Threshold Cryptosystems from Threshold Fully Homomorphic Encryption - - PowerPoint PPT Presentation

threshold cryptosystems from threshold
SMART_READER_LITE
LIVE PREVIEW

Threshold Cryptosystems from Threshold Fully Homomorphic Encryption - - PowerPoint PPT Presentation

Threshold Cryptosystems from Threshold Fully Homomorphic Encryption Aayush Jain, UCLA AUTHORS: DAN BONEH, ROSARIO GENNARO, STEVEN GOLDFEDER, AAYUSH JAIN, SAM KIM, PETER M. R. RASMUSSEN AND AMIT SAHAI Introduction to Characters Thanos: Bad Guy


slide-1
SLIDE 1

Threshold Cryptosystems from Threshold Fully Homomorphic Encryption

AUTHORS: DAN BONEH, ROSARIO GENNARO, STEVEN GOLDFEDER, AAYUSH JAIN, SAM KIM, PETER M. R. RASMUSSEN AND AMIT SAHAI

Aayush Jain, UCLA

slide-2
SLIDE 2

Introduction to Characters

Tony Stark: Good Guy Thanos: Bad Guy

slide-3
SLIDE 3

Key Management

For security, need to have private information.

slide-4
SLIDE 4

Key Management

slide-5
SLIDE 5

Key Management

Key Management is prone to side channel leaks, social hacking, human error etc.

slide-6
SLIDE 6

Main Question

Can we address this issue at more fundamental level?

slide-7
SLIDE 7

Threshold Cryptography

Secret Sharing

slide-8
SLIDE 8

Threshold Cryptography

slide-9
SLIDE 9

Threshold Cryptography (t out of n)

slide-10
SLIDE 10

Threshold Signatures

slide-11
SLIDE 11

Threshold Signatures

Requirements: Unforgeability, Compactness, Correctness, Robustness etc..

slide-12
SLIDE 12

Threshold Public Key Encryption

slide-13
SLIDE 13

Threshold Public Key Encryption

Requirements: CCA Security, Compactness, Correctness, Robustness etc..

slide-14
SLIDE 14

Related Works

  • RSA Signatures [Fra89, DDFY94, GRJK07, Sho00]
  • Schnorr Signatures [SS01]
  • (EC)DSA Signatures [GJKR01, GGN16]
  • BLS Signatures [BLS04, Bol03]
  • Cramer-Shoup Encryption [CG99]
  • Many More [SG02, DK05, BBH06,…]
slide-15
SLIDE 15

Our Results

  • Construct Threshold Fully Homomorphic Encryption (TFHE)
  • Formalised the concept of Universal Thresholdizer (UT).
  • Show how to use UT as a general tool for constructing threshold

cryptosystems

  • Construct UT from TFHE.
  • New Constructions for a variety of threshold cryptosystems:

Threshold Signatures, CCA secure PKE, distributed PRFs, Function Secret Sharing from LWE

slide-16
SLIDE 16

Threshold Fully Homomorphic Encryption

slide-17
SLIDE 17

Threshold Fully Homomorphic Encryption (TFHE)

slide-18
SLIDE 18

Security Definitions

slide-19
SLIDE 19

Starting Point: [GSW13] FHE Scheme

slide-20
SLIDE 20

Recap: [GSW13]

slide-21
SLIDE 21

Recap: [GSW13]

slide-22
SLIDE 22

Very First Observation

slide-23
SLIDE 23

Initial Idea

Noise leaks too much information (in form of linear equations), and leads to attacks!

FHE decryption should just reveal message

slide-24
SLIDE 24

Smudging with noise

Correctness is lost!

slide-25
SLIDE 25

How to Fix Noise Blowup?

  • Define a new linear secret sharing scheme with low-norm

reconstruction coefficients.

  • Two ways of doing that:
  • 1. A general purpose secret sharing scheme supporting broader

access patterns.

  • 2. More direct modification of Shamir Secret Sharing scheme leading

to shorter keys, albeit slightly larger ciphertexts.

slide-26
SLIDE 26

{0,1}-LSSS

slide-27
SLIDE 27

How Expressive is {0,1}-LSSS?

And OR And

slide-28
SLIDE 28

How Expressive is {0,1}-LSSS

slide-29
SLIDE 29

Recap

Correctness is not lost! Needs careful Security Analysis

slide-30
SLIDE 30

More direct way

slide-31
SLIDE 31

Comparison of two schemes

Ciphertext /Public Key Size Key Size/Partial Decryption Size Access Structure {0,1}-LSSS Scheme Monotone Boolean Formulas Clearing Denominators Threshold Access Structures

slide-32
SLIDE 32

Threshold Signatures

slide-33
SLIDE 33

Universal Thresholdizer

slide-34
SLIDE 34

Our Results

  • Construct Threshold Fully Homomorphic Encryption (TFHE)
  • Formalised the concept of Universal Thresholdizer (UT).
  • Show how to use UT as a general tool for constructing threshold

cryptosystems

  • Construct UT from TFHE.
  • New Constructions for a variety of threshold cryptosystems:

Threshold Signatures, CCA secure PKE, distributed PRFs, Function Secret Sharing from LWE

slide-35
SLIDE 35

Application of Techniques

  • Lazy MPC [BJMS18]: An MPC where honest parties can ``go to

sleep”- limited computing power, lost connection etc..

  • Theoretical Outcome: First MPC with Guaranteed Output Delivery in

the standard model in three rounds (Concurrent with [ACGJ18]).

  • Amplification: Given an FE/iO candidate with partial security, output

a fully secure candidate. Appeared in [AJKS18]

slide-36
SLIDE 36

Open Problems

  • Not relying on FHE? (More efficient construction)
  • More applications
  • Better assumptions? (polynomial approximation factor)