on minimal assumptions for sender-deniable public key encryption dana dachman-soled university of...

Post on 16-Dec-2015

221 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

On Minimal Assumptions for Sender-Deniable Public Key Encryption

Dana Dachman-SoledUniversity of Maryland

Deniable Public Key Encryption[Canetti, Dwork, Naor, Ostrovsky, 97]

Sender Receiver

๐‘๐‘˜

๐‘=๐ธ๐‘›๐‘๐‘๐‘˜(๐‘š ;๐‘Ÿ )

s

For any in the message space, can produce a fake opening explaining the transcript as an encryption of

Outputs:

Sender-Deniable Public Key Encryption[Canetti, Dwork, Naor, Ostrovsky, 97]

Sender Receiver

๐‘๐‘˜

๐‘=๐ธ๐‘›๐‘๐‘๐‘˜(๐‘š ;๐‘Ÿ )

s

For any in the message space, can produce a fake opening explaining the transcript as an encryption of

Analogous definition for Receiver-Deniable Public Key Encryption

Applications:โ€ข After the fact incoercibility

โ€ข Adaptive security

Outputs:

What is known?

โ€ข Receiver-Deniable PKE and thus Deniable PKE is impossible [Bendlin, Nielsen, Nordholt, Orlandi, 11].

โ€ข Sender-Deniable encryption with weak security from standard assumptions [Canetti, Dwork, Naor, Ostrovsky, 97].

โ€ข Bi-Deniable encryption in the multi-distributional model constructed by [Oโ€™Neill, Peikert, Waters, 11]

โ€ข [Sahai, Waters 14] achieve Sender-Deniable public key encryption from indistinguishability obfuscation (IO).โ€“ Non-black box use of underlying primitives.โ€“ Requires strong assumptions (FHE + multilinear maps).

Our Goal

โ€ข Understand minimal assumptions necessary for sender-deniable public key encryption.

โ€ข Necessity of non-black-box techniques.

Is there a black-box construction of sender-deniable public key encryption from simulatable public key encryption?

Underlying primitive we considerSimulatable Public Key Encryption

Intuition: Can generate a public key/ciphertext honestly and claim that it was generated obliviously.

s.t.

, pk) s.t. โ‰ˆ

Algorithms

( s.t.

s.t. โ€œObliviousโ€

Why this primitive? Simulatable PKE is sufficient for related primitives:โ€ข Bi-deniable encryption in the multi-distributional model [OPW11]

โ€ข 1/poly-secure sender-deniable encryption [CDNO97]โ€ข Non-committing encryption [CFGN96].

Weak Sender-Deniable PKEfrom Simulatable PKE

Simplification of [CDNO97] construction:

Problem: Cannot lie and claim that an obliviously generated ciphertext was generated non-obliviously.

Only achieves O(k) security, where k is the number of queries made by encryption.

Polynomial security: Real and Fake openings can be distinguished with 1/poly advantage

Super-polynomial security: Real and Fake openings can only be distinguished with negligible advantage

๐ธ๐‘๐‘˜(0๐‘˜) Obliv Obliv ๐ธ๐‘๐‘˜(0

๐‘˜) ๐ธ๐‘๐‘˜(0๐‘˜) Obliv. . .

k ciphertexts

Obliv. Obliv. Obliv

To encrypt a 0, set odd number of ciphertexts to oblivious.To encrypt a 1, set an even number of ciphertexts to oblivious.

To deny, lie and say that an honestly generated ciphertext was generated obliviously.

Our Results

Theorem: There is no black-box construction of sender-deniable public key encryption with super-polynomial security from

simulatable public key encryption.

More specifically: Every black-box construction of a sender-deniable PKE scheme from simulatable PKE which makes queries to the simulatable PKE cannot achieve security better than .

Nearly tight with [CDNO97] construction.

Some Proof IntuitionOracle separation: Oracle relative to which Simulatable PKE exists, Sender-Deniable PKE does not exist.Our oracle:

โ€ข takes inputs and outputs .โ€ข takes inputs and outputs .โ€ข takes inputs and returns if and and otherwise.

Simulatable PKE relative to oracle:โ€ข First bits of input x is plaintext.โ€ข Public keys and ciphertexts are indistinguishable from

random strings:output .output and itself.

Important: random string is unlikely to be in the

range of or

Some Proof Intuition

Impossibility of Sender-Deniable Encryption:In a super-polynomially-secure scheme, should be able to run deny an unbounded polynomial number of times and have that:โ€ข original randomnessโ€ข looks freshโ€ข looks fresh

. . .โ€ข looks fresh

In the oracle case: We consider sequences of Sender views . Each view contains the input bit, random tape, oracle queries + responses.

Some Proof Intuition

โ€ข Correctness of encryption guarantees:โ€“ If Senderโ€™s view is an encryption of a bit b, then Receiverโ€™s view

sampled conditioned on Senderโ€™s view will be a decryption of the same bit b w.h.p.

โ€“ Using [Impagliazzo, Rudich, 89]-type techniques:โ€ข can use Eve algorithm to find set of likely intersection queries

between and :

โ€“ Note that are fixed.โ€“ The only way to change the distribution of , is to change the set .โ€“ Distribution must change in each iteration.

is the set of likely intersection queries between given โ€™s view.

A First Attemptโ€ข Consider the set generated by from its real .โ€ข Let be the set corresponding to fake โ€ข โ€œClaimโ€: โ€ข Therefore, in order to change distribution over

Receiverโ€™s view, queries must be removed each time.โ€ข There are at most poly number of queries in real so

deny can be run at most a polynomial number of times before it fails. So cannot get super-polynomial security.

โ€ข โ€œClaimโ€: Intuitively, this is what happens in [CDNO97] construction.

Decrypt: Decrypt 12n ciphertexts. If they all output , output 0.Otherwise, compute and decrypt to get . Output 1.

Problemโ€ข โ€œClaimโ€ is false! It is possible that .โ€ข Toy Example:

๐ธ (๐‘๐‘˜ ,0๐‘˜)To encrypt a 0:

12n encryptions

๐ธ (๐‘๐‘˜ ,0๐‘˜) ๐ธ (๐‘๐‘˜ ,0๐‘˜) ๐ธ (๐‘๐‘˜ ,0๐‘˜)

๐ธ (๐‘๐‘˜ ,0๐‘˜)

To encrypt a 1:Compute ; Say length bits.

Obliv Obliv ๐ธ (๐‘๐‘˜ ,0๐‘˜)Note: In 0 case, intersection queries will consist of .

In 1 case, intersection queries will contain .

Problemโ€ข โ€œClaimโ€ is false! It is possible .โ€ข Toy Example:

๐ธ (๐‘๐‘˜ ,0๐‘˜)

Can claim an encryption of 0 is an encryption of 1:In the process will add an arbitrary query to set of intersection queries.

๐ธ (๐‘๐‘˜ ,0๐‘˜) ๐ธ (๐‘๐‘˜ ,0๐‘˜) ๐ธ (๐‘๐‘˜ ,0๐‘˜)

๐ธ (๐‘๐‘˜ ,0๐‘˜)

Compute ; Say

Obliv Obliv ๐ธ (๐‘๐‘˜ ,0๐‘˜)

Note: Intersection queries now include, .

Some Proof Intuition

โ€ข Main technical part of proof is to deal with the case that .

โ€ข Use an information compression argument to show that w.h.p. over choice of oracle, we cannot have a sequence of openings with too many new queries.

Some Proof Intuition

โ€ข Since Eve makes a polynomial number of queries: Can encode a sequence of openings with a short string. So total possible number of encodings is small.โ€“ Intuition: To encode a query , use its index in the Eve algorithm.

โ€ข For a fixed encoding, probability randomly chosen oracle is consistent with the encoded sequence of openings is small.โ€“ Follows from property of oracle that a random string is unlikely

to be in image of .โ€ข Since number of encodings is small, prob. a randomly

chosen oracle is consistent with any sequence is small.

Open Problems

โ€ข Extend impossibility result to trapdoor permutations.

โ€ข Extend impossibility results to multiple round encryption schemes.

โ€ข Construct sender-deniable public key encryption without relying on IO?

Thank you!

top related