non malleable codes in the split state model
play

Non-malleable codes in the split-state model Divesh Aggarwal, - PowerPoint PPT Presentation

Non-malleable codes in the split-state model Divesh Aggarwal, Yevgeniy Dodis , Tomasz Kazana, Shachar Lovett, Maciej Obremski New York University Tampering Experiment f Enc Dec m* m c c* (Real) g m g (m) (Ideal) Consider a


  1. Non-malleable codes in the split-state model Divesh Aggarwal, Yevgeniy Dodis , Tomasz Kazana, Shachar Lovett, Maciej Obremski New York University

  2. Tampering Experiment f Enc Dec m* m c c* (Real) g m g (m) (Ideal) • Consider a tamperable communication channel.

  3. Tampering Experiment f Enc Dec m* m c c* (Real) g m g (m) (Ideal) • Consider a tamperable communication channel. • To protect, send c = Enc ( m ) along the channel.

  4. Tampering Experiment f Enc Dec m* m c c* (Real) g m g (m) (Ideal) • Consider a tamperable communication channel. • To protect, send c = Enc ( m ) along the channel. • The tampered codeword decodes to some m ∗ .

  5. Tampering Experiment f Enc Dec m* m c c* (Real) g m g (m) (Ideal) • Consider a tamperable communication channel. • To protect, send c = Enc ( m ) along the channel. • The tampered codeword decodes to some m ∗ . • Hope: m ∗ "looks like" g ( m ) for some "good" g that we can "tolerate".

  6. Tampering Experiment f Enc Dec m* m c c* (Real) g m g (m) (Ideal) • Consider a tamperable communication channel. • To protect, send c = Enc ( m ) along the channel. • The tampered codeword decodes to some m ∗ . • Hope: m ∗ "looks like" g ( m ) for some "good" g that we can "tolerate". We want ◮ Correctness: ∀ m , Dec ( Enc ( m )) = m . ◮ Simulation: ∀ f ∈ F , ∃ g ∈ G , where ◮ F is large and realistic against attacks/channels. ◮ G small and "easy to handle".

  7. Example: Error-correcting codes f Enc Dec m* (Real) m c c* g m g (m) (Ideal) F G Id (m) = m ◮ G = { Id } is “easy to handle".

  8. Example: Error-correcting codes f Enc Dec m* (Real) m c c* g m g (m) (Ideal) F G Id (m) = m ∆ (c, ) <= c* ρ ◮ G = { Id } is “easy to handle". ◮ F realistic/useful. ◮ Constructions: Hadamard, Reed-Solomon, Reed-Muller, etc..

  9. Example: Error-detecting codes f Enc Dec m* m c c* (Real) g m g (m) (Ideal) F G Id (m) = m (m) = AMD Codes: Application in robust fuzzy extractors and secret sharing [C D FPW12], NM-codes [DPW10], etc.

  10. Example: Error-detecting codes f Enc Dec m* m c c* (Real) g m g (m) (Ideal) F G Id (m) = m ∆( c, )<= 2ρ c* (m) = Same constructions as those for ECC.secret sharing [CDFPW12], NM-codes [DPW10], etc.

  11. Example: Error-detecting codes f Enc Dec m* m c c* (Real) g m g (m) (Ideal) F G Id (m) = m f (c) = c + δ (m) = δ AMD Codes: Application in robust fuzzy extractors and secret sharing [C D FPW12], NM-codes [DPW10], etc.

  12. Error-correction/detection impossible f Enc Dec m* m c c* (Real) g m g (m) (Ideal) F G Constant ?? Id (m) = m functions (m) = f (c) = c* c* Let c ∗ = Enc ( m ′ ) for some fixed m ′ . Thus, Dec ( c ∗ ) = m ′ / ∈ { m , ⊥} .

  13. Error-correction/detection impossible f Enc Dec m* m c c* (Real) g m g (m) (Ideal) F G Constant Id (m) = m functions (m) = f (c) = c* c* Let c ∗ = Enc ( m ′ ) for some fixed m ′ . Thus, Dec ( c ∗ ) = m ′ / ∈ { m , ⊥} .

  14. Non-malleable codes f Enc Dec m* m c c* (Real) g m g (m) (Ideal) F NM Id (m) = m g (m) = m* m*

  15. Non-malleable codes f Enc Dec m* m c c* (Real) g m g (m) (Ideal) F NM Id (m) = m g (m) = m* m* Is NM "realistic/easy-to-handle"? When is it useful?

  16. Application of Non-malleable codes ◮ Consider Sign sk (userID, m ). ◮ Task: How to protect sk against tampering attack. ◮ Encode sk using non-malleable code. ◮ Thus, sk ∗ = Dec ( f ( Enc ( sk ))) is either equal to sk or unrelated. ◮ Thus, cannot use Sign sk ∗ (userID, · ) to forge Sign sk (userID’ , · ).

  17. Non-malleable codes: Formal Definition Let ( Enc , Dec ) be a coding scheme with Enc randomized , and Dec deterministic, s.t. ∀ m Dec ( Enc ( m )) = m , f Enc Dec m* m c c* (Real) g (Ideal) m g (m) The coding scheme is non-malleable w.r.t. family F , if ∀ f ∈ F ,

  18. Non-malleable codes: Formal Definition Let ( Enc , Dec ) be a coding scheme with Enc randomized , and Dec deterministic, s.t. ∀ m Dec ( Enc ( m )) = m , f Enc Dec m* m c c* (Real) g (Ideal) m g (m) The coding scheme is non-malleable w.r.t. family F , if ∀ f ∈ F , ∃ T which is a probabilistic combination of: ◮ constant functions ◮ identity function s.t.

  19. Non-malleable codes: Formal Definition Let ( Enc , Dec ) be a coding scheme with Enc randomized , and Dec deterministic, s.t. ∀ m Dec ( Enc ( m )) = m , f Enc Dec m* m c c* (Real) g (Ideal) m g (m) The coding scheme is non-malleable w.r.t. family F , if ∀ f ∈ F , ∃ T which is a probabilistic combination of: ◮ constant functions ◮ identity function s.t. ∀ m ∈ M , m ∗ ≈ T ( m ) .

  20. Non-malleable codes: Formal Definition Let ( Enc , Dec ) be a coding scheme with Enc randomized , and Dec deterministic, s.t. ∀ m Dec ( Enc ( m )) = m , f Enc Dec m* m c c* (Real) g (Ideal) m g (m) The coding scheme is non-malleable w.r.t. family F , if ∀ f ∈ F , ∃ T which is a probabilistic combination of: ◮ constant functions ◮ identity function s.t. ∀ m ∈ M , m ∗ ≈ T ( m ) . Note: T is independent of m . Thus, intuitively, either m ∗ = m or they are unrelated.

  21. Which realistic families F can we tolerate? f Enc Dec m* (Real) m c c* g m g (m) (Ideal) F all NM Id (m) = m g (m) = m* m* Impossible [DPW10]. ∀ g ∈ F all , let f ( c ) = Enc ( g ( Dec ( c ))) .

  22. Which realistic families F can we tolerate? f Enc Dec m* (Real) m c c* g m g (m) (Ideal) F all F all Impossible [DPW10]. ∀ g ∈ F all , let f ( c ) = Enc ( g ( Dec ( c ))) .

  23. Non-malleable Codes in the t -split-state model ◮ Tamper t different memory-parts independently

  24. Non-malleable Codes in the t -split-state model ◮ Tamper t different memory-parts independently ◮ Application to non-malleable secret-sharing

  25. Non-malleable Codes in the t -split-state model ◮ Tamper t different memory-parts independently ◮ Application to non-malleable secret-sharing ◮ Includes ECC, EDC, Constant functions, bitwise tampering functions but much more

  26. Non-malleable Codes in the t -split-state model ◮ Tamper t different memory-parts independently ◮ Application to non-malleable secret-sharing ◮ Includes ECC, EDC, Constant functions, bitwise tampering functions but much more ◮ Existential result known [DPW10].

  27. Non-malleable Codes in the t -split-state model ◮ Tamper t different memory-parts independently ◮ Application to non-malleable secret-sharing ◮ Includes ECC, EDC, Constant functions, bitwise tampering functions but much more ◮ Existential result known [DPW10]. ◮ Efficient construction for family of bitwise-tampering functions ( t = k , the no. of bits in m ) [DPW10, CG14, FNVW14].

  28. Non-malleable Codes in the t -split-state model ◮ Tamper t different memory-parts independently ◮ Application to non-malleable secret-sharing ◮ Includes ECC, EDC, Constant functions, bitwise tampering functions but much more ◮ Existential result known [DPW10]. ◮ Efficient construction for family of bitwise-tampering functions ( t = k , the no. of bits in m ) [DPW10, CG14, FNVW14]. ◮ Efficient construction for t = 2, k = 1 [DKO13]

  29. Non-malleable Codes in the t -split-state model ◮ Tamper t different memory-parts independently ◮ Application to non-malleable secret-sharing ◮ Includes ECC, EDC, Constant functions, bitwise tampering functions but much more ◮ Existential result known [DPW10]. ◮ Efficient construction for family of bitwise-tampering functions ( t = k , the no. of bits in m ) [DPW10, CG14, FNVW14]. ◮ Efficient construction for t = 2, k = 1 [DKO13] ◮ Open Question: Efficient construction for t constant, k large.

  30. Non-malleable Codes in the t -split-state model ◮ Tamper t different memory-parts independently ◮ Application to non-malleable secret-sharing ◮ Includes ECC, EDC, Constant functions, bitwise tampering functions but much more ◮ Existential result known [DPW10]. ◮ Efficient construction for family of bitwise-tampering functions ( t = k , the no. of bits in m ) [DPW10, CG14, FNVW14]. ◮ Efficient construction for t = 2, k = 1 [DKO13] ◮ Open Question: Efficient construction for t constant, k large. YES (this talk). We show several constructions, including t = 2 and constant rate (i.e. code length is Θ( k ) ).

  31. NM-codes in the t -split state model f 1 X* X 1 1 f X* X 2 Dec 2 Enc 2 f 3 m* m X* X 3 3 f X* X 4 4 4 f 5 X* X 5 5 The coding scheme is non-malleable w.r.t. family F t-split , if ∀ f 1 , . . . , f t , ∃ T which is a probabilistic combination of: ◮ constant functions ◮ identity function s.t. ∀ m ∈ M , m ∗ ≈ T ( m ) .

  32. Common outline for our results: Non-malleable reductions [A D KO15]

  33. Non-malleable Reduction: Definition [A D KO15] Let ( Enc , Dec ) be a coding scheme with Enc randomized , and Dec deterministic, s.t. ∀ m Dec ( Enc ( m )) = m ,

  34. Non-malleable Reduction: Definition [A D KO15] Let ( Enc , Dec ) be a coding scheme with Enc randomized , and Dec deterministic, s.t. ∀ m Dec ( Enc ( m )) = m , f Enc Dec m* (Real) m c c* g The scheme is a non-malleable reduction from F to G , m g (m) (Ideal) denoted as F ⇒ G if ∀ f ∈ F ,

Recommend


More recommend