofs *[Can01,Nie03,HofMul04,KMTZ13]

  14. Specifications Ξ¦

  15. Specifications Ξ¦ 𝒯

  16. Specifications Ξ¦ 𝒯

  17. Constructions 𝒯 β„› 1 β„› 2 Recipe 𝜌 + 𝜌 𝒯, or equivalently, 𝜌(β„›) βŠ† 𝒯 β„› ՜

  18. Constructive Cryptography Ξ¦ resources 2 𝑆 1 3 4 *[Mau11,MR11,MR16]

  19. Constructive Cryptography Ξ¦ resources Ξ£ converters 2 𝜌 𝑆 1 3 4 *[Mau11,MR11,MR16]

  20. Multi-Party Constructive Cryptography 𝒬 = {1, … , π‘œ} Protocol 𝜌 = (𝜌 1 , … , 𝜌 π‘œ ) 2 𝑆 1 3 4

  21. Multi-Party Constructive Cryptography 𝒬 = {1, … , π‘œ} Protocol 𝜌 = (𝜌 1 , … , 𝜌 π‘œ ) 𝜌 2 2 𝜌 1 𝑆 𝜌 3 1 3 4 𝜌 4

  22. Multi-Party Constructive Cryptography 𝒬 = {1, … , π‘œ} Protocol 𝜌 = (𝜌 1 , … , 𝜌 π‘œ ) 𝜌 2 2 𝜌 1 𝑆 𝜌 3 1 3 4 𝜌 4 {Ο€ 𝑗 | π‘—βˆˆπΌ} 𝒯 𝐼 βˆ€πΌ βŠ† 𝑄 β„› 𝐼

  23. Multi-Party Constructive Cryptography 𝒬 = {1, … , π‘œ} Protocol 𝜌 = (𝜌 1 , … , 𝜌 π‘œ ) 2 2 𝒯 {1,3,4} β„› 1,3,4 𝜌 1 𝜌 3 βŠ† 1 3 1 3 4 4 𝜌 4 {Ο€ 𝑗 | π‘—βˆˆπΌ} 𝒯 𝐼 βˆ€πΌ βŠ† 𝑄 β„› 𝐼

  24. Multi-Party Constructive Cryptography 𝒬 = {1, … , π‘œ} Protocol 𝜌 = (𝜌 1 , … , 𝜌 π‘œ ) 2 Ξ¦ β„› 1,3,4 𝜌 1 𝜌 3 βŠ† 1 3 4 𝜌 4 {Ο€ 𝑗 | π‘—βˆˆπΌ} 𝒯 𝐼 βˆ€πΌ βŠ† 𝑄 β„› 𝐼

  25. Multi-Party Constructive Cryptography Traditional simulation-based notion 𝜏 2 2 𝑇 β„› 1,3,4 𝜌 1 𝜌 3 βŠ† 1 3 1 3 4 4 𝜌 4

  26. Multi-Party Constructive Cryptography Traditional simulation-based notion 𝜏 2 2 𝑇 β„› 1,3,4 𝜌 1 𝜌 3 βŠ† 1 3 1 3 4 4 𝒯 {1,3,4} 𝜌 4

  27. Multi-Party Constructive Cryptography Traditional simulation-based notion βˆ— 2 2 𝑇 β„› 1,3,4 𝜌 1 𝜌 3 βŠ† 1 3 1 3 4 4 𝒯 {1,3,4} = {𝜏 2 𝑇 | 𝜏 ∈ Ξ£} 𝜌 4

  28. Synchronous Systems 𝑆 Resource

  29. Synchronous Systems 𝑆 Resource

  30. Synchronous Systems 𝑆 Resource

  31. Synchronous Systems 𝑆 𝜌 Resource Converter

  32. Synchronous Systems 𝑆 𝜌 Resource Converter

  33. Synchronous Systems 𝑆 𝜌 Resource Converter

  34. Synchronous Systems 𝑆 𝜌 Resource Converter

  35. Synchronous Systems 𝜌 𝑆

  36. Synchronous Systems 𝜌 𝑆

  37. Round Structure Round 𝑠 Send Receive

  38. Round Structure Round 𝑠 Send 𝑠. 𝑏 Leakage Send 𝑠. 𝑐 Receive Receive Honest Dishonest

  39. Authenticated Channel with Upper Bound Ξ” β€’ Honest parties are guaranteed to get 𝑛 AUTH 𝑛 after Ξ” rounds Round 𝑙 + Ξ” Round 𝑙 Round 𝑙

  40. Authenticated Channel with Upper Bound Ξ” β€’ Honest parties are guaranteed to get 𝑛 AUTH 𝑛 after Ξ” rounds Round 𝑙 + Ξ” Round 𝑙 β€’ Dishonest parties are guaranteed to get 𝑛 in the same round Round 𝑙

  41. Authenticated Channel with Upper Bound Ξ” β€’ Honest parties are guaranteed to get 𝑛 AUTH 𝑛 after Ξ” rounds π‘Ž Round 𝑙 + Ξ” Round 𝑙 βˆ— β€’ Dishonest parties do not have any guarantee 𝒝𝒱𝒰ℋ Ξ”,π‘Ž = 𝜌 π‘Ž AUTH Ξ” | 𝜌 ∈ Ξ£

  42. Broadcast Validity: If sender is honest, all honest receivers output 𝑛 𝑛 Consistency: All honest receivers output Round 𝑙 the same 𝑛’ Round π‘š

  43. Broadcast Validity: If sender is honest, all honest receivers output 𝑛 (at round π‘š ) 𝑛 Consistency: All honest receivers output Round 𝑙 the same 𝑛’ (at round π‘š ) Round π‘š π‘š = 𝑀 ∧ 𝑄 𝑙 β„¬π’Ÿ 𝑙,π‘š,𝐼 = 𝑆 | βˆƒπ‘€ βˆ€π‘„ π‘˜ ∈ 𝐼 𝑧 π‘˜ 𝑑 ∈ 𝐼 ՜ 𝑀 = 𝑦 𝑑 Consistency Validity

  44. Broadcast π‘š = 𝑀 ∧ 𝑄 𝑙 β„¬π’Ÿ 𝑙,π‘š,𝐼 = 𝑆 | βˆƒπ‘€ βˆ€π‘„ π‘˜ ∈ 𝐼 𝑧 π‘˜ 𝑑 ∈ 𝐼 ՜ 𝑀 = 𝑦 𝑑 Let 𝜌 = (𝜌 1 , … , 𝜌 π‘œ ) be a (standard) broadcast protocol that takes Ξ” rounds 𝜌 𝐼 π’ͺℰ𝒰 βŠ† β„¬π’Ÿ 𝑙,𝑙+Ξ”,𝐼 Standard proof β€’ Validity: If 𝑄 𝑑 ∈ 𝐼 , all honest parties obtain 𝑛 at round 𝑙 + Ξ” β€’ Consistency: All honest parties obtain the same value at round 𝑙 + Ξ”

  45. Computer Resource Instructions Values ins 1 2 3 4 5 … 1 2 4 n 3 … *see also arithmetic black-box [DN03]

  46. Computer Resource Instructions 𝐽 1 Values ins 1 2 3 4 5 … 1 2 4 n 3 …

  47. Computer Resource Instructions 𝐽 1 Values ins 1 2 3 4 5 … 1 2 4 n 3 … 𝐽 1 𝐽 1 𝐽 1 𝐽 1 𝐽 1

  48. Computer Resource Instructions 𝐽 1 𝐽 2 Values ins 1 2 3 4 5 … 1 2 4 n 3 …

  49. Computer Resource Instructions 𝐽 2 𝐽 1 Values ins 1 2 3 4 5 … 1 2 4 n 3 … 𝐽 2 𝐽 2 𝐽 2 𝐽 2 𝐽 2

  50. Computer Resource Instructions 𝐽 4 𝐽 3 𝐽 2 𝐽 1 … Values ins 1 2 3 4 5 … 1 2 4 n 3 …

  51. Computer Resource Instructions 𝐽 4 𝐽 3 𝐽 2 … 𝐽 1 Values ins 1 2 3 4 5 … 1 2 4 n 3 …

  52. Computer Resource Instructions 𝐽 4 𝐽 3 𝐽 2 … 𝐽 1 Values ins 1 2 3 4 5 … 1 2 4 n 3 …

  53. Computer Resource Instruction I: 1. (input, i, p) Instructions 2. (output,i,p) 𝐽 4 𝐽 3 𝐽 2 𝐽 1 … 3. (add,p 1 ,p 2 ,p 3 ) 4. (mult,p 1 ,p 2 ,p 3 ) Values ins 1 2 3 4 5 … 1 2 4 n 3 …

  54. Computer Resource Instruction I: 1. (input, i, p) Instructions 2. (output,i,p) 𝐽 4 𝐽 3 𝐽 2 … 3. (add,p 1 ,p 2 ,p 3 ) 𝐽 1 4. (mult,p 1 ,p 2 ,p 3 ) Values ins 1 2 3 4 5 … 1 2 4 n 3 …

  55. Computer Resource Instruction I: 1. (input, i, p) Instructions 2. (output,i,p) 𝐽 4 𝐽 3 𝐽 2 … 3. (add,p 1 ,p 2 ,p 3 ) 𝐽 1 4. (mult,p 1 ,p 2 ,p 3 ) Values ins 1 2 3 4 5 … 1 2 4 n 3 …

  56. Computer Resource Instruction I: 1. (input, i, p) Instructions 2. (output,i,p) 𝐽 4 𝐽 3 𝐽 2 … 3. (add,p 1 ,p 2 ,p 3 ) 𝐽 1 4. (mult,p 1 ,p 2 ,p 3 ) Values ins 1 2 3 4 5 … 1 2 4 n 3 … v

  57. Computer Resource Instruction I: 1. (input, i, p) Instructions 2. (output,i,p) 𝐽 4 𝐽 3 𝐽 2 … 3. (add,p 1 ,p 2 ,p 3 ) 𝐽 1 4. (mult,p 1 ,p 2 ,p 3 ) Values ins v 1 2 3 4 5 … 1 2 4 n 3 …

  58. Computer Resource Instruction I: 1. (input, i, p) Instructions 2. (output,i,p) 𝐽 4 𝐽 3 𝐽 2 … 3. (add,p 1 ,p 2 ,p 3 ) 𝐽 1 4. (mult,p 1 ,p 2 ,p 3 ) Values ins v 1 2 3 4 5 … 1 2 4 n 3 …

  59. Computer Resource Instruction I: 1. (input, i, p) Instructions 2. (output,i,p) 𝐽 4 𝐽 3 𝐽 2 … 3. (add,p 1 ,p 2 ,p 3 ) 𝐽 1 4. (mult,p 1 ,p 2 ,p 3 ) Values ins v 1 2 3 4 5 … 1 2 4 n 3 … v

  60. Computer Resource Instruction I: 1. (input, i, p) Instructions 2. (output,i,p) 𝐽 4 𝐽 3 𝐽 2 … 3. (add,p 1 ,p 2 ,p 3 ) 𝐽 1 4. (mult,p 1 ,p 2 ,p 3 ) Values ins w v 1 2 3 4 5 … 1 2 4 n 3 …

  61. Computer Resource Instruction I: 1. (input, i, p) Instructions 2. (output,i,p) 𝐽 4 𝐽 3 𝐽 2 … 3. (add,p 1 ,p 2 ,p 3 ) 𝐽 1 4. (mult,p 1 ,p 2 ,p 3 ) Values ins w v v+w 1 2 3 4 5 … 1 2 4 n 3 …

  62. Computer Resource Instruction I: 1. (input, i, p) Instructions 2. (output,i,p) 𝐽 4 𝐽 3 𝐽 2 … 3. (add,p 1 ,p 2 ,p 3 ) 𝐽 1 4. (mult,p 1 ,p 2 ,p 3 ) Values ins w v v βˆ™ w v+w 1 2 3 4 5 … 1 2 4 n 3 …

  63. MPC as Computer Instructions [BGW88] [Mau06] β„¬π’Ÿ, π’ͺℰ𝒰 Values ins 1 2 3 4 5 … 1 2 3 4 n …

  64. Conclusions β€’ Simple model for synchronous protocols β€’ Parties are honest/dishonest β€’ Information-theoretic statements β€’ Flexible to capture property-based formalizations

  65. Full version: https://eprint.iacr.org/2020/1226 Credits: Icons: https://www.flaticon.com/

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend