Efficient Leakage-Resilient Secret Sharing Peihan Miao Akshayaram - - PowerPoint PPT Presentation

β–Ά
efficient leakage resilient secret sharing
SMART_READER_LITE
LIVE PREVIEW

Efficient Leakage-Resilient Secret Sharing Peihan Miao Akshayaram - - PowerPoint PPT Presentation

Efficient Leakage-Resilient Secret Sharing Peihan Miao Akshayaram Srinivasan Prashant Nalini Vasudevan UC Berkeley Secret Sharing [Shamir 79, Blakley 79] Share 1 , , Reconstruction: Given at least


slide-1
SLIDE 1

Efficient Leakage-Resilient Secret Sharing

Peihan Miao Akshayaram Srinivasan Prashant Nalini Vasudevan UC Berkeley

slide-2
SLIDE 2

Secret Sharing [Shamir’79, Blakley’79]

𝜏 π‘‘β„Ž1 , … , π‘‘β„Žπ‘œ

Share

Reconstruction: Given at least 𝑒 shares, can reconstruct 𝜏 Secrecy: Given (𝑒 βˆ’ 1) shares, no information about 𝜏 Several applications: MPC, threshold crypto, leakage-resilient circuit compilers, ... Efficient constructions, e.g., Shamir, which has rate =

𝜏 π‘‘β„Žπ‘— = 1

slide-3
SLIDE 3

Secret Sharing [Shamir’79, Blakley’79]

𝜏 π‘‘β„Ž1 , … , π‘‘β„Žπ‘œ

Share

What if there are side-channels? What if the adversary, in addition to (𝑒 βˆ’ 1) full shares, has some information about the others? Reconstruction: Given at least 𝑒 shares, can reconstruct 𝜏 Secrecy: Given (𝑒 βˆ’ 1) shares, no information about 𝜏

slide-4
SLIDE 4

Local Leakage Resilient Secret Sharing [GK’18, BDIR’18]

  • 1. Adversary specifies:
  • 2. Adversary is given shares π‘‘β„Žπ‘— for 𝑗 ∈ 𝑇, and leakage 𝑔(π‘‘β„Žπ‘—) for 𝑗 βˆ‰ 𝑇
  • 3. Its views for any two secrets should be statistically close
  • Set 𝑇 βŠ† [π‘œ] of size at most 𝑒 βˆ’ 1
  • For 𝑗 βˆ‰ 𝑇, a leakage function 𝑔𝑗 that outputs 𝜈 bits
  • Local - each fi depends on one share
  • Bounded - each fi outputs few bits
  • Otherwise arbitrary

π‘šπ‘“π‘π‘™π‘π‘•π‘“ 𝑠𝑏𝑒𝑓 = 𝜈 π‘‘β„Žπ‘—

slide-5
SLIDE 5

What was known

  • Guruswami-Wootters ’16: Shamir over 𝐻𝐺[2𝑙] not leakage-resilient
  • Benhamouda et al ’18: Shamir over large-characteristic fields is leakage-resilient with

leakage rate Θ(1) for thresholds more than π‘œ βˆ’ 𝑝(log π‘œ)

  • Constructions:
  • Other models of leakage-resilience for secret sharing have been studied, e.g., Boyle et

al β€˜14, Dziembowski-Pietrzak ’07, etc.

  • Goyal-Kumar ’18: 2-out-of-π‘œ with rate and leakage rate Θ

1 π‘œ

  • Badrinarayanan-Srinivasan ’18: 𝑃(1)-out-of-π‘œ with rate Θ

1 log π‘œ and leakage rate Θ 1 π‘œ log π‘œ

slide-6
SLIDE 6

What we do

Leakage-resilient threshold secret sharing schemes

  • for all thresholds,
  • with constant rate,
  • supporting any constant leakage rate

In this talk: simpler construction with slightly worse rate, supporting leakage rate up to 1/2

slide-7
SLIDE 7

Our construction

𝜏 π‘‘β„Ž1 , … , π‘‘β„Žπ‘œ

𝑒-out-of-π‘œ Shamir

Threshold 𝑒, secret 𝜏 ∈ 𝔾, leakage bound of 𝜈 bits π‘—π‘’β„Ž share: (𝒙𝒋 , π‘‘β„Žπ‘— + 𝒙𝒋, 𝒕 + 𝑠 , 𝒕𝒔𝒋) Sample 𝒕, π’™πŸ, … , 𝒙𝒐 ← 𝔾𝑛, and 𝑠 ← 𝔾

(𝒕, 𝑠) π’•π’”πŸ , … , 𝒕𝒔𝒐

2-out-of-π‘œ Shamir

(𝑛 specified later)

slide-8
SLIDE 8

Reconstruction

π‘—π‘’β„Ž share: (𝒙𝒋 , π‘‘β„Žπ‘— + 𝒙𝒋, 𝒕 + 𝑠 , 𝒕𝒔𝒋) Given shares of 𝑒 different 𝑗’s: 1. Reconstruct 𝒕 and 𝑠 from {𝒕𝒔𝒋} 2. Recover π‘‘β„Žπ‘— from (π‘‘β„Žπ‘— + 𝒙𝒋, 𝒕 + 𝑠) 3. Reconstruct 𝜏 from {π‘‘β„Žπ‘—}

slide-9
SLIDE 9

Leakage Resilience

Adversary knows:

  • 𝒙𝒋, π‘‘β„Žπ‘— + 𝒙𝒋, 𝒕 + 𝑠, 𝒕𝒔𝒋 for 𝑗 ∈ 𝑇, where 𝑇 < 𝑒
  • 𝑔𝑗 𝒙𝒋, π‘‘β„Žπ‘— + 𝒙𝒋, 𝒕 + 𝑠, 𝒕𝒔𝒋 for 𝑗 βˆ‰ 𝑇
  • Possibly 𝒕 and 𝑠

Approach: 1. For the 𝑗 βˆ‰ 𝑇, replace (π‘‘β„Žπ‘— + 𝒙𝒋, 𝒕 ) with random 𝑣𝑗 ∈ 𝔾 2. Show that adversary cannot tell this was done (by a hybrid argument) 3. By secrecy of 𝑒-out-of-π‘œ sharing, adversary’s view is independent of secret 𝜏

slide-10
SLIDE 10

Leakage Resilience

Claim: For any 𝑗 βˆ‰ 𝑇, even given 𝒕 and 𝑠,

𝑔𝑗 𝒙𝒋, π‘‘β„Žπ‘— + 𝒙𝒋, 𝒕 + 𝑠, 𝒕𝒔𝒋 β‰ˆ 𝑔𝑗 𝒙𝒋, 𝑣𝑗 + 𝑠, 𝒕𝒔𝒋

Leftover Hash Lemma [ILL89]:

βŒ©π’™π’‹, 𝒕βŒͺ is almost uniformly random given 𝒕 and leakage 𝑕(𝒙𝒋), if 𝑕 𝒙𝒋 β‰ͺ |𝒙𝒋|

slide-11
SLIDE 11

Leakage Resilience

Claim: For any 𝑗 βˆ‰ 𝑇, even given 𝒕 and 𝑠,

𝑔𝑗 𝒙𝒋, π‘‘β„Žπ‘— + 𝒙𝒋, 𝒕 + 𝑠, 𝒕𝒔𝒋 β‰ˆ 𝑔𝑗 𝒙𝒋, 𝑣𝑗 + 𝑠, 𝒕𝒔𝒋

Leftover Hash Lemma [ILL89]:

βŒ©π’™π’‹, 𝒕βŒͺ is almost uniformly random given 𝒕 and leakage 𝑕(𝒙𝒋), if 𝑕 𝒙𝒋 β‰ͺ |𝒙𝒋|

should be independent of 𝒕

slide-12
SLIDE 12

Leakage Resilience

Claim: For any 𝑗 βˆ‰ 𝑇, even given 𝒕 and 𝑠,

𝑔𝑗 𝒙𝒋, π‘‘β„Žπ‘— + 𝒙𝒋, 𝒕 + 𝑠, 𝒕𝒔𝒋 β‰ˆ 𝑔𝑗 𝒙𝒋, 𝑣𝑗 + 𝑠, 𝒕𝒔𝒋

Leftover Hash Lemma [ILL89]:

βŒ©π’™π’‹, 𝒕βŒͺ is almost uniformly random given 𝒕 and leakage 𝑕(𝒙𝒋), if 𝑕 𝒙𝒋 β‰ͺ |𝒙𝒋|

independent of 𝒕 and 𝑠 because 2-out-of-π‘œ share should be independent of 𝒕

slide-13
SLIDE 13

Leakage Resilience

Claim: For any 𝑗 βˆ‰ 𝑇, even given 𝒕 and 𝑠,

𝑔𝑗 𝒙𝒋, π‘‘β„Žπ‘— + 𝒙𝒋, 𝒕 + 𝑠, 𝒕𝒔𝒋 β‰ˆ 𝑔𝑗 𝒙𝒋, 𝑣𝑗 + 𝑠, 𝒕𝒔𝒋

Leftover Hash Lemma [ILL89]:

βŒ©π’™π’‹, 𝒕βŒͺ is almost uniformly random given 𝒕 and leakage 𝑕(𝒙𝒋), if 𝑕 𝒙𝒋 β‰ͺ |𝒙𝒋|

independent of 𝒕 and 𝑠 because 2-out-of-π‘œ share independent of 𝒕 because masked with 𝑠 should be independent of 𝒕

slide-14
SLIDE 14

Leakage Resilience

Claim: For any 𝑗 βˆ‰ 𝑇, even given 𝒕 and 𝑠,

𝑔𝑗 𝒙𝒋, π‘‘β„Žπ‘— + 𝒙𝒋, 𝒕 + 𝑠, 𝒕𝒔𝒋 β‰ˆ 𝑔𝑗 𝒙𝒋, 𝑣𝑗 + 𝑠, 𝒕𝒔𝒋

Leftover Hash Lemma [ILL89]:

βŒ©π’™π’‹, 𝒕βŒͺ is almost uniformly random given 𝒕 and leakage 𝑕(𝒙𝒋), if 𝑕 𝒙𝒋 β‰ͺ |𝒙𝒋|

independent of 𝒕 and 𝑠 because 2-out-of-π‘œ share independent of 𝒕 because masked with 𝑠 should be independent of 𝒕 determines 𝒙𝒋 and |𝒕| given bound on leakage

slide-15
SLIDE 15

What we get

For local leakage resilient threshold secret sharing of:

  • secrets in 𝔾,
  • among π‘œ parties (π‘œ ≀ |𝔾|),
  • against 𝜈 bits of leakage per share,
  • with adversarial advantage at most πœ—,

𝒙𝒋 = 𝒕 = 𝑛 β‰ˆ 1 + 𝜈 log 𝔾 + 3 log 4π‘œ/πœ— log 𝔾 Share size: (2𝑛 + 2) field elements

slide-16
SLIDE 16

Share size overhead

Share sizes for secrets in a field 𝔾, with 𝔾 β‰ˆ 2128, and πœ— = 1/280 π‘œ = 2 π‘œ = 100

slide-17
SLIDE 17

Computational overhead

Computational overhead in sharing time over Shamir secret sharing, for various leakage rates*

* as observed on a machine with 4-core 2.9 GHz CPU and 16 GB of RAM

slide-18
SLIDE 18

Improvements

  • Generalisation to secret sharing for any monotone access structure
  • Leakage rate up to 1, and constant-factor improvement in rate using better

extractors than inner product In full version:

  • Rate-preserving transformation to non-malleable secret sharing
  • Leakage-tolerant MPC for general interactions patterns
slide-19
SLIDE 19

Concurrent work

Stronger leakage-resilient and non-malleable secret-sharing schemes for general access structures, Aggarwal et al

  • general leakage-resilience transformation, with 𝑃(1/π‘œ) rate loss, constant leakage rate,
  • non-malleable secret sharing against concurrent tampering,
  • leakage-resilient threshold signatures

Leakage-resilient secret sharing, Kumar et al

  • secret sharing schemes resilient against adaptive leakage,
  • non-malleable secret sharing against tampering with leakage
slide-20
SLIDE 20

Thank You!