Collusion-Preserving Computation Jol Alwen (ETH Zrich) Jonathan - - PowerPoint PPT Presentation

collusion preserving computation
SMART_READER_LITE
LIVE PREVIEW

Collusion-Preserving Computation Jol Alwen (ETH Zrich) Jonathan - - PowerPoint PPT Presentation

Collusion-Preserving Computation Jol Alwen (ETH Zrich) Jonathan Katz (U. Maryland) Ueli Maurer (ETH Zrich) Vassilis Zikas (U. Maryland) Overview l Motivation & Goals l Definition l Fall-back Security l Synchronization


slide-1
SLIDE 1

Collusion-Preserving Computation

Joël Alwen (ETH Zürich) Jonathan Katz (U. Maryland) Ueli Maurer (ETH Zürich) Vassilis Zikas (U. Maryland)

slide-2
SLIDE 2

Overview

l Motivation & Goals l Definition l Fall-back Security l Synchronization Pollution l Implications for Game Theory l Future Directions

slide-3
SLIDE 3

Goals (1)

slide-4
SLIDE 4

Goals (1)

l Primary Goal: A realization notion bounding the

capabilities of deviating coalitions even in the presence of arbitrary composition.

slide-5
SLIDE 5

Goals (1)

l Primary Goal: A realization notion bounding the

capabilities of deviating coalitions even in the presence of arbitrary composition.

l

“R realizes F” = R can be used in place of F

slide-6
SLIDE 6

Goals (1)

l Primary Goal: A realization notion bounding the

capabilities of deviating coalitions even in the presence of arbitrary composition.

l

“R realizes F” = R can be used in place of F

l

“capabilities of deviating coalitions” = such that even collaborating “dishonest” players can do no more with R then they could with F

slide-7
SLIDE 7

Goals (1)

l Primary Goal: A realization notion bounding the

capabilities of deviating coalitions even in the presence of arbitrary composition.

l

“R realizes F” = R can be used in place of F

l

“capabilities of deviating coalitions” = such that even collaborating “dishonest” players can do no more with R then they could with F

l

“arbitrary composition” = regardless of any concurrent activities in which they may be involved.

slide-8
SLIDE 8

Example Use Cases

slide-9
SLIDE 9

Example Use Cases

l Composable Game Theory.

l

Extreme case of deviating coalitions.

slide-10
SLIDE 10

Example Use Cases

l Composable Game Theory.

l

Extreme case of deviating coalitions.

l Collusion-Free (CF) MPC robust in the

presence of side-channels.

l

CF (provably) not concurrently composable

slide-11
SLIDE 11

Example Use Cases

l Composable Game Theory.

l

Extreme case of deviating coalitions.

l Collusion-Free (CF) MPC robust in the

presence of side-channels.

l

CF (provably) not concurrently composable

l Other (intuitive) examples requiring bounds on

collaborating dishonest players.

l

Incoercability: Coercer/Informant & Coercee.

l

Auctions: Bid fixing by corrupt bidders.

l

Bounded Isolation: Useful for say, poker or bridge

slide-12
SLIDE 12

Goals (2)

slide-13
SLIDE 13

Goals (2)

l

Generic definition independent of communication resource R.

Better for comparing different constructions.

Allows investigating minimal properties for resource R used to realize a given F.

slide-14
SLIDE 14

Goals (2)

l

Generic definition independent of communication resource R.

Better for comparing different constructions.

Allows investigating minimal properties for resource R used to realize a given F.

l

Non-triviality: strong fall-back security even if R “miss-behaves”.

slide-15
SLIDE 15

Goals (2)

l

Generic definition independent of communication resource R.

Better for comparing different constructions.

Allows investigating minimal properties for resource R used to realize a given F.

l

Non-triviality: strong fall-back security even if R “miss-behaves”.

l

Concrete communication resource R & construction for many F.

slide-16
SLIDE 16

Goals (2)

l

Generic definition independent of communication resource R.

Better for comparing different constructions.

Allows investigating minimal properties for resource R used to realize a given F.

l

Non-triviality: strong fall-back security even if R “miss-behaves”.

l

Concrete communication resource R & construction for many F.

l

Explore implications for composable Game

slide-17
SLIDE 17

Related Work

slide-18
SLIDE 18

Related Work

l SFE/MPC [GMW, BGW,...]

l

First generic realization notions.

Not generally composable

Gives deviating coalitions arbitrary (internal) capabilities (monolithic adversary)

slide-19
SLIDE 19

Related Work

l SFE/MPC [GMW, BGW,...]

l

First generic realization notions.

Not generally composable

Gives deviating coalitions arbitrary (internal) capabilities (monolithic adversary)

l Arbitrary composition [Can, PW, CLOS, CDPW,...]

l

Exa: UC, GUC, JUC, etc.

But monolithic adversary

slide-20
SLIDE 20

Related Work

l SFE/MPC [GMW, BGW,...]

l

First generic realization notions.

Not generally composable

Gives deviating coalitions arbitrary (internal) capabilities (monolithic adversary)

l Arbitrary composition [Can, PW, CLOS, CDPW,...]

l

Exa: UC, GUC, JUC, etc.

But monolithic adversary

l Collusion-Free (CF) computation [LMPS, ILM, ASV,

AKLPSV]

l

Bounds deviating coalitions (via split adversaries)

slide-21
SLIDE 21

CF is not Composable

slide-22
SLIDE 22

CF is not Composable

l = 2-party null functionality (does nothing) l Define and protocol π = ( , )

F R π2 π1

slide-23
SLIDE 23

CF is not Composable

l = 2-party null functionality (does nothing) l Define and protocol π = ( , )

m ∈ {0,1}

π1 π2

R

2k

r ← {0,1} (unif. rand.)

k

r' ∈ {0,1}

k

If r' = r ⇒ a := m Else ⇒ a := ⊥ a

F R π2 π1

slide-24
SLIDE 24

CF is not Composable

l = 2-party null functionality (does nothing) l Define and protocol π = ( , )

l

r is uniform random and allows no communication between

  • simulators. ⇒ Can always simulate for with a = ⊥.

⇒ CF-realizes via π.

m ∈ {0,1}

π1 π2

R

2k

r ← {0,1} (unif. rand.)

k

r' ∈ {0,1}

k

If r' = r ⇒ a := m Else ⇒ a := ⊥ a

F R π2 π1 π1

F F R

slide-25
SLIDE 25

CF is not Composable

l = 2-party null functionality (does nothing) l Define and protocol π = ( , )

l

r is uniform random and allows no communication between

  • simulators. ⇒ Can always simulate for with a = ⊥.

⇒ CF-realizes via π.

l

Now compose with ; a k-bit channel from P2→P1. Use it transmit r. So P2 can learn m from . But using & the simulators can communicate at most k. I.e. π is no longer simulatable!

m ∈ {0,1}

π1 π2

R

2k

r ← {0,1} (unif. rand.)

k

r' ∈ {0,1}

k

If r' = r ⇒ a := m Else ⇒ a := ⊥ a

F R π2 π1 π1

F F R C R F C

slide-26
SLIDE 26

Composable CF → Collusion-Preservation

slide-27
SLIDE 27

Composable CF → Collusion-Preservation

l Goal: Add composability to CF.

slide-28
SLIDE 28

Composable CF → Collusion-Preservation

l Goal: Add composability to CF. l Idea: Add an environment (as in UC-style

realization notions) to CF → CP.

slide-29
SLIDE 29

Composable CF → Collusion-Preservation

l Goal: Add composability to CF. l Idea: Add an environment (as in UC-style

realization notions) to CF → CP.

l Immediate results:

l

Dummy (adversary) lemma and (G)UC composition theorems hold essentially unchanged.

slide-30
SLIDE 30

Composable CF → Collusion-Preservation

l Goal: Add composability to CF. l Idea: Add an environment (as in UC-style

realization notions) to CF → CP.

l Immediate results:

l

Dummy (adversary) lemma and (G)UC composition theorems hold essentially unchanged.

l

CP strictly generalizes (G)UC realization notions.

slide-31
SLIDE 31

Construction (1)

slide-32
SLIDE 32

Construction (1)

l CP Construction for F using resource R:

l

Trivial Idea: Resource R = Functionality F.

slide-33
SLIDE 33

Construction (1)

l CP Construction for F using resource R:

l

Trivial Idea: Resource R = Functionality F.

l Issues:

l

R depends on F

We show that to some extent such a dependency is unavoidable.

However at least R must only be “programmable” but not fully “non-uniform”.

slide-34
SLIDE 34

Construction (1)

l CP Construction for F using resource R:

l

Trivial Idea: Resource R = Functionality F.

l Issues:

l

R depends on F

We show that to some extent such a dependency is unavoidable.

However at least R must only be “programmable” but not fully “non-uniform”.

l

If R mis-behaves all bets are off.

Usually we don't care about this case. But trust is a rare commodity.

slide-35
SLIDE 35

Fallback Security

slide-36
SLIDE 36

Fallback Security

l Def. “Fallback Security” = Security attained

when protocol is run using an arbitrary communication resource.

slide-37
SLIDE 37

Fallback Security

l Def. “Fallback Security” = Security attained

when protocol is run using an arbitrary communication resource.

l Example: Protocol π CP-realizes R from F with

GUC-Fallback Security.

l

If π is run with R then F is CP-realized.

l

If π is run with any R* then F is GUC-realized.

slide-38
SLIDE 38

Fallback Security

l Def. “Fallback Security” = Security attained

when protocol is run using an arbitrary communication resource.

l Example: Protocol π CP-realizes R from F with

GUC-Fallback Security.

l

If π is run with R then F is CP-realized.

l

If π is run with any R* then F is GUC-realized.

l Now trivial construction no longer works

because it achieves no fallback security.

slide-39
SLIDE 39

Construction (2)

slide-40
SLIDE 40

Construction (2)

l Recall CF construction of Mediated Model of [ASV,

AKLPSV]. Idea: “assisted SFE in the mediator's head”

l

For functionality F, let protocol π = GMW(F).

l

“Mediator” resource M runs π on behalf of players “in her head”.

l

Player Pi's internal state in π shared between Pi and M.

l

Next protocol msg generated and Pi's state updated via 2-party SFE between Pi and M.

slide-41
SLIDE 41

Construction (2)

l Recall CF construction of Mediated Model of [ASV,

AKLPSV]. Idea: “assisted SFE in the mediator's head”

l

For functionality F, let protocol π = GMW(F).

l

“Mediator” resource M runs π on behalf of players “in her head”.

l

Player Pi's internal state in π shared between Pi and M.

l

Next protocol msg generated and Pi's state updated via 2-party SFE between Pi and M.

l CP Construction Idea:

l

Use π = GUC(F) with setup S.

GUC allows us to reuse S across protocols.

slide-42
SLIDE 42

Synchronization Pollution (1)

slide-43
SLIDE 43

Synchronization Pollution (1)

l Did we get CP with GUC fall-back?

l

No! “Synchronization Pollution”

slide-44
SLIDE 44

Synchronization Pollution (1)

l Did we get CP with GUC fall-back?

l

No! “Synchronization Pollution”

l Recall Intuitive Goal: Ensure corrupt colluding

parties get no more from R then from F.

l

Technically: Can simulate with split simulators

slide-45
SLIDE 45

Synchronization Pollution (1)

l Did we get CP with GUC fall-back?

l

No! “Synchronization Pollution”

l Recall Intuitive Goal: Ensure corrupt colluding

parties get no more from R then from F.

l

Technically: Can simulate with split simulators

l Solutions:

1.Remove subliminal communication channels (“steganography freeness”) [Sim84] 2.Remove “randomness pollution” for CF [LMS05, ILM05,...]

slide-46
SLIDE 46

Synchronization Pollution (2)

slide-47
SLIDE 47

Synchronization Pollution (2)

l This work: Identify and mitigate new security concern.

slide-48
SLIDE 48

Synchronization Pollution (2)

l This work: Identify and mitigate new security concern. l Def. “Synchronization Pollution” = Adversaries obtain more

synchronization of events using R then using F.

slide-49
SLIDE 49

Synchronization Pollution (2)

l This work: Identify and mitigate new security concern. l Def. “Synchronization Pollution” = Adversaries obtain more

synchronization of events using R then using F.

l

Intuitive problem: more observable events from R than from F ⇒ Adversaries more coordinated.

slide-50
SLIDE 50

Synchronization Pollution (2)

l This work: Identify and mitigate new security concern. l Def. “Synchronization Pollution” = Adversaries obtain more

synchronization of events using R then using F.

l

Intuitive problem: more observable events from R than from F ⇒ Adversaries more coordinated.

l

Technical Problem: F doesn't provide simulators enough synchronization for them to coordinate the events in their on-line simulations.

Not an issue for CF because distinguisher (unlike environment) is off-line.

slide-51
SLIDE 51

Mitigating Synchronization Pollution

slide-52
SLIDE 52

Mitigating Synchronization Pollution

l Idea: Resource R runs ρ = GUC(F) “in the head”. Minimize

number of observable events generated by assisting R.

slide-53
SLIDE 53

Mitigating Synchronization Pollution

l Idea: Resource R runs ρ = GUC(F) “in the head”. Minimize

number of observable events generated by assisting R.

l Problem: ρ is multi-round ⇒ Has many public ordered events. l Q: What is minimal synchronization obtained from 2-party SFEs

used to “assist” R in running ρ?

slide-54
SLIDE 54

Mitigating Synchronization Pollution

l Idea: Resource R runs ρ = GUC(F) “in the head”. Minimize

number of observable events generated by assisting R.

l Problem: ρ is multi-round ⇒ Has many public ordered events. l Q: What is minimal synchronization obtained from 2-party SFEs

used to “assist” R in running ρ?

l A: Surprisingly, only output-delivery synchronization.

l

Ideal World: F delivers output only after players activated enough to “fuel” an execution of ρ.

l

Technically: 2-party SFEs now hide all events in ρ.

l

e.g. Round number? Message received? From who? Message sent? To who? State changed? (!!!)

l

[AKLPSV]: hides only internal state of Pj and message contents for ρ.

slide-55
SLIDE 55

Result

slide-56
SLIDE 56

Result

l Show the necessity of several properties of our real-

world resource R.

l

Probabilistic, Isolating, Programmable.

slide-57
SLIDE 57

Result

l Show the necessity of several properties of our real-

world resource R.

l

Probabilistic, Isolating, Programmable.

⇒ Rule out using most standard resources for realizing

practically any interesting F.

l

Broadcast channel, insecure/secure/perfect channels.

slide-58
SLIDE 58

Result

l Show the necessity of several properties of our real-

world resource R.

l

Probabilistic, Isolating, Programmable.

⇒ Rule out using most standard resources for realizing

practically any interesting F.

l

Broadcast channel, insecure/secure/perfect channels.

⇒ Minimality of Mediator resource.

slide-59
SLIDE 59

Result

l Show the necessity of several properties of our real-

world resource R.

l

Probabilistic, Isolating, Programmable.

⇒ Rule out using most standard resources for realizing

practically any interesting F.

l

Broadcast channel, insecure/secure/perfect channels.

⇒ Minimality of Mediator resource.

l Theorem: For a large class of F we give a resource

and protocol that CP-realize F with GUC-fallback.

slide-60
SLIDE 60

Applications to GT

slide-61
SLIDE 61

Applications to GT

1)Define a model of rational, computational and concurrent mediated game play

Goal: Bring GT models closer to reality ( Crypto :) ). Principle: Local actions. Global intentions and consequences

slide-62
SLIDE 62

Applications to GT

1)Define a model of rational, computational and concurrent mediated game play

Goal: Bring GT models closer to reality ( Crypto :) ). Principle: Local actions. Global intentions and consequences

2)Show how to replace ideal mechanism with cryptographic protocol games on a network s.t.

l

Game theorists can design and analyze ideal and fully trusted mechanisms

l

but games can be played by computers over (special) networks s.t.

l

less trust placed in network than mechanism achieving essentially the same game.

slide-63
SLIDE 63

Future Directions

slide-64
SLIDE 64

Future Directions

l Further constructions.

l

Weaker fallback → realize more funcs. more efficiently.

l

When can R be stateless?

l

Can output synchronization be removed from F?

l

Efficient constructions for auctions?

slide-65
SLIDE 65

Future Directions

l Further constructions.

l

Weaker fallback → realize more funcs. more efficiently.

l

When can R be stateless?

l

Can output synchronization be removed from F?

l

Efficient constructions for auctions?

l New security notions leveraging split-simulators.

l

Example: Capturing enforced properties like incoercability.

l

Currently: if a single process (ITI) on a machine is corrupted entire party is considered corrupt. Can we do better? What do we get from Sandboxes, VMs, chroot jails, restricted UIDs? E.g LUC [CV12]

slide-66
SLIDE 66

Future Directions

l Further constructions.

l

Weaker fallback → realize more funcs. more efficiently.

l

When can R be stateless?

l

Can output synchronization be removed from F?

l

Efficient constructions for auctions?

l New security notions leveraging split-simulators.

l

Example: Capturing enforced properties like incoercability.

l

Currently: if a single process (ITI) on a machine is corrupted entire party is considered corrupt. Can we do better? What do we get from Sandboxes, VMs, chroot jails, restricted UIDs? E.g LUC [CV12]

l Wanted: Local stability notion for Concurrent GT.

slide-67
SLIDE 67

Future Directions

l Further constructions.

l

Weaker fallback → realize more funcs. more efficiently.

l

When can R be stateless?

l

Can output synchronization be removed from F?

l

Efficient constructions for auctions?

l New security notions leveraging split-simulators.

l

Example: Capturing enforced properties like incoercability.

l

Currently: if a single process (ITI) on a machine is corrupted entire party is considered corrupt. Can we do better? What do we get from Sandboxes, VMs, chroot jails, restricted UIDs? E.g LUC [CV12]

l Wanted: Local stability notion for Concurrent GT. l Relations to Abstract Cryptography framework [MR11].

slide-68
SLIDE 68

Thank You!