Randomness Dependent Randomness Dependent Message Security g y - - PowerPoint PPT Presentation

randomness dependent randomness dependent message
SMART_READER_LITE
LIVE PREVIEW

Randomness Dependent Randomness Dependent Message Security g y - - PowerPoint PPT Presentation

Randomness Dependent Randomness Dependent Message Security g y Eleanor Birrell Kai Min Chung Rafael Pass Sidharth Telang Public key Encryption Public key Encryption Goal: l (pk,sk) Gen c = Enc(pk,m) E ( k ) Dec(sk,c) = m


slide-1
SLIDE 1

Randomness‐Dependent Randomness‐Dependent Message Security g y

Eleanor Birrell Kai‐Min Chung Rafael Pass Sidharth Telang

slide-2
SLIDE 2

Public key Encryption Public key Encryption

l

  • Goal:

E ( k ) (pk,sk) ← Gen c = Enc(pk,m) Dec(sk,c) = m

Encryption scheme (Gen Enc Dec) Encryption scheme (Gen, Enc, Dec) Formal security: CPA/CCA

slide-3
SLIDE 3

CPA security CPA security

pk m m m0 m1

Encpk(m0;r) Encpk(m1;r)

slide-4
SLIDE 4

CPA security CPA security

m0 m1 do not pk m0, m1 do not depend on sk or r m m m0 m1

Encpk(m0;r) Encpk(m1;r)

slide-5
SLIDE 5

m m do not m0, m1 do not depend on sk or r

Good for many settings Not good for some

slide-6
SLIDE 6

m m do not m0, m1 do not depend on sk or r

Good for many settings Not good for some r Enc: CPA secure sk m All bets are off!

slide-7
SLIDE 7

m m do not m0, m1 do not depend on sk or r

Good for many settings Not good for some r Enc: CPA secure sk m All bets are off!

  • but key dependent messages (KDM) are useful!

but key dependent messages (KDM) are useful! practically and theoretically ABBC, CKVW10, G09, BRS02,CL01, BPS08, BHHO08 etc. BRS02,CL01, BPS08, BHHO08 etc.

  • Intensely studied, lots of work…
slide-8
SLIDE 8

m m do not m0, m1 do not depend on sk or r

Good for many settings Not good for some r Enc: CPA secure m All bets are off!

  • randomness dependent messages (RDM)

randomness dependent messages (RDM)

  • implicit in MS09, HLW12, BBNRSSY09
  • explicit in HO10

explicit in HO10

  • much less studied
slide-9
SLIDE 9

Why RDM? Why RDM?

1) RDM happens! (involuntary attack)

r1 r2

1 2

correlated! HDWH12 HDWH12

slide-10
SLIDE 10

Why RDM? Why RDM?

1) RDM happens! (involuntary attack)

r1 r2

1 2

correlated! Enc m

slide-11
SLIDE 11

Why RDM? Why RDM?

2) RDM is useful! (voluntary attack) e.g.

  • MS09, HLW12: 1‐bit CCA2 => many‐bit CCA2
  • HO10: lossy encryption => inj OW TDF

HO10: lossy encryption => inj. OW. TDF.

slide-12
SLIDE 12

RDM security [HO10] RDM security [HO10]

security against any RDM function

pk f :circuit f :circuit f0:circuit f1:circuit

Encpk(f0(r);r) Encpk(f1(r);r)

slide-13
SLIDE 13

“weak” RDM security weak RDM security

f d f d t f0 and f1 do not depend on pk

f :circuit f :circuit f0:circuit f1:circuit

Encpk(f0(r);r) Encpk(f1(r);r)

Hedged Encryption [BBNRSSY09] => weak RDM security

slide-14
SLIDE 14

RDM security RDM security

f f d

pk

  • ur focus: f0 and

f1 depend on pk

f :circuit f :circuit f0:circuit f1:circuit

Encpk(f0(r);r) Encpk(f1(r);r)

slide-15
SLIDE 15

2 circular RDM security 2‐circular RDM security

pk f g:circuits f, g:circuits

c1 = Encpk(f(r2);r1) c2 = Encpk(g(r1,c1);r2)

slide-16
SLIDE 16

k circular RDM security k‐circular RDM security

k=2

pk

k=2

f g:circuits f, g:circuits

c1 = Encpk(f(r2);r1) c1 = Encpk(0;r1)

c2 = Encpk(g(r1,c1);r2) c2 = Encpk(0;r2)

slide-17
SLIDE 17

k circular RDM security k‐circular RDM security

pk f g :circuits f i it f0, g0:circuits f1, g1:circuits

this work: k i l RDM i

c1 = Encpk(f0(rb);ra) c1 = Encpk(f1(rb);r1)

k‐circular RDM security => RDM security RDM security

c2 = Encpk(g(r1,c1);r2) c2 = Encpk(0;r2)

slide-18
SLIDE 18

Q i C i l RDM Question: Can we get circular RDM, or even RDM security even RDM security i.e. security against any RDM function?

slide-19
SLIDE 19

Our results Our results

“Full” RDM security i.e. security against any RDM function

  • Impossible in standard model

p

  • => circular RDM impossible too
slide-20
SLIDE 20

“Full” RDM is impossible Full RDM is impossible

pk f :circuit f :circuit f0:circuit f1:circuit

Encpk(f0(r);r) Encpk(f1(r);r)

slide-21
SLIDE 21

“Full” RDM is impossible Full RDM is impossible

pk f :circuit f :circuit f0:circuit f1:circuit

f0(r) = b’ such that Enc (b’;r) “signals” 0 f1(r) = b’ such that Enc (b’;r) “signals” 1 Encpk(b ;r) signals 0 Encpk(b ;r) signals 1

slide-22
SLIDE 22

“Full” RDM is impossible Full RDM is impossible

pk f :circuit f :circuit f0:circuit f1:circuit

f0(r) = b’ such that Enc (b’;r)’s 1st bit is 0 f1(r) = b’ such that Enc (b’;r)’s 1st bit is 1 Encpk(b ;r) s 1st bit is 0 Encpk(b ;r) s 1st bit is 1

slide-23
SLIDE 23

“Full” RDM is impossible Full RDM is impossible

pk f :circuit f :circuit f0:circuit f1:circuit

f0(r) = b’ such that Enc (b’;r)’s 1st bit is 0 f1(r) = b’ such that Enc (b’;r)’s 1st bit is 1 Encpk(b ;r) s 1st bit is 0 Encpk(b ;r) s 1st bit is 1

Use randomness extractor to get signal bit

slide-24
SLIDE 24

Question: Can we get bounded RDM Question: Can we get bounded R M security? i.e. security against a priori bounded size RDM functions? size RDM functions?

slide-25
SLIDE 25

Our results

Bounded circular RDM security

  • Theorem 1: for any poly s, exists transformation s.t.

circular secure any CPA secure Enc circular secure against size s RDM functions

transformation: Enc(m ; preprocess(r) )

RDM functions

transformation: Enc(m ; preprocess(r) )

  • r needs to be “long”
  • r needs to be long

We also show: black‐box barriers for proving RDM security if r is shorter than m proving RDM security if r is shorter than m

slide-26
SLIDE 26

Our results

Bounded circular RDM security with “short” Bounded circular RDM security with short randomness

  • Theorem 2: For any poly s
  • Theorem 2: For any poly s,

exists scheme that is circular secure against size s RDM functions RDM functions with arbitrary message and randomness length assuming lossy trapdoor function [PW08] assuming lossy trapdoor function [PW08]

slide-27
SLIDE 27

Thm1: Bounded circular RDM security from Thm1: Bounded circular RDM security from CPA/CCA

slide-28
SLIDE 28

Thm1: Bounded circular RDM security from Thm1: Bounded circular RDM security from CPA/CCA

  • View RDM as indirect randomness leakage

View RDM as indirect randomness leakage

  • Idea:

use CPA secure (Gen,Enc,Dec) and r “long” enough use CPA secure (Gen,Enc,Dec) and r long enough

Encpk(m ; preprocess(r) )

preprocess: randomness extraction

slide-29
SLIDE 29

fb: s‐bounded leakage function

b s bou ded ea age u ct o

r|fb(r): s‐“bounded leaked source” Encpk(m ; extr(seed,r) )

  • Seeded extractors don’t work

Seeded extractors don t work require seed and source independence!

pk, seed

fb

slide-30
SLIDE 30

fb: s‐bounded leakage function

b s bou ded ea age u ct o

r|fb(r): s‐“bounded leaked source” Encpk(m ; extr(r) )

  • need deterministic extraction that works for

need deterministic extraction that works for all s‐bounded leaked sources

pk, extr

fb

slide-31
SLIDE 31

fb: s‐bounded leakage function

b s bou ded ea age u ct o

r|fb(r): s‐“bounded leaked source” Encpk(m ; extr(r) )

  • need deterministic extraction that works for

need deterministic extraction that works for all s‐bounded leaked sources

We show: Deterministic extraction Lemma for bounded leaked sources w.h.p h ← t‐wise ind. hash, for all s‐bounded leaked sources with high min‐entropy fb(r),h(r) ≈ fb(r),U

slide-32
SLIDE 32

We show: Deterministic extraction Lemma for bounded leaked sources w.h.p h ← t‐wise ind. hash, for all s‐bounded leaked sources with high min‐entropy fb(r),h(r) ≈ fb(r),U TV00: Deterministic extraction Lemma for bounded samplable sources bounded samplable sources w.h.p h ← t‐wise ind. hash, for all s‐bounded samplable sources X with for all s bounded samplable sources X with high min‐entropy h(X) ≈ U h(X) ≈ U

slide-33
SLIDE 33

Bounded circular RDM security

  • For any poly s

y p y circular secure any CPA secure Enc circular secure against size s RDM functions

Enc(m ; hasht wise indep(r) )

RDM functions

Enc(m ; hasht‐wise indep(r) )

‐ In paper: black‐box barriers for In paper: black box barriers for proving RDM security on a falsifiable assumption if r is shorter than m is shorter than m

slide-34
SLIDE 34

Bounded circular RDM security with “short” randomness?

slide-35
SLIDE 35

Thm2: Bounded circular RDM security with arbitrary message and randomness length with arbitrary message and randomness length from lossy trapdoor function (LTDF)

slide-36
SLIDE 36

Hedged Encryption [BBNRSSY09] g yp [ ] secure w.r.t. RDM functions don’t depend on pk ‐ from lossy trapdoor functions (LTDF)

k d LHL [DS08]

from lossy trapdoor functions (LTDF)

crooked LHL [DS08] For all sources X with high min entropy pk fb r with high min‐entropy and functions with small range f Enc invertible small range f f(h(X)) ≈ f(U) pairwise independent works only when X and h are p permutation h X and h are independent

slide-37
SLIDE 37

We show: Crooked det. ext. for bounded leaked sources h h ← t i i d h h w.h.p h ← t‐wise ind. hash, for all bounded leaked sources X with high min‐entropy d f ti ith ll f and functions with small range f f(h(X)) ≈ f(U) pk fb r Enc t‐wise independent p h

slide-38
SLIDE 38

pk f r pk fb r Enc Enc t‐wise independent p h

permutation? p

Invertible?

  • pen problem
  • pen problem

Almost t‐wise doesn’t suffice

slide-39
SLIDE 39

pk f r pk fb r E ’ Enc’ t‐wise independent h Instead we modify scheme so that we don’t need permutation => can use standard polynomial construction, invert with Berlekamp algorithm

slide-40
SLIDE 40

RDM (why? it happens and it’s useful) RDM (why? it happens and it s useful)

“Full” RDM security i.e. security w.r.t. all RDM functions

  • Impossible in standard model (rules out circular)
  • Secure construction in “ultra weak” RO model
  • Secure construction in ultra‐weak RO model

(i.e. reduction neither programs oracle nor sees queries to it) “Bounded” circular RDM security i e sec rit rt RDM f nctions of a priori bo nded si e i.e. security w.r.t. RDM functions of a priori bounded size

  • From lossy trapdoor functions
  • From CPA/CCA secure schemes

From CPA/CCA secure schemes ‐ construction with “long” randomness ‐ barriers for secure constructions with “short” randomness