yehuda uda lindel dell benny pinkas and eli oxman
play

Yehuda uda Lindel dell, Benny Pinkas and Eli Oxman Bar-Ilan - PowerPoint PPT Presentation

Yehuda uda Lindel dell, Benny Pinkas and Eli Oxman Bar-Ilan University, Israel Info forma mation tion theoreti etic Uses aesthetic mathematical tools that are typically very efficient Adversary is computationally unbounded


  1. Yehuda uda Lindel dell, Benny Pinkas and Eli Oxman Bar-Ilan University, Israel

  2.  Info forma mation tion theoreti etic ◦ Uses aesthetic mathematical tools that are typically very efficient ◦ Adversary is computationally unbounded ◦ Requires honest majority  Computa utatio tional nal ◦ Uses computational hardness for oblivious transfer, zero knowledge and more ◦ Adversary runs in polynomial time ◦ Any number of corrupted parties

  3.  Semi mi-hon ones est ◦ Corrupted parties follow protocol, but try to learn more than allowed by inspecting transcript  Maliciou ious ◦ Corrupted parties follow any arbitrary strategy  Covert rt ◦ Corrupted parties follow any strategy ◦ If they follow a strategy enabling them to cheat, then they are guaranteed to be caught with some probability (e.g., ½)

  4.  Step 1 – construct a protocol that is secure for semi-hone onest st adversaries  Step 2 – construct a compil iler that transforms any protocol that is secure for semi-honest adversaries into a protocol that is secure for malicious ous adversaries  The GM GMW87 comp mpiler er achieves es step 2 by using zero-knowl nowledge dge proofs fs (and more) ) to ensure re semi-hone onest st behaviour our

  5.  At Crypto to 2008, , Ishai et al. presente nted d a completel tely y diff fferent t compiler er fo for obtaining ining security ity fo for any number of c f corrupte pted d partie ies  The buildi ding ng blocks ks of f IPS ◦ An information-theoretically secure protocol for computing the functionality (secure for mali lici cious us) ◦ Se Semi-hon honest st protocols for computing simple functions (like shares of the product of shares)  Advanta ntage ges s of f IPS ◦ Excellent asymptotic efficiency ◦ Completely different way of working ◦ Black-box in the semi-honest protocols

  6.  Si Simul mulate te an infor formation ation-th theor eoretic etic proto otocol col that at is secur ure e for or an hone nest st major ority ity (malici licious ous adve versary) rsary) ◦ Let  be an information-theoretic protocol for n parties/servers (n is a parameter to be determined)  A r A real al mu multiparty ltiparty protocol rotocol for r m p m parties rties (w (with ith m< m<n) n) works rks by having ving the m real al part rties ies simul mulate ate an executi cution on of  ◦ The m parties run secure protocols  1 ,…,  n where  i is a secure simulation of the i th server  Se Servers rvers are vi virt rtual al and  is call lled ed the outer ter prot otocol ocol  The m real al part rties ies are call lled ed clients ients and  1 ,…,  n are call lled ed inner ner protocols rotocols

  7. Server Server Server Server 𝑻 𝟐 𝑻 𝟑 𝑻 𝟒 𝑻 𝒐 Real al inner protocols Client Client t 𝝆 𝟐 , … , 𝝆 𝒐 ; Server 𝑻 𝒋 is 𝑸 𝟐 𝑸 𝟑 simulated with inner ner protocol 𝝆 𝒋

  8.  What securi rity ty level is required ed by the inner protoc ocol ols s  1 ,…,  n ? ◦ If they are secure against malicious, this is clearly fine ◦ However, our aim is to use subprotocols that are secure for weaker (say, semi-honest) adversaries ◦ If they are secure for only semi-honest, then what stops a real malicious client from cheating?

  9.  Consi nsider der inner nner proto otocol cols s  1 ,…,  n that at are secur ure e for or cove vert rt adve versaries rsaries ◦ With any cheating detected with probability ½  In order der to cheat at in the outer ter protoc otocol ol  (which hich is secur ure e as long ng as only nly a mi mino nority ity are corrupt rrupt), ), the adve versary rsary has to chea eat t in at least st n/2 inner ner protoco otocols ls ◦ Cheating in an inner protocol is the only way to “corrupt” a server in the outer simulate lated protocol   By the cove vert rt guarante arantees, es, such ch cheati ating g wil ill l go undete detected cted with th probab obabil ility ity at most t 2 -n/2 /2  The protoc otocol ol is there erefor fore secur ure e for or mali lici ciou ous s adversaries versaries

  10.  The challen enge: ge: how to prevent a malicious party from cheating in a semi-honest protocol  Watchi hing: ng: if the randomness (and inputs) that should be used by one party is known to the others, then any cheating can be detected  The IPS watchlis list mechanism: sm: ◦ Each party “watches” every other party in k out of the n (real) inner protocols ◦ No party knows where it’s being watched (oblivious transfer based setup) ◦ Therefore, cheating in many inner protocols is detected with high probability (like covert)

  11.  We study the IPS comp mpile ler r fr from m a numb mber of f diff fferent t angles ◦ Opti timi mization ations: s: we provide efficiency improvements on the IPS construction ◦ Vari ariant ants: s: we apply the IPS paradigm to study covert security and its relation to both semi-honest and malicious adversaries ◦ Conc ncrete ete effi fici cienc ency: y: we calculate the concrete effiency of IPS (in contrast to just asymptotic)

  12.  More eff fficient t wa watchlist hlist setup p protoco ocol ◦ Based on DDH; uses a special committed oblivious transfer type of protocol ◦ Our protocol also gives a more exact result, enabling a tighter cheating probability (yielding better concrete efficiency) ◦ Our setup is much more efficient and allows for the use of more servers (which can be in the thousan ousands ds)  More in the paper…

  13.  IPS constr tructs ucts ma malicious ous fr from m semi mi-hon ones est  We use the IPS paradig igm m to: ◦ Construct covert from semi-honest  Just like IPS but with few watchlists ◦ Construct malicious from covert  As we saw before  Signific ficanc nce ◦ Deepen understanding of covert adversary model (open question from TCC 2010) ◦ Conceptually and technically simple ◦ Better asymptotic efficiency for some problems

  14.  IPS has been shown wn to have excellent nt asymp mptoti otic c eff fficiency cy, , but no one knows s how it behaves s concre rete tely ly ◦ This is due to the high level of abstraction ◦ Efficiency depends on:  The outer information-theoretic protocol used  The inner protocols used  The number of servers and watchlists to obtain a given error

  15.  All mu multipl plic icati ation on gates s require re an interactiv ctive e inner protoco col ◦ Best efficiency is therefore achieved by minimizing the number of multiplications ◦ This is achieved using the packed secret sharing methodology  Note that the mo most eff fficient t info forma mati tion on- theore reti tic c protoc ocol ol is not necessar aril ily y optima mal l here

  16.  The sma mallest st numb mber r of f servers s possible ble should uld give the best eff fficiency cy ◦ Less work in simulating the outer protocol  However, er, less servers s means less corruptio ptions ns needed by the adversar ary y to achieve ve an eff ffective ve dishone onest st majority ty ◦ And so more watchlists to catch cheating ◦ And in turn more servers to maintain an honest majority  Instantia ntiatin ting g IPS concre retel tely y and eff fficientl tly y require res s choose se these parame mete ters rs optimal mally ly

  17.  We carry out an analytic tic and nume merica cal l analysis sis of o f optimal al parameter ers s fo for IPS fo for a n number r of f diff fferent t circuits ts  We have some rather surpris ising ing results ts ◦ For example, for the case of 2 parties and an outer protocol secure for a plain honest majority 4k 4k servers is optimal (3k 3k results in effectively more servers for the same error probability)  Recall k is the number of watchlists

  18.  One of t f the ma major diff fficultie ties s wi with the IPS protoc ocol ol is that its instanti ntiati ation on is diff fferent ◦ For every functi ction on (circuit)  The circuit size and structure affects the choice of block size (for packed secret sharing), affecting the degree of the polynomial, affecting the number of servers and the size of the watchlists and so on  The number of servers can in turn affect the circuit, unless the circuit is over a huge field to start with ◦ For every number ber of cli lients ents  Analyz yzing ng the optimal al number r of f servers, s, wa watchlist list size and so on is a very diff fficult ult task

  19.  AE AES-type type circu rcuit it (2400 00 gates es ove ver r 100 layers) ers) ◦ A minimal number of OT’s and multiplications is achieved by taking block size n/73 73 (numerical analysis)  For r this is blo lock ck size e (and proto otocol col thre hresh shold) old) we found und “optimal” param ameters eters for r erro ror 2 -40 40 : ◦ Number of servers n=17 1752 ◦ Number of watchlists k=207 07  The actual ual cost st (for or 2 different fferent choi oices ces of the inner nner mult ltipl iplic icati ation n pro rotoco tocol) l) ◦ 13.8 million OT’s and 4.5 billion field multiplications ◦ 5.5 million OT’s and 5.5 billion field multiplications  What’s better ? It probably robably depends ends on the machine…

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend