Risky Traitor Tracing and New Differential Privacy Negative Results - - PowerPoint PPT Presentation

risky traitor tracing and new differential privacy
SMART_READER_LITE
LIVE PREVIEW

Risky Traitor Tracing and New Differential Privacy Negative Results - - PowerPoint PPT Presentation

Risky Traitor Tracing and New Differential Privacy Negative Results Rishab Goyal Venkata Koppula Andrew Russell Brent Waters Hardness of Non-Interactive Differential Privacy from One-Way Functions Lucas Kowalczyk Tal Malkin Jonathan


slide-1
SLIDE 1

Risky Traitor Tracing and New Differential Privacy Negative Results

Rishab Goyal Venkata Koppula Andrew Russell Brent Waters

Hardness of Non-Interactive Differential Privacy from One-Way Functions

Lucas Kowalczyk Tal Malkin Jonathan Ullman Daniel Wichs

slide-2
SLIDE 2

Risky Traitor Tracing and New Differential Privacy Negative Results Differential Privacy Negative Results

Rishab Goyal Venkata Koppula Andrew Russell Brent Waters

slide-3
SLIDE 3

Traitor Tracing [Chor-Fiat-Naor 94]

3

Key Challenges: (1) Obfuscated Decoder (2) Collusions

Decoder

Find Traitors

slide-4
SLIDE 4

Tracing Algorithms

4

slide-5
SLIDE 5

5

(1) No false trace: (2) Catch:

slide-6
SLIDE 6

It’s About the Ciphertext Size!

PKE: Bilinear Maps [Boneh-Sahai-Waters06,Boneh-Waters06…]: Functional Encryption/iO[GGHRSW13,Boneh-Zhandry14]:

6

Can we get better efficiency from standard assumptions if we relax tracing requirement?

(* Subsequent to this work, G-Koppula-Waters gave an LWE-based standard TT scheme matching FE/iO-based efficiency.)

slide-7
SLIDE 7

(1) No false trace: (2) Catch:

Relaxing Tracing

7

(1) No false trace: (2) Catch:

slide-8
SLIDE 8

(Main) Results [G-Koppula-Russell-Waters]

slide-9
SLIDE 9

Remaining Talk

Part I: Risky Traitor Tracing Part II: Differential Privacy Negative

9

Part II: Differential Privacy Negative Results (Luke)

slide-10
SLIDE 10
  • Persistent decoder setting

– Periodic key refreshes, decoder must work across cycles – Catching probability can be amplified

Standalone Risky TT Applications

  • Resource constrained settings

– Get best possible tracing w/ 10 KB ciphertext overhead

  • Risk averse attackers

– Deterrence against attackers if traitors heavily penalized – Heavy penalty vs. Low catching probability

slide-11
SLIDE 11

Framework for Risky TT – Mixed Bit Matching Encryption

11

slide-12
SLIDE 12

Mixed Bit Matching Security

Security: 3 properties PK/SK CT Hiding  Distinguish

12

CT Hiding  Key Hiding  Distinguish Distinguish

slide-13
SLIDE 13

Transformation to Risky TT

13

slide-14
SLIDE 14

Transformation to Risky TT

14

slide-15
SLIDE 15

Transformation to Risky TT

15

slide-16
SLIDE 16

Transformation to Risky TT

Check if decoder is correct

16

is correct

Do this poly times

slide-17
SLIDE 17

Transformation to Risky TT

Successful decryption probability

17

slide-18
SLIDE 18
  • Security proof of the transformation

– Significantly departs from existing proof techniques for TT

  • Building Mixed Bit Matching Encryption from Bilinear

Missing Pieces and Other Results

  • Building Mixed Bit Matching Encryption from Bilinear

Maps

  • Generic risky amplification

– Improving success probability of tracing

18

slide-19
SLIDE 19

Remaining Talk

Part I: Building Risky Traitor Tracing Part II: Differential Privacy Negative

19

Part II: Differential Privacy Negative Results (Luke)

slide-20
SLIDE 20