using indistinguishability obfuscation with uces · (under very strong po) q-query correlated input...

34
13. Oktober 2010 | Dr.Marc Fischlin | Kryptosicherheit | 1 Using Indistinguishability Obfuscation with UCEs 21. ASIACRYPT, Dec 10 th , 2014 Christina Brzuska Arno Mittelbach

Upload: others

Post on 19-Apr-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

13. Oktober 2010 | Dr.Marc Fischlin | Kryptosicherheit | 1

Using Indistinguishability Obfuscation

with UCEs

21. ASIACRYPT, Dec 10th, 2014

Christina Brzuska

Arno Mittelbach

Page 2: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

2

The results in a nutshell

New technique to work with indistinguishability Obfuscation

Extension of punctured programs technique to hide punctured points

Use Point Function Obfuscation within iO

Universal Hardcore Function

(under very strong PO)

q-query correlated input

secure hash function

(under weaker PO)

UCE secure with respect to strong unpredictability

Page 3: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

3

What are UCEs?

Page 4: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

4

The Random Oracle Model (ROM)

$$ $$

[Nice drawings by Giorgia Azzurra Marson others by Arno Mittelbach]

Page 5: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

5

The Random Oracle Model (ROM)

ROM Standard Model Instantiation

SHA-123 Replace Random Oracle by

concrete hash function that

„behaves like a Random Oracle“

[Nice drawings by Giorgia Azzurra Marson others by Arno Mittelbach]

Page 6: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

8

Random Oracles are Practical [BR93]

Page 7: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

9

Random Oracles are controversial [CGH98,Nie02,GK03,MRH04,DOP05,BBP04, CGH04,BFM14]…

Page 8: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

10

Bellare, Hoang, Keelveedhi (Crypto 2013) [BHK13]

The lack of a proof of security for the instantiated

scheme is […] a consequence of an even more

fundamental lack, namely that of a definition, of what it

means for a family of functions to “behave like a RO”

[BHK13]

Page 9: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

11

UCE Framework [BHK13] (Universal Computational Extractors)

?

The symmetric setting:

Page 10: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

12

UCE Framework [BHK13] (Universal Computational Extractors)

?

The public-key setting:

Page 11: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

13

UCE Framework [BHK13] (Universal Computational Extractors)

Simply

recompute!

The public-key setting:

Page 12: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

14

UCE Framework [BHK13] (Universal Computational Extractors)

The UCE setting:

Generate Leakage

Source

Decide if H or RO

Distinguisher

Restrictions on Source and

Distinguisher yield specific

UCE assumption.

Page 13: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

15

UCE Framework [BHK13] (Universal Computational Extractors)

UCE (Universal Computational Extractors) is a Framework

to design assumptions that describe features of a

random oracle

Page 14: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

16

What are good UCEs?

Page 15: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

17

UCE Framework [BHK13] Layered Cryptography Paradigm

Random Oracle Model

Scheme A Scheme B

Scheme C

Scheme D

Scheme E

Scheme F

Page 16: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

18

UCE Framework [BHK13] UCE1=UCE[Scup]: Computational Unpredictability

Must hide x

computationally Instantiate

D-PKE

Hardcore Functions

MLE OAEP

KDM

RKA

... And More

Find query x

Page 17: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

19

UCE vs. iO [BrzuskaFarshimMittelbach14]

However, all assumptions validated only in the ROM

Page 18: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

20

What are good UCEs?

One Definition: Good UCEs are those that strike the right balance between

being powerful and feasible.

Candidate Construction in Standard Model

Nice Applications

Page 19: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

21

UCEs with Strongly Unpredictable Sources

Page 20: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

22

UCE with unpredictable sources

unpredictability

Efficient extractor

Unbounded extractor

Page 21: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

23

UCE with strongly unpredictable sources

Strong unpredictability

Efficient extractor

Unbounded extractor

Universal Hardcore Functions

Correlated Input-Secure Hashing

Page 22: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

24

UCEs with strongly unpredictable sources

In the standard model

Indistinguishability

Obfuscation Strong Point Obfuscation

Computational unpredictability for single query:

Statistical unpredictability for poly many queries:

Page 23: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

25

Puncturable Pseudorandom Function

The Construction

Indistinguishability Obfuscation Puncturable Pseudorandom Function

Page 24: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

26

Indistinguishability Obfuscation (iO)

Is it iO(P0)

or iO(P1)

( )

Page 25: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

27

The Construction

[BST14] (previous talk)

The above construction is hardcore for an injective one-way function if

padded sufficiently before obfuscation.

Indistinguishability Obfuscation Puncturable Pseudorandom Function

Page 26: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

28

The Construction

Indistinguishability Obfuscation Puncturable Pseudorandom Function

Pad Before Obfuscation

Padding depends on number of

adversarial queries.

Page 27: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

29

UCEs with strongly unpredictable sources

In the standard model

Indistinguishability

Obfuscation Strong Point Obfuscation

Hang On!

• Where is the Point Obfuscation?

Page 28: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

30

The Construction Hang On!

• Where is the Point Obfuscation?

Point Obfuscation

• Only used within the proof

• AIPO: Point obfuscation secure in the presence of auxiliary information

AIPOs have been built from non-

standard assumptions [C97,BP12]

z hides x0

computationally

statistically

Page 29: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

31

Point Obfuscation with iO A new proof technique

Point obfuscation allows to hide where puncturing takes place.

Page 30: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

32

Point Obfuscation with iO A new proof technique 1. „Standard Puncturing“ [SW13]

iO

iO

PRF

Page 31: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

33

Point Obfuscation with iO A new proof technique 2. „Hide Punctured Point“

iO

diO

PO+iO+[BCP14]

Page 32: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

34

Proof Overview

Page 33: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

35

Summary

Propose UCE with strong unpredictability

statistical correlated input security

computational hardcore functions

Standard Model Constructions from iO and AIPO (universal) hardcore functions

q-query correlated input secure hashes

New iO proof technique: use Point Obfuscation Extension of punctured programs technique to hide punctured point

Page 34: Using Indistinguishability Obfuscation with UCEs · (under very strong PO) q-query correlated input secure hash function ... UCE secure with respect to strong unpredictability . 3

36