semantic security for the
play

Semantic Security for the Wiretap Channel Stefano Tessaro MIT - PowerPoint PPT Presentation

Semantic Security for the Wiretap Channel Stefano Tessaro MIT Joint work with Mihir Bellare (UCSD) Alexander Vardy (UCSD) Cryptography today is (mainly) based on computational assumptions. We wish instead to base cryptography on a physical


  1. Semantic Security for the Wiretap Channel Stefano Tessaro MIT Joint work with Mihir Bellare (UCSD) Alexander Vardy (UCSD)

  2. Cryptography today is (mainly) based on computational assumptions. We wish instead to base cryptography on a physical assumption. Presence of channel noise

  3. Noisy channel assumption has been used previously to achieve oblivious transfer , commitments [CK88,C97] But we return to an older and more basic setting …

  4. Wyner’s Wiretap Model [W75,CK78] 𝐷 𝐷′ 𝑁 π…πŽπƒ ChR 𝐄𝐅𝐃 𝑁′ ChA π‘Ž(𝑁) Goals: Message privacy + correctness Assumption: ChA is β€œnoisier” than ChR Encryption is keyless Security is information-theoretic Additional goal: Maximize rate 𝑆 = |𝑁|/|𝐷|

  5. Channels A channel is a randomized map Ch: 0,1 β†’ 0,1 Ch … , 𝑦 4 , 𝑦 3 , 𝑦 2 , 𝑦 1 𝑧 1 , 𝑧 2 , 𝑧 3 , 𝑧 4 , … 𝑧 1 = Ch(𝑦 1 ) We extend the domain of Ch to {0,1} βˆ— via 𝑧 2 = Ch(𝑦 2 ) Ch 𝑦 1 𝑦 2 … 𝑦 π‘œ = Ch 𝑦 1 Ch 𝑦 2 … Ch 𝑦 π‘œ 𝑧 3 = Ch(𝑦 3 ) 𝑧 4 = Ch(𝑦 4 ) Ch 𝑐 = 𝑐 Clear channel: Binary symmetric channel with error probability 𝒒: 𝑐 with prob. 1 βˆ’ π‘ž BSC π‘ž 𝑐 = 1 βˆ’ 𝑐 with prob. π‘ž

  6. Wyner’s Wiretap Model – More concretely 𝐷 BSC π‘ž 𝑁 π…πŽπƒ 𝐄𝐅𝐃 𝑁′ BSC π‘Ÿ π‘Ž(𝑁) Assumption: π‘ž < π‘Ÿ ≀ 1 2

  7. Wiretap channel – Realization Increasing practical interest: Physical-layer security Very low power Very short distance 010110 … . e.g. credit card # Large distance Degraded signal

  8. Wiretap Channel – Previous work 35 years of previous work: Hundreds of papers/books on wiretap security within the information theory & coding community Two major drawbacks: 1. Improper privacy notions Entropy-based notions Only consider random messages 2. No polynomial-time schemes with optimal rate Non-explicit decryption algorithms Weaker security This work: We fill both gaps

  9. Our contributions 1. New security notions for the wiretap channel model:  Semantic security, distinguishing security following [GM82]  Mutual-information security  Equivalence among the three 2. Polynomial-time encryption scheme:  Semantically secure  Optimal rate

  10. Outline 1. Security notions 2. Polynomial-time scheme

  11. Prior work – Mutual-information security 𝐷 BSC π‘ž π…πŽπƒ 𝐄𝐅𝐃 𝑁′ 𝑁 π‘Ž(𝑁) BSC π‘Ÿ Uniformly distributed! 𝐈 𝑁|π‘Ž(𝑁) = 𝐈 𝑁 π‘Ž(𝑁) βˆ’ 𝐈 π‘Ž(𝑁) Definition: 𝐉 𝑁; π‘Ž(𝑁) = 𝐈 𝑁 βˆ’ 𝐈 𝑁|π‘Ž(𝑁) Random Mutual-Information Security (MIS-R): 𝐉 𝑁; π‘Ž(𝑁) = 𝐨𝐟𝐑𝐦 𝐈 𝑁 = P 𝑁 (𝑛) βˆ™ log 1 P 𝑁 (𝑛) 𝑛

  12. Critique – Random messages 𝐷 BSC π‘ž π…πŽπƒ 𝐄𝐅𝐃 𝑁′ 𝑁 π‘Ž(𝑁) BSC π‘Ÿ Uniformly distributed! Common misconception: c.f. e.g. [CDS11] β€œ[… ] the particular choice of the distribution on 𝑁 as a uniformly random sequence will cause no loss of generality . [ … ] the transmitter can use a suitable source-coding scheme to compress the source to its entropy prior to the transmission, and ensure that from the intruder’s point of view, 𝑁 is uniformly distributed. ” Wrong! No universal (source-independent) compression algorithm exists! We want security for arbitrary message distributions, following [GM82]!

  13. Mutual-information security, revisited Random Mutual-Information Security (MIS-R) 𝐉 𝑁; π‘Ž(𝑁) = 𝐨𝐟𝐑𝐦 New: Mutual-Information Security (MIS) max P 𝑁 𝐉 𝑁; π‘Ž(𝑁) = 𝐨𝐟𝐑𝐦 Maximize over all message distributions Critique: Mutual information is hard to work with / interpret!

  14. Semantic security Maximize over all functions + message distributions Semantic Security (SS) max 𝑔,P 𝑁 max Pr [𝑩(π‘Ž(𝑁)) = 𝑔(𝑁)] 𝑩 βˆ’ max Pr [𝑻 = 𝑔(𝑁)] = 𝐨𝐟𝐑𝐦 𝑻 BSC π‘Ÿ π‘Ž(𝑁) π…πŽπƒ 𝑁 𝑻 𝑔 𝑁 = 𝑩 𝑍 𝑔(𝑁) 𝑔 = 𝑔(𝑁) 𝑍 0/1 0/1

  15. Distinguishing security Uniform random bit 𝐢 Distinguishing Security (DS) 𝑩,𝑁 0 ,𝑁 1 Pr[𝑩 𝑁 0 , 𝑁 1 , π‘Ž 𝑁 B max = B] = 1/2 + 𝐨𝐟𝐑𝐦 Fact: = B] = 1 𝐡,𝑁 0 ,𝑁 1 Pr[A 𝑁 0 , 𝑁 1 , π‘Ž 𝑁 B max 2 + 𝐨𝐟𝐑𝐦 ⇔ max 𝑁 0 ,𝑁 1 𝐓𝐄 π‘Ž 𝑁 0 ; π‘Ž 𝑁 1 = 𝐨𝐟𝐑𝐦. 𝐓𝐄 π‘Œ; 𝑍 = 1 2 P π‘Œ 𝑀 βˆ’ P 𝑍 𝑀 𝑀

  16. Relations Theorem. MIS, DS, SS are equivalent. DS MIS MIS-R SS

  17. Outline 1. Security notions 2. Polynomial-time scheme

  18. Polynomial-time scheme 𝐷 BSC π‘ž π…πŽπƒ 𝐄𝐅𝐃 𝑁 𝑁′ BSC π‘Ÿ π‘Ž(𝑁) Goal: Polynomial-time π…πŽπƒ and 𝐄𝐅𝐃 which satisfy: 1) Correctness: Pr 𝑁 β‰  𝑁 β€² = 𝐨𝐟𝐑𝐦 2) Semantic security 3) Optimal rate  We observe that fuzzy extractors of [DORS08] can be used to achieve 1 + 2. (Also: [M92,…] )  [HM10,MV11] Constructions achieving 1 + 3 or 2 + 3. This work: First polynomial-time scheme achieving 1 + 2 + 3

  19. What is the optimal rate? 𝐷 BSC π‘ž π…πŽπƒ 𝐄𝐅𝐃 𝑁 𝑁′ BSC π‘Ÿ π‘Ž(𝑁) Definition: Rate 𝑆 = 𝑁 /|𝐷| β„Ž 𝑦 = βˆ’π‘¦ log 𝑦 βˆ’ (1 βˆ’ 𝑦) log(1 βˆ’ 𝑦) Previous work: [L77] No MIS-R secure scheme can have rate higher than β„Ž π‘Ÿ βˆ’ β„Ž(π‘ž) βˆ’ 𝑝(1) . Our scheme: Rate β„Ž π‘Ÿ βˆ’ β„Ž π‘ž βˆ’ 𝑝(1) Hence, β„Ž π‘Ÿ βˆ’ β„Ž(π‘ž) βˆ’ 𝑝(1) is the optimal rate for all security notions!

  20. Our encryption scheme 𝑛 ≀ 𝑙 βˆ’ 1 βˆ’ β„Ž π‘Ÿ + 𝑝(1) π‘œ π…πŽπƒ 𝑇 (𝑁) 𝑛 bits 𝑙 βˆ’ 𝑛 bits 𝑁 𝑙 bits GF 2 𝑙 multiplication 𝑇 β‰  0 𝑙 π‘Œ Public seed Poly-time + injective + linear 𝐅 𝐷 π‘œ bits

  21. Our encryption scheme – Security Theorem. π…πŽπƒ is semantically secure . 𝑁 𝑇 β‰  0 Challenge: Ciphertext distribution π‘Œ depends on combinatorial properties of E . 𝐅 𝐷 Two steps: 1. Reduce semantic security to random-message security. 2. Prove random-message security.

  22. Our encryption scheme – Decryptability and rate 𝑛 = 𝑙 βˆ’ 1 βˆ’ β„Ž π‘Ÿ + 𝑝(1) π‘œ 𝐄𝐅𝐃 𝑇 (𝐷′) : 𝑛 π…πŽπƒ 𝑇 (𝑁) : 𝑙 βˆ’ 𝑛 𝑛 π‘œ = β„Ž π‘Ÿ βˆ’ β„Ž π‘ž βˆ’ 𝑝(1) Optimal rate: 𝑁 𝐷′ 𝑇 β‰  0 𝐄 π‘Œ π‘Œβ€² 𝐅 𝑇 βˆ’1 𝐷 𝑁′ π‘œ Observation. If (𝐅, 𝐄) are encoder/decoder of ECC for BSC π‘ž , then correctness holds. Optimal choice: Concatenated codes [F66] , polar codes [A09] : 𝑙 = 1 βˆ’ β„Ž π‘ž βˆ’ 𝑝(1) π‘œ

  23. Concluding remarks Summary:  New equivalent security notions for the wiretap setting: DS, SS, MIS.  First polynomial-time scheme achieving these security notions with optimal rate.  Our scheme is simple, modular, and efficient.

  24. Concluding remarks Summary:  New equivalent security notions for the wiretap setting: DS, SS, MIS.  First polynomial-time scheme achieving these security notions with optimal rate.  Our scheme is simple, modular, and efficient. Additional remarks:  We provide a general and concrete treatment.  Scheme can be used on larger set of channels.

  25. Concluding remarks Summary:  New equivalent security notions for the wiretap setting: DS, SS, MIS.  First polynomial-time scheme achieving these security notions with optimal rate.  Our scheme is simple, modular, and efficient. Additional remarks:  We provide a general and concrete treatment.  Scheme can be used on larger set of channels. Thank you!

Recommend


More recommend