leakage resilient chosen ciphertext secure public key
play

Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption - PowerPoint PPT Presentation

Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter Baodong Qin and Shengli Liu Shanghai Jiao Tong University ASIACRYPT 2013 Dec 5, Bangalore, India B. Qin and S. Liu LR-CCA Secure


  1. Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter Baodong Qin and Shengli Liu Shanghai Jiao Tong University ASIACRYPT 2013 Dec 5, Bangalore, India B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF

  2. ������������ Why We Consider Secrets Leak? T HEORY R EAL L IFE � � Ideal setting Physical implementation leaks � information Private internal secret state � e.g.: secret key/ randomness secret state secret state B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  3. ������������ Why We Consider Secrets Leak? T HEORY R EAL L IFE � � Ideal setting Physical implementation leaks electromagnetic � information Private internal secret state radiation � e.g.: secret key/ randomness time secret state secret state Side channel attacks sound B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  4. ������������ Why We Consider Secrets Leak? T HEORY R EAL L IFE � � Ideal setting Physical implementation leaks electromagnetic � information Private internal secret state radiation � e.g.: secret key/ randomness time secret state secret state Side channel attacks sound Only computation leaks information [Micali and Reyzin 04] B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  5. ������������ Bounded Leakage Model � Inspired by “cold-boot” attack/memory attack [Halderman et al.08] � Not only computation leaks information � Model: leakage oracle secret key: SK • • • Leakage rate: B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  6. ������������ Public-Key Encryption Semantic security against key leakage and CCA [NS09] Adversary y Decryption queries Leakage queries B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  7. ������������ Public-Key Encryption Semantic security against key leakage and CCA [NS09] Adversary y Decryption The adversary succeeds if queries b=b’ Advantage: Pr[b=b’]-1/2 Leakage queries B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  8. ������������ Previous Works � High leakage-rate (e.g. 1-o(1), using NIZK) but � either no efficient instantiations [NS09] or � over a pairing-friendly group (efficient, but the ciphertext size is a little bit large) [Dodis et al.10, Galindo et al.12] B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  9. ������������ Previous Works � High leakage-rate (e.g. 1-o(1), using NIZK) but � either no efficient instantiations [NS09] or � over a pairing-friendly group (efficient, but the ciphertext size is a little bit large) [Dodis et al.10, Galindo et al.12] � Low leakage rate (e.g. 1/4-o(1)), but � very practical construction via hash proof system [NS09,Li et al.12, Liu et al.13] � has short ciphertext size (for reasonable leakage rate) � Instantiations under DDH, DCR etc. (without pairing) B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  10. ������������ Question From [Dodis et al. Asiacrypt 2010] …, it seems that the hash proof system approach to building CCA encryption is inherently limited to leakage-rates below 1/2: this is because the secret-key consists of two components (one for verifying that the ciphertext is well-formed and one for decrypting it) and the proofs break down if either of the components is individually leaked in its entirety. However, no HPS-based PKEs are known achieving leakage- rate 1/2-o(1), especially under DDH or DCR assumptions. Question: can we find a new way to construct LR-CCA secure PKEs which are as practical as HPS with reasonable high leakage-rates, like 1/2-o(1)? B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  11. ������������ Hash Proof System[CS02] � Family of projective hash functions � Subset membership problem: (valid/invalid) B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  12. ������������ Hash Proof System[CS02] � Family of projective hash functions � Subset membership problem: (valid/invalid) SK space PK space B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  13. ������������ Hash Proof System[CS02] � Family of projective hash functions � Subset membership problem: (valid/invalid) SK space Public evaluation Private evaluation PK space B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  14. ������������ Hash Proof System[CS02] � Family of projective hash functions � Subset membership problem: (valid/invalid) SK space High entropy Public evaluation Private evaluation •universal/universal 2 •smooth PK space B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  15. ������������ HPS-based Approach (language) additional input Prove Mask message B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  16. ������������ HPS-based Approach (language) additional input Prove Mask message B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  17. ������������ HPS-based Approach (language) additional input Prove Mask message •Leakage amount is at most: •In fact smaller than B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  18. ������������ HPS-based Approach (language) additional input Leakage-rate: Prove Mask message •Leakage amount is at most: •In fact smaller than B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  19. ������������ HPS-based Approach (language) additional input Leakage-rate: Best result: 1/4 –o(1) under DDH assumption Prove Mask message •Leakage amount is at most: •In fact smaller than B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  20. ������������ Our Approach (language) additional input Prove Mask message B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  21. ������������ Our Approach (language) additional input Prove Mask message B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  22. ������������ Our Approach (language) additional input Prove Mask message B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  23. ������������ Our Approach (language) additional input Prove Mask message B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  24. ������������ Our Approach (language) additional input Prove Mask message B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  25. ������������ Our Approach (language) additional input Leakage-rate: Our result: 1/2 –o(1) under DDH /DCR Prove Mask message B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  26. ������������ Our Approach (language) additional input Leakage-rate: One-Time Lossy Filter Our result: 1/2 –o(1) under DDH /DCR Prove Mask message B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  27. ������������ ������������ B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

  28. ������������ ������������ B. Qin and S. Liu B. Qin and S. Liu LR-CCA Secure PKE from HPS and OT-LF LR-CCA Secure PKE from HPS and OT-LF

Recommend


More recommend