protect a p latform for ro bust t hr e shold c ryp t
play

PROTECT a P latform for Ro bust T hr e shold C ryp t ography Jason - PowerPoint PPT Presentation

PROTECT a P latform for Ro bust T hr e shold C ryp t ography Jason Resch, Christian Cachin, Hugo Krawczyk, Tal Rabin, Chrysa Stathakopoulou Project Overview Functionality and Goals Model and Assumptions Architecture Tunable


  1. PROTECT a P latform for Ro bust T hr e shold C ryp t ography Jason Resch, Christian Cachin, Hugo Krawczyk, Tal Rabin, Chrysa Stathakopoulou

  2. Project • Overview • Functionality and Goals • Model and Assumptions Architecture • Tunable Security • System Architecture • Single System Outline Performance • Distributed Locally • Distributed Geographically • Installation and Configuration Demo • Secrets: Generation, Refresh, Recovery • Cryptographic Operations Discussion • General Discussion • Questions and Answers NTCW2019 2

  3. • PROTECT is an open source (MIT Licensed) platform for threshold-secure operations • Tolerates (n/3) – ( n/2) Byzantine faults • Operates over eventually synchronous networks • Self-heals and self-secures after faults and breaches Project • Supported operations: • (O)PRF, ECIES, BLS, RSA (Blind)Sign/Decrypt Overview • Generate, Store, Read, Delete, Enable, Disable • Future enhancement goals: • Share conversion, Schnorr signatures, ECDSA • Share multiplication, MPC, Threshold AES • RSA (DKG/Refresh/Recover) • Post-Quantum Cryptography NTCW2019 3

  4. ? ½ ⅓ System Model Synchronous Asynchronous Bound Bound NTCW2019 4

  5. f = ⅓ f S = n – 2 f L - 1 f L = (n – f S – 1) / 2 ⅓ ¼ ½ Minimum Asynchronous Synchronous Liveness Bound Bound NTCW2019 5

  6. Tunable Security NTCW2019 6

  7. Safety Liveness Conventional Setting ( f = 2) Tunable Security ( f L = 1, f S = 3) Tunability in Practice

  8. System Architecture NTCW2019 8

  9. Performance Results

  10. 1. Downloading 2. Installing 3. Configuration 4. Launching Servers 5. Client Setup Demo 6. Secret Management: a. Distributed Generation b. Proactive Refresh c. Share Recovery 7. Cryptographic Operations: a. Decryption b. Signing NTCW2019 10

  11. 1. Downloading 2. Installing 3. Configuration 4. Launching Servers 5. Client Setup 6. Secret Management: a. Distributed Generation b. Proactive Refresh c. Share Recovery 7. Cryptographic Operations: a. Decryption b. Signing https://youtu.be/9sDgPOUpADw NTCW2019 11

  12. 1. Downloading 2. Installing 3. Configuration 4. Launching Servers 5. Client Setup 6. Secret Management: a. Distributed Generation b. Proactive Refresh c. Share Recovery 7. Cryptographic Operations: a. Decryption b. Signing https://youtu.be/Cz9VV0FzW10 NTCW2019 12

  13. 1. Downloading 2. Installing 3. Configuration 4. Launching Servers 5. Client Setup 6. Secret Management: a. Distributed Generation b. Proactive Refresh c. Share Recovery 7. Cryptographic Operations: a. Decryption b. Signing https://youtu.be/BHM17XE6ZhQ NTCW2019 13

  14. 1. Downloading 2. Installing 3. Configuration 4. Launching Servers 5. Client Setup 6. Secret Management: a. Distributed Generation b. Proactive Refresh c. Share Recovery 7. Cryptographic Operations: a. Decryption b. Signing https://youtu.be/H4rX8gtqjrI NTCW2019 14

  15. 1. Downloading 2. Installing 3. Configuration 4. Launching Servers 5. Client Setup 6. Secret Management: a. Distributed Generation b. Proactive Refresh c. Share Recovery 7. Cryptographic Operations: a. Decryption b. Signing https://youtu.be/DXvrh1b8GH4 NTCW2019 15

  16. 1. Downloading 2. Installing 3. Configuration 4. Launching Servers 5. Client Setup 6. Secret Management: a. Distributed Generation b. Proactive Refresh c. Share Recovery 7. Cryptographic Operations: a. Decryption b. Signing https://youtu.be/ZMjMlC52MJc NTCW2019 16

  17. 1. Downloading 2. Installing 3. Configuration 4. Launching Servers 5. Client Setup 6. Secret Management: a. Distributed Generation b. Proactive Refresh c. Share Recovery 7. Cryptographic Operations: a. Decryption b. Signing https://youtu.be/hVjxZmUPwlU NTCW2019 17

  18. Q&A + Discussion • Further Reading: • The “PROTECT” open source project: • http://bit.ly/protect123 (Github Repository) • New contributors, testers, implementers welcome! • Our eprint “Tunable Protocols for Threshold and Proactive Cryptography” • Provides details of the underlying protocols • Coming soon! NTCW2019 18

Recommend


More recommend