LEAKAGE - RESILIENT PUBLIC - KEY ENCRYPTION FROM OBFUSCATION Dana - - PowerPoint PPT Presentation

leakage resilient public key encryption from obfuscation
SMART_READER_LITE
LIVE PREVIEW

LEAKAGE - RESILIENT PUBLIC - KEY ENCRYPTION FROM OBFUSCATION Dana - - PowerPoint PPT Presentation

LEAKAGE - RESILIENT PUBLIC - KEY ENCRYPTION FROM OBFUSCATION Dana Dachman-Soled, S. Dov Gordon, Feng-Hao Lui, Adam, ONeill, and Hong-Sheng Zhou O UTLINE OF T ALK Leakage Models for PKE Bounded, Continual, and Continual w/ Leakage on


slide-1
SLIDE 1

LEAKAGE-RESILIENT PUBLIC-KEY ENCRYPTION FROM OBFUSCATION


Dana Dachman-Soled, S. Dov Gordon, Feng-Hao Lui, Adam, O’Neill, and Hong-Sheng Zhou

slide-2
SLIDE 2

OUTLINE OF TALK

Leakage Models for PKE — Bounded, Continual, and Continual w/ Leakage on Key Update Results in Continual Model: A Generic Compiler to Achieve Leakage on Key Update Results in Bounded Model: A New Approach to Optimal Leakage Rate Conclusion and Open Problems

slide-3
SLIDE 3

OUTLINE OF TALK

Leakage Models for PKE — Bounded, Continual, and Continual w/ Leakage on Key Update Results in Continual Model: A Generic Compiler to Achieve Leakage on Key Update Results in Bounded Model: A New Approach to Optimal Leakage Rate Conclusion and Open Problems

Uses indistinguishability obfuscation [BGIRSVY’01,GGHRSW’13] and techniques from “deniable encryption” [SW’14].

slide-4
SLIDE 4

OUTLINE OF TALK

Leakage Models for PKE — Bounded, Continual, and Continual w/ Leakage on Key Update Results in Continual Model: A Generic Compiler to Achieve Leakage on Key Update Results in Bounded Model: A New Approach to Optimal Leakage Rate Conclusion and Open Problems

slide-5
SLIDE 5

OUTLINE OF TALK

Leakage Models for PKE — Bounded, Continual, and Continual w/ Leakage on Key Update Results in Continual Model: A Generic Compiler to Achieve Leakage on Key Update Results in Bounded Model: A New Approach to Optimal Leakage Rate Conclusion and Open Problems

Uses indistinguishability obfuscation [BGIRSVY’01,GGHRSW’13] and “punctured programming” [SW’14].

slide-6
SLIDE 6

OUTLINE OF TALK

Leakage Models for PKE — Bounded, Continual, and Continual w/ Leakage on Key Update Results in Continual Model: A Generic Compiler to Achieve Leakage on Key Update Results in Bounded Model: A New Approach to Optimal Leakage Rate Conclusion and Open Problems

slide-7
SLIDE 7

OUTLINE OF TALK

Leakage Models for PKE — Bounded, Continual, and Continual w/ Leakage on Key Update Results in Continual Model: A Generic Compiler to Achieve Leakage on Key Update Results in Bounded Model: A New Approach to Optimal Leakage Rate Conclusion and Open Problems

slide-8
SLIDE 8

BOUNDED LEAKAGE FOR PKE [AGV’09]

Adversary Challenger Fix a public-key encryption scheme . (K, E, D) (pk, sk) ←$ K pk

slide-9
SLIDE 9

BOUNDED LEAKAGE FOR PKE [AGV’09]

Adversary Challenger Fix a public-key encryption scheme . (K, E, D) (pk, sk) ←$ K pk f

slide-10
SLIDE 10

BOUNDED LEAKAGE FOR PKE [AGV’09]

Adversary Challenger Fix a public-key encryption scheme . (K, E, D) (pk, sk) ←$ K pk f f(sk)

slide-11
SLIDE 11

BOUNDED LEAKAGE FOR PKE [AGV’09]

Adversary Challenger Fix a public-key encryption scheme . (K, E, D) (pk, sk) ←$ K pk f f(sk) (m0, m1)

slide-12
SLIDE 12

BOUNDED LEAKAGE FOR PKE [AGV’09]

Adversary Challenger Fix a public-key encryption scheme . (K, E, D) (pk, sk) ←$ K pk f f(sk) (m0, m1) b ←$ {0, 1} c ←$ E(pk, mb)

slide-13
SLIDE 13

BOUNDED LEAKAGE FOR PKE [AGV’09]

Adversary Challenger Fix a public-key encryption scheme . (K, E, D) (pk, sk) ←$ K pk f f(sk) (m0, m1) b ←$ {0, 1} c ←$ E(pk, mb) c

slide-14
SLIDE 14

BOUNDED LEAKAGE FOR PKE [AGV’09]

Adversary Challenger Fix a public-key encryption scheme . (K, E, D) (pk, sk) ←$ K pk f f(sk) (m0, m1) b ←$ {0, 1} c ←$ E(pk, mb) c E b0

slide-15
SLIDE 15

BOUNDED LEAKAGE FOR PKE [AGV’09]

Adversary Challenger Fix a public-key encryption scheme . (K, E, D) (pk, sk) ←$ K pk f f(sk) (m0, m1) b ←$ {0, 1} c ←$ E(pk, mb) c E b0 Return (b = b0)

slide-16
SLIDE 16

BOUNDED LEAKAGE FOR PKE [AGV’09]

Adversary Challenger Fix a public-key encryption scheme . (K, E, D) (pk, sk) ←$ K pk f f(sk) (m0, m1) b ←$ {0, 1} c ←$ E(pk, mb) c E b0 Return (b = b0) ← E 2 · Pr ⇥ b = b0 ⇤ − 1 Require is negligible.

slide-17
SLIDE 17

BOUNDED LEAKAGE FOR PKE [AGV’09]

Adversary Challenger Fix a public-key encryption scheme . (K, E, D) (pk, sk) ←$ K pk f f(sk) (m0, m1) b ←$ {0, 1} c ←$ E(pk, mb) c E b0 Return (b = b0) ← E 2 · Pr ⇥ b = b0 ⇤ − 1 Require is negligible. Must be bounded length!

slide-18
SLIDE 18

CONTINUAL LEAKAGE FOR PKE [BKKV’10,DHLW’10]

Adversary Challenger pk pk Fix a public-key encryption scheme “with key update” i.e. where update algorithm computes . (K, E, D, U)

U sk0 ←$ U(sk)

(pk, sk0) ←$ K ⇥ ⇤

slide-19
SLIDE 19

CONTINUAL LEAKAGE FOR PKE [BKKV’10,DHLW’10]

Adversary Challenger pk pk Fix a public-key encryption scheme “with key update” i.e. where update algorithm computes . (K, E, D, U)

U sk0 ←$ U(sk)

(pk, sk0) ←$ K ⇥ ⇤ f

slide-20
SLIDE 20

CONTINUAL LEAKAGE FOR PKE [BKKV’10,DHLW’10]

Adversary Challenger pk pk Fix a public-key encryption scheme “with key update” i.e. where update algorithm computes . (K, E, D, U)

U sk0 ←$ U(sk)

(pk, sk0) ←$ K ⇥ ⇤

f(sk0)

f

slide-21
SLIDE 21

CONTINUAL LEAKAGE FOR PKE [BKKV’10,DHLW’10]

Adversary Challenger pk pk Fix a public-key encryption scheme “with key update” i.e. where update algorithm computes . (K, E, D, U)

U sk0 ←$ U(sk)

ski ←$ U(ski1)

slide-22
SLIDE 22

CONTINUAL LEAKAGE FOR PKE [BKKV’10,DHLW’10]

Adversary Challenger pk pk Fix a public-key encryption scheme “with key update” i.e. where update algorithm computes . (K, E, D, U)

U sk0 ←$ U(sk)

ski ←$ U(ski1) f

slide-23
SLIDE 23

CONTINUAL LEAKAGE FOR PKE [BKKV’10,DHLW’10]

Adversary Challenger pk pk Fix a public-key encryption scheme “with key update” i.e. where update algorithm computes . (K, E, D, U)

U sk0 ←$ U(sk)

ski ←$ U(ski1)

f(ski)

REPEATS

f

slide-24
SLIDE 24

CONTINUAL LEAKAGE FOR PKE [BKKV’10,DHLW’10]

Adversary Challenger pk (m0, m1) pk Fix a public-key encryption scheme “with key update” i.e. where update algorithm computes . (K, E, D, U)

U sk0 ←$ U(sk)

ski ←$ U(ski1)

f(ski)

REPEATS

f

slide-25
SLIDE 25

CONTINUAL LEAKAGE FOR PKE [BKKV’10,DHLW’10]

Adversary Challenger pk (m0, m1) b ←$ {0, 1} c ←$ E(pk, mb) pk Fix a public-key encryption scheme “with key update” i.e. where update algorithm computes . (K, E, D, U)

U sk0 ←$ U(sk)

ski ←$ U(ski1)

f(ski)

REPEATS

f

slide-26
SLIDE 26

CONTINUAL LEAKAGE FOR PKE [BKKV’10,DHLW’10]

Adversary Challenger pk (m0, m1) b ←$ {0, 1} c ←$ E(pk, mb) c pk Fix a public-key encryption scheme “with key update” i.e. where update algorithm computes . (K, E, D, U)

U sk0 ←$ U(sk)

ski ←$ U(ski1)

f(ski)

REPEATS

f

slide-27
SLIDE 27

CONTINUAL LEAKAGE FOR PKE [BKKV’10,DHLW’10]

Adversary Challenger pk (m0, m1) b ←$ {0, 1} c ←$ E(pk, mb) c E b0 pk Fix a public-key encryption scheme “with key update” i.e. where update algorithm computes . (K, E, D, U)

U sk0 ←$ U(sk)

ski ←$ U(ski1)

f(ski)

REPEATS

f

slide-28
SLIDE 28

CONTINUAL LEAKAGE FOR PKE [BKKV’10,DHLW’10]

Adversary Challenger pk (m0, m1) b ←$ {0, 1} c ←$ E(pk, mb) c E b0 Return (b = b0) pk Fix a public-key encryption scheme “with key update” i.e. where update algorithm computes . (K, E, D, U)

U sk0 ←$ U(sk)

ski ←$ U(ski1)

f(ski)

REPEATS

f

slide-29
SLIDE 29

CONTINUAL LEAKAGE FOR PKE [BKKV’10,DHLW’10]

Adversary Challenger pk (m0, m1) b ←$ {0, 1} c ←$ E(pk, mb) c E b0 Return (b = b0) ← E 2 · Pr ⇥ b = b0 ⇤ − 1 Require is negligible. pk Fix a public-key encryption scheme “with key update” i.e. where update algorithm computes . (K, E, D, U)

U sk0 ←$ U(sk)

ski ←$ U(ski1)

f(ski)

REPEATS

f

slide-30
SLIDE 30

CONTINUAL LEAKAGE FOR PKE [BKKV’10,DHLW’10]

Adversary Challenger pk (m0, m1) b ←$ {0, 1} c ←$ E(pk, mb) c E b0 Return (b = b0) ← E 2 · Pr ⇥ b = b0 ⇤ − 1 Require is negligible. pk Fix a public-key encryption scheme “with key update” i.e. where update algorithm computes . (K, E, D, U)

U sk0 ←$ U(sk)

ski ←$ U(ski1)

f(ski)

REPEATS

Must be bounded length! f

slide-31
SLIDE 31

LEAKAGE ON KEY-UPDATE FOR PKE [BKKV’10,LLW’11]

Adversary Challenger pk pk Fix a public-key encryption scheme “with key update” i.e. where update algorithm computes . (K, E, D, U)

U sk0 ←$ U(sk)

(pk, sk0) ←$ K ⇥ ⇤

slide-32
SLIDE 32

LEAKAGE ON KEY-UPDATE FOR PKE [BKKV’10,LLW’11]

Adversary Challenger pk pk Fix a public-key encryption scheme “with key update” i.e. where update algorithm computes . (K, E, D, U)

U sk0 ←$ U(sk)

(pk, sk0) ←$ K ⇥ ⇤ f

slide-33
SLIDE 33

LEAKAGE ON KEY-UPDATE FOR PKE [BKKV’10,LLW’11]

Adversary Challenger pk pk Fix a public-key encryption scheme “with key update” i.e. where update algorithm computes . (K, E, D, U)

U sk0 ←$ U(sk)

(pk, sk0) ←$ K ⇥ ⇤

f(sk0)

f

slide-34
SLIDE 34

LEAKAGE ON KEY-UPDATE FOR PKE [BKKV’10,LLW’11]

Adversary Challenger pk pk Fix a public-key encryption scheme “with key update” i.e. where update algorithm computes . (K, E, D, U)

U sk0 ←$ U(sk)

ski ←$ U(ski1; ri)

slide-35
SLIDE 35

LEAKAGE ON KEY-UPDATE FOR PKE [BKKV’10,LLW’11]

Adversary Challenger pk pk Fix a public-key encryption scheme “with key update” i.e. where update algorithm computes . (K, E, D, U)

U sk0 ←$ U(sk)

f ski ←$ U(ski1; ri)

slide-36
SLIDE 36

LEAKAGE ON KEY-UPDATE FOR PKE [BKKV’10,LLW’11]

Adversary Challenger pk pk Fix a public-key encryption scheme “with key update” i.e. where update algorithm computes . (K, E, D, U)

U sk0 ←$ U(sk)

REPEATS

f

f(ski, ri)

ski ←$ U(ski1; ri)

slide-37
SLIDE 37

LEAKAGE ON KEY-UPDATE FOR PKE [BKKV’10,LLW’11]

Adversary Challenger pk (m0, m1) pk Fix a public-key encryption scheme “with key update” i.e. where update algorithm computes . (K, E, D, U)

U sk0 ←$ U(sk)

REPEATS

f

f(ski, ri)

ski ←$ U(ski1; ri)

slide-38
SLIDE 38

LEAKAGE ON KEY-UPDATE FOR PKE [BKKV’10,LLW’11]

Adversary Challenger pk (m0, m1) b ←$ {0, 1} c ←$ E(pk, mb) pk Fix a public-key encryption scheme “with key update” i.e. where update algorithm computes . (K, E, D, U)

U sk0 ←$ U(sk)

REPEATS

f

f(ski, ri)

ski ←$ U(ski1; ri)

slide-39
SLIDE 39

LEAKAGE ON KEY-UPDATE FOR PKE [BKKV’10,LLW’11]

Adversary Challenger pk (m0, m1) b ←$ {0, 1} c ←$ E(pk, mb) c pk Fix a public-key encryption scheme “with key update” i.e. where update algorithm computes . (K, E, D, U)

U sk0 ←$ U(sk)

REPEATS

f

f(ski, ri)

ski ←$ U(ski1; ri)

slide-40
SLIDE 40

LEAKAGE ON KEY-UPDATE FOR PKE [BKKV’10,LLW’11]

Adversary Challenger pk (m0, m1) b ←$ {0, 1} c ←$ E(pk, mb) c E b0 pk Fix a public-key encryption scheme “with key update” i.e. where update algorithm computes . (K, E, D, U)

U sk0 ←$ U(sk)

REPEATS

f

f(ski, ri)

ski ←$ U(ski1; ri)

slide-41
SLIDE 41

LEAKAGE ON KEY-UPDATE FOR PKE [BKKV’10,LLW’11]

Adversary Challenger pk (m0, m1) b ←$ {0, 1} c ←$ E(pk, mb) c E b0 Return (b = b0) pk Fix a public-key encryption scheme “with key update” i.e. where update algorithm computes . (K, E, D, U)

U sk0 ←$ U(sk)

REPEATS

f

f(ski, ri)

ski ←$ U(ski1; ri)

slide-42
SLIDE 42

LEAKAGE ON KEY-UPDATE FOR PKE [BKKV’10,LLW’11]

Adversary Challenger pk (m0, m1) b ←$ {0, 1} c ←$ E(pk, mb) c E b0 Return (b = b0) ← E 2 · Pr ⇥ b = b0 ⇤ − 1 Require is negligible. pk Fix a public-key encryption scheme “with key update” i.e. where update algorithm computes . (K, E, D, U)

U sk0 ←$ U(sk)

REPEATS

f

f(ski, ri)

ski ←$ U(ski1; ri)

slide-43
SLIDE 43

LEAKAGE ON KEY-UPDATE FOR PKE [BKKV’10,LLW’11]

Adversary Challenger pk (m0, m1) b ←$ {0, 1} c ←$ E(pk, mb) c E b0 Return (b = b0) ← E 2 · Pr ⇥ b = b0 ⇤ − 1 Require is negligible. pk Fix a public-key encryption scheme “with key update” i.e. where update algorithm computes . (K, E, D, U)

U sk0 ←$ U(sk)

REPEATS

Must be bounded length! f

f(ski, ri)

ski ←$ U(ski1; ri)

slide-44
SLIDE 44

OUTLINE OF TALK

Leakage Models for PKE — Bounded, Continual, and Continual w/ Leakage on Key Update Results in Continual Model: A Generic Compiler to Achieve Leakage on Key Update Results in Bounded Model: A New Approach to Optimal Leakage Rate Conclusion and Open Problems

slide-45
SLIDE 45

COMPILER INTUITION

Suppose we start with a PKE scheme secure in the continual leakage model.

slide-46
SLIDE 46

COMPILER INTUITION

Suppose we start with a PKE scheme secure in the continual leakage model.

slide-47
SLIDE 47

COMPILER INTUITION

Suppose we start with a PKE scheme secure in the continual leakage model. For leakage on key updates, simulator needs to be able to provide “honest-looking” output of function

  • n the update randomness that it doesn’t know.
slide-48
SLIDE 48

COMPILER INTUITION

Suppose we start with a PKE scheme secure in the continual leakage model. For leakage on key updates, simulator needs to be able to provide “honest-looking” output of function

  • n the update randomness that it doesn’t know.
slide-49
SLIDE 49

COMPILER INTUITION

Suppose we start with a PKE scheme secure in the continual leakage model. For leakage on key updates, simulator needs to be able to provide “honest-looking” output of function

  • n the update randomness that it doesn’t know.

Main idea: Make it possible to publicly compute some “honest-looking” update randomness.

slide-50
SLIDE 50

COMPILER INTUITION

Suppose we start with a PKE scheme secure in the continual leakage model. For leakage on key updates, simulator needs to be able to provide “honest-looking” output of function

  • n the update randomness that it doesn’t know.

Main idea: Make it possible to publicly compute some “honest-looking” update randomness.

slide-51
SLIDE 51

COMPILER INTUITION

Suppose we start with a PKE scheme secure in the continual leakage model. For leakage on key updates, simulator needs to be able to provide “honest-looking” output of function

  • n the update randomness that it doesn’t know.

Main idea: Make it possible to publicly compute some “honest-looking” update randomness. This is very similar to deniable encryption as recently achieved by Sahai and Waters [SW’14].

slide-52
SLIDE 52

THE COMPILER

Let be a PKE scheme with key update.

present this version here. Let PKE = (Gen, Enc, Dec, Update) be nature scheme with algorithms

slide-53
SLIDE 53

THE COMPILER

Let be a PKE scheme with key update.

present this version here. Let PKE = (Gen, Enc, Dec, Update) be nature scheme with algorithms

slide-54
SLIDE 54

THE COMPILER

Let be a PKE scheme with key update. Define a new scheme whose public-key additionally contains

  • bfuscations of two programs:

present this version here. Let PKE = (Gen, Enc, Dec, Update) be nature scheme with algorithms

Internal (hardcoded) state: Public key pk, keys K1, K2, and h. On input secret key sk1; randomness u = (u1, u2). – If F2(K2, u1) ⊕ u2 = (sk2, r0) for (proper length) strings sk2, r0 and u1 = h(sk1, sk2, r0), then output sk2. – Else let x = F1(K1, (sk1, u)). Output sk2 = PKE.Update(pk, sk1; x).

  • Fig. 1. Program Update

Internal (hardcoded) state: key K2. On input secret keys sk1, sk2; randomness r ∈ {0, 1}κ – Set u1 = h(sk1, sk2, r). Set u2 = F2(K2, u1) ⊕ (sk2, r). Output e = (u1, u2).

  • Fig. 2. Program Explain
slide-55
SLIDE 55

ANALYSIS 1

Main Idea: Simulator uses obfuscated Explain to produce “honest-looking” randomness.

slide-56
SLIDE 56

ANALYSIS 1

Main Idea: Simulator uses obfuscated Explain to produce “honest-looking” randomness.

slide-57
SLIDE 57

ANALYSIS 1

Main Idea: Simulator uses obfuscated Explain to produce “honest-looking” randomness. But this requires the simulator to access two consecutive keys simultaneously!

slide-58
SLIDE 58

ANALYSIS 1

Main Idea: Simulator uses obfuscated Explain to produce “honest-looking” randomness. But this requires the simulator to access two consecutive keys simultaneously!

slide-59
SLIDE 59

ANALYSIS 1

Main Idea: Simulator uses obfuscated Explain to produce “honest-looking” randomness. But this requires the simulator to access two consecutive keys simultaneously! We thus need to define a new notion of consecutive continual leakage-resilience where the adversary can ask for leakage functions on consecutive keys.

slide-60
SLIDE 60

ANALYSIS 1

Main Idea: Simulator uses obfuscated Explain to produce “honest-looking” randomness. But this requires the simulator to access two consecutive keys simultaneously! We thus need to define a new notion of consecutive continual leakage-resilience where the adversary can ask for leakage functions on consecutive keys.

slide-61
SLIDE 61

ANALYSIS 2

Theorem (informal). The compiled scheme is secure with leakage on key-updates if the original scheme is consecutive continual leakage resilient and the obfuscator is a “public-coin” differing- inputs [IPS’15] obfuscator.

slide-62
SLIDE 62

ANALYSIS 2

Theorem (informal). The compiled scheme is secure with leakage on key-updates if the original scheme is consecutive continual leakage resilient and the obfuscator is a “public-coin” differing- inputs [IPS’15] obfuscator.

slide-63
SLIDE 63

ANALYSIS 2

Theorem (informal). The compiled scheme is secure with leakage on key-updates if the original scheme is consecutive continual leakage resilient and the obfuscator is a “public-coin” differing- inputs [IPS’15] obfuscator. Note: Worse leakage rate achievable only using indistinguishability obfuscation.

slide-64
SLIDE 64

ACHIEVING CONSECUTIVE CONTINUAL

LEAKAGE-RESILIENCE We show that existing continual leakage-resilient PKE schemes [BKKV’10,DHLW’10] can be upgraded to consecutive continual leakage without changing the underlying assumptions.

slide-65
SLIDE 65

ACHIEVING CONSECUTIVE CONTINUAL

LEAKAGE-RESILIENCE We show that existing continual leakage-resilient PKE schemes [BKKV’10,DHLW’10] can be upgraded to consecutive continual leakage without changing the underlying assumptions.

slide-66
SLIDE 66

ACHIEVING CONSECUTIVE CONTINUAL

LEAKAGE-RESILIENCE We show that existing continual leakage-resilient PKE schemes [BKKV’10,DHLW’10] can be upgraded to consecutive continual leakage without changing the underlying assumptions. Via our compiler we get PKE with leakage on key- updates with optimal leakage rate under bilinear map assumptions + public-coin differing-inputs

  • bfuscation [IPS’15].
slide-67
SLIDE 67

COMPARISON TO PRIOR WORK

[LLW’11] achieves continual leakage resilience with leakage on key updates from bilinear map assumptions but worse leakage rate.

slide-68
SLIDE 68

COMPARISON TO PRIOR WORK

[LLW’11] achieves continual leakage resilience with leakage on key updates from bilinear map assumptions but worse leakage rate.

slide-69
SLIDE 69

OUTLINE OF TALK

Leakage Models for PKE — Bounded, Continual, and Continual w/ Leakage on Key Update Results in Continual Model: A Generic Compiler to Achieve Leakage on Key Update Results in Bounded Model: A New Approach to Optimal Leakage Rate Conclusion and Open Problems

slide-70
SLIDE 70

BACKGROUND: SW-PKE [SW’13]

Key-Generation: Choose a key K and output K as the secret key and the obfuscation of a program Encrypt that on inputs x,r outputs F(K,r) + x.

slide-71
SLIDE 71

BACKGROUND: SW-PKE [SW’13]

Key-Generation: Choose a key K and output K as the secret key and the obfuscation of a program Encrypt that on inputs x,r outputs F(K,r) + x.

slide-72
SLIDE 72

BACKGROUND: SW-PKE [SW’13]

Key-Generation: Choose a key K and output K as the secret key and the obfuscation of a program Encrypt that on inputs x,r outputs F(K,r) + x. Encryption: To encrypt x choose random r and compute y = Encrypt(x,r); output (r,y).

slide-73
SLIDE 73

BACKGROUND: SW-PKE [SW’13]

Key-Generation: Choose a key K and output K as the secret key and the obfuscation of a program Encrypt that on inputs x,r outputs F(K,r) + x. Encryption: To encrypt x choose random r and compute y = Encrypt(x,r); output (r,y).

slide-74
SLIDE 74

BACKGROUND: SW-PKE [SW’13]

Key-Generation: Choose a key K and output K as the secret key and the obfuscation of a program Encrypt that on inputs x,r outputs F(K,r) + x. Encryption: To encrypt x choose random r and compute y = Encrypt(x,r); output (r,y). SW’13 shows (a modification of) this scheme is IND- CPA using indistinguishability obfuscation.

slide-75
SLIDE 75

MAKING IT LEAKAGE-RESILIENT

To make the scheme bounded leakage-resilient, we modify it in two ways:

slide-76
SLIDE 76

MAKING IT LEAKAGE-RESILIENT

To make the scheme bounded leakage-resilient, we modify it in two ways:

  • 1. Assume that F is not just a PRF but also a

randomness extractor.

slide-77
SLIDE 77

MAKING IT LEAKAGE-RESILIENT

To make the scheme bounded leakage-resilient, we modify it in two ways:

  • 1. Assume that F is not just a PRF but also a

randomness extractor.

  • 2. Make the secret decryption key not K but
  • bfuscation of program Decrypt that on

input y,r outputs F(K,r)+y.

slide-78
SLIDE 78

ANALYSIS

Theorem (informal). The modified scheme is bounded leakage-resilient using indistinguishability obfuscation.

slide-79
SLIDE 79

ANALYSIS

Theorem (informal). The modified scheme is bounded leakage-resilient using indistinguishability obfuscation.

slide-80
SLIDE 80

ANALYSIS

Theorem (informal). The modified scheme is bounded leakage-resilient using indistinguishability obfuscation. Intuition: Following [SW’13] we use a puncturable PRF and switch F(K,r) used in the challenge ciphertext to a truly random, hardcoded value.

slide-81
SLIDE 81

ANALYSIS

Theorem (informal). The modified scheme is bounded leakage-resilient using indistinguishability obfuscation. Intuition: Following [SW’13] we use a puncturable PRF and switch F(K,r) used in the challenge ciphertext to a truly random, hardcoded value.

slide-82
SLIDE 82

ANALYSIS

Theorem (informal). The modified scheme is bounded leakage-resilient using indistinguishability obfuscation. Intuition: Following [SW’13] we use a puncturable PRF and switch F(K,r) used in the challenge ciphertext to a truly random, hardcoded value. But note we can now leak on this hardcoded value since encryption uses a randomness extractor.

slide-83
SLIDE 83

IMPROVING THE LEAKAGE RATE

This initial idea does not give optimal leakage rate because the secret key is large (contains the

  • bfuscated decryption program).
slide-84
SLIDE 84

IMPROVING THE LEAKAGE RATE

This initial idea does not give optimal leakage rate because the secret key is large (contains the

  • bfuscated decryption program).
slide-85
SLIDE 85

IMPROVING THE LEAKAGE RATE

This initial idea does not give optimal leakage rate because the secret key is large (contains the

  • bfuscated decryption program).

Can we just make this obfuscated program public? Of course not! Then anyone could decrypt.

slide-86
SLIDE 86

IMPROVING THE LEAKAGE RATE

This initial idea does not give optimal leakage rate because the secret key is large (contains the

  • bfuscated decryption program).

Can we just make this obfuscated program public? Of course not! Then anyone could decrypt.

slide-87
SLIDE 87

IMPROVING THE LEAKAGE RATE

This initial idea does not give optimal leakage rate because the secret key is large (contains the

  • bfuscated decryption program).

Can we just make this obfuscated program public? Of course not! Then anyone could decrypt. Solution: Make the program take an additional short signed input to run, this short signed input then becomes the new secret key.

slide-88
SLIDE 88

COMPARISON TO PRIOR WORK

[HLWW’13] showed that any PKE scheme can be made bounded leakage resilient generically but with a suboptimal leakage rate.

slide-89
SLIDE 89

COMPARISON TO PRIOR WORK

[HLWW’13] showed that any PKE scheme can be made bounded leakage resilient generically but with a suboptimal leakage rate.

slide-90
SLIDE 90

COMPARISON TO PRIOR WORK

[HLWW’13] showed that any PKE scheme can be made bounded leakage resilient generically but with a suboptimal leakage rate. Our result can be viewed as showed that

  • bfuscation + OWF is sufficient for optimal

leakage rate.

slide-91
SLIDE 91

COMPARISON TO PRIOR WORK

[HLWW’13] showed that any PKE scheme can be made bounded leakage resilient generically but with a suboptimal leakage rate. Our result can be viewed as showed that

  • bfuscation + OWF is sufficient for optimal

leakage rate.

slide-92
SLIDE 92

COMPARISON TO PRIOR WORK

[HLWW’13] showed that any PKE scheme can be made bounded leakage resilient generically but with a suboptimal leakage rate. Our result can be viewed as showed that

  • bfuscation + OWF is sufficient for optimal

leakage rate. Optimal leakage rate is also known from other specific assumptions, e.g. DDH [NS’09].

slide-93
SLIDE 93

OUTLINE OF TALK

Leakage Models for PKE — Bounded, Continual, and Continual w/ Leakage on Key Update Results in Continual Model: A Generic Compiler to Achieve Leakage on Key Update Results in Bounded Model: A New Approach to Optimal Leakage Rate Conclusion and Open Problems

slide-94
SLIDE 94

SUMMARY

We gave two main results:

slide-95
SLIDE 95

SUMMARY

We gave two main results:

  • 1. Compiler from (consecutive) continual

leakage-resilience to leak on key-updates.

slide-96
SLIDE 96

SUMMARY

We gave two main results:

  • 1. Compiler from (consecutive) continual

leakage-resilience to leak on key-updates.

  • 2. Modification of [SW’13] to achieve bounded

leakage with optimal leakage rate.

slide-97
SLIDE 97

OPEN QUESTIONS

Can we achieve leakage on key-updates with

  • ptimal leakage rate?
slide-98
SLIDE 98

OPEN QUESTIONS

Can we achieve leakage on key-updates with

  • ptimal leakage rate?
slide-99
SLIDE 99

OPEN QUESTIONS

Can we achieve leakage on key-updates with

  • ptimal leakage rate?

Can we achieve optimal leakage rate in the bounded leakage model from indistinguishability (not differing-inputs) obfuscation?

slide-100
SLIDE 100

OPEN QUESTIONS

Can we achieve leakage on key-updates with

  • ptimal leakage rate?

Can we achieve optimal leakage rate in the bounded leakage model from indistinguishability (not differing-inputs) obfuscation?

slide-101
SLIDE 101

OPEN QUESTIONS

Can we achieve leakage on key-updates with

  • ptimal leakage rate?

Can we achieve optimal leakage rate in the bounded leakage model from indistinguishability (not differing-inputs) obfuscation? Can we achieve continual leakage resilience from (differing-inputs) obfuscation?

slide-102
SLIDE 102

THANK YOU!

adam@cs.georgetown.edu