Efficient Leakage-Resilient Secret Sharing Peihan Miao Akshayaram - - PowerPoint PPT Presentation
Efficient Leakage-Resilient Secret Sharing Peihan Miao Akshayaram - - PowerPoint PPT Presentation
Efficient Leakage-Resilient Secret Sharing Peihan Miao Akshayaram Srinivasan Prashant Nalini Vasudevan UC Berkeley Secret Sharing [Shamir 79, Blakley 79] Share 1 , , Reconstruction: Given at least
Secret Sharing [Shamirβ79, Blakleyβ79]
π π‘β1 , β¦ , π‘βπ
Share
Reconstruction: Given at least π’ shares, can reconstruct π Secrecy: Given (π’ β 1) shares, no information about π Several applications: MPC, threshold crypto, leakage-resilient circuit compilers, ... Efficient constructions, e.g., Shamir, which has rate =
π π‘βπ = 1
Secret Sharing [Shamirβ79, Blakleyβ79]
π π‘β1 , β¦ , π‘βπ
Share
What if there are side-channels? What if the adversary, in addition to (π’ β 1) full shares, has some information about the others? Reconstruction: Given at least π’ shares, can reconstruct π Secrecy: Given (π’ β 1) shares, no information about π
Local Leakage Resilient Secret Sharing [GKβ18, BDIRβ18]
- 1. Adversary specifies:
- 2. Adversary is given shares π‘βπ for π β π, and leakage π(π‘βπ) for π β π
- 3. Its views for any two secrets should be statistically close
- Set π β [π] of size at most π’ β 1
- For π β π, a leakage function ππ that outputs π bits
- Local - each fi depends on one share
- Bounded - each fi outputs few bits
- Otherwise arbitrary
πππππππ π ππ’π = π π‘βπ
What was known
- Guruswami-Wootters β16: Shamir over π»πΊ[2π] not leakage-resilient
- Benhamouda et al β18: Shamir over large-characteristic fields is leakage-resilient with
leakage rate Ξ(1) for thresholds more than π β π(log π)
- Constructions:
- Other models of leakage-resilience for secret sharing have been studied, e.g., Boyle et
al β14, Dziembowski-Pietrzak β07, etc.
- Goyal-Kumar β18: 2-out-of-π with rate and leakage rate Ξ
1 π
- Badrinarayanan-Srinivasan β18: π(1)-out-of-π with rate Ξ
1 log π and leakage rate Ξ 1 π log π
What we do
Leakage-resilient threshold secret sharing schemes
- for all thresholds,
- with constant rate,
- supporting any constant leakage rate
In this talk: simpler construction with slightly worse rate, supporting leakage rate up to 1/2
Our construction
π π‘β1 , β¦ , π‘βπ
π’-out-of-π Shamir
Threshold π’, secret π β πΎ, leakage bound of π bits ππ’β share: (ππ , π‘βπ + ππ, π + π , πππ) Sample π, ππ, β¦ , ππ β πΎπ, and π β πΎ
(π, π ) πππ , β¦ , πππ
2-out-of-π Shamir
(π specified later)
Reconstruction
ππ’β share: (ππ , π‘βπ + ππ, π + π , πππ) Given shares of π’ different πβs: 1. Reconstruct π and π from {πππ} 2. Recover π‘βπ from (π‘βπ + ππ, π + π ) 3. Reconstruct π from {π‘βπ}
Leakage Resilience
Adversary knows:
- ππ, π‘βπ + ππ, π + π , πππ for π β π, where π < π’
- ππ ππ, π‘βπ + ππ, π + π , πππ for π β π
- Possibly π and π
Approach: 1. For the π β π, replace (π‘βπ + ππ, π ) with random π£π β πΎ 2. Show that adversary cannot tell this was done (by a hybrid argument) 3. By secrecy of π’-out-of-π sharing, adversaryβs view is independent of secret π
Leakage Resilience
Claim: For any π β π, even given π and π ,
ππ ππ, π‘βπ + ππ, π + π , πππ β ππ ππ, π£π + π , πππ
Leftover Hash Lemma [ILL89]:
β©ππ, πβͺ is almost uniformly random given π and leakage π(ππ), if π ππ βͺ |ππ|
Leakage Resilience
Claim: For any π β π, even given π and π ,
ππ ππ, π‘βπ + ππ, π + π , πππ β ππ ππ, π£π + π , πππ
Leftover Hash Lemma [ILL89]:
β©ππ, πβͺ is almost uniformly random given π and leakage π(ππ), if π ππ βͺ |ππ|
should be independent of π
Leakage Resilience
Claim: For any π β π, even given π and π ,
ππ ππ, π‘βπ + ππ, π + π , πππ β ππ ππ, π£π + π , πππ
Leftover Hash Lemma [ILL89]:
β©ππ, πβͺ is almost uniformly random given π and leakage π(ππ), if π ππ βͺ |ππ|
independent of π and π because 2-out-of-π share should be independent of π
Leakage Resilience
Claim: For any π β π, even given π and π ,
ππ ππ, π‘βπ + ππ, π + π , πππ β ππ ππ, π£π + π , πππ
Leftover Hash Lemma [ILL89]:
β©ππ, πβͺ is almost uniformly random given π and leakage π(ππ), if π ππ βͺ |ππ|
independent of π and π because 2-out-of-π share independent of π because masked with π should be independent of π
Leakage Resilience
Claim: For any π β π, even given π and π ,
ππ ππ, π‘βπ + ππ, π + π , πππ β ππ ππ, π£π + π , πππ
Leftover Hash Lemma [ILL89]:
β©ππ, πβͺ is almost uniformly random given π and leakage π(ππ), if π ππ βͺ |ππ|
independent of π and π because 2-out-of-π share independent of π because masked with π should be independent of π determines ππ and |π| given bound on leakage
What we get
For local leakage resilient threshold secret sharing of:
- secrets in πΎ,
- among π parties (π β€ |πΎ|),
- against π bits of leakage per share,
- with adversarial advantage at most π,
ππ = π = π β 1 + π log πΎ + 3 log 4π/π log πΎ Share size: (2π + 2) field elements
Share size overhead
Share sizes for secrets in a field πΎ, with πΎ β 2128, and π = 1/280 π = 2 π = 100
Computational overhead
Computational overhead in sharing time over Shamir secret sharing, for various leakage rates*
* as observed on a machine with 4-core 2.9 GHz CPU and 16 GB of RAM
Improvements
- Generalisation to secret sharing for any monotone access structure
- Leakage rate up to 1, and constant-factor improvement in rate using better
extractors than inner product In full version:
- Rate-preserving transformation to non-malleable secret sharing
- Leakage-tolerant MPC for general interactions patterns
Concurrent work
Stronger leakage-resilient and non-malleable secret-sharing schemes for general access structures, Aggarwal et al
- general leakage-resilience transformation, with π(1/π) rate loss, constant leakage rate,
- non-malleable secret sharing against concurrent tampering,
- leakage-resilient threshold signatures
Leakage-resilient secret sharing, Kumar et al
- secret sharing schemes resilient against adaptive leakage,
- non-malleable secret sharing against tampering with leakage