Our Current Knowledge of Knowledge Assumptions

Slides:



Advertisements
Similar presentations
Perfect Non-interactive Zero-Knowledge for NP
Advertisements

On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols Iftach Haitner, Alon Rosen and Ronen Shaltiel 1.
Are PCPs Inherent in Efficient Arguments? Guy Rothblum, MIT ) MSR-SVC ) IAS Salil Vadhan, Harvard University.
Strict Polynomial-Time in Simulation and Extraction Boaz Barak & Yehuda Lindell.
Its Not The Assumption, Its The Reduction GMfest13c Assumptions Panel Presentation Ran Canetti.
Statistical Zero-Knowledge Arguments for NP from Any One-Way Function Salil Vadhan Minh Nguyen Shien Jin Ong Harvard University.
On the Amortized Complexity of Zero-Knowledge Proofs Ronald Cramer, CWI Ivan Damgård, Århus University.
Inaccessible Entropy Iftach Haitner Microsoft Research Omer Reingold Weizmann Institute Hoeteck Wee Queens College, CUNY Salil Vadhan Harvard University.
OPENING THE BLACK BOX Boaz Barak Institute for Advanced Study Princeton, NJ New Techniques in Cryptography.
Efficient Non-Interactive Zero Knowledge Arguments for Set Operations Prastudy Fauzi, Helger Lipmaa, Bingsheng Zhang University of Tartu, University of.
Vote privacy: models and cryptographic underpinnings Bogdan Warinschi University of Bristol 1.
REDUCTION-RESILIENT CRYPTOGRAPHY: PRIMITIVES THAT RESIST REDUCTIONS FROM ALL STANDARD ASSUMPTIONS Daniel Wichs (Charles River Crypto Day ‘12)
Rennes, 24/10/2014 Cristina Onete CIDRE/ INRIA Sigma Protocols and (Non-Interactive) Zero Knowledge.
Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen.
How to Delegate Computations: The Power of No-Signaling Proofs Ron Rothblum Weizmann Institute Joint work with Yael Kalai and Ran Raz.
Optimistic Concurrent Zero-Knowledge Alon Rosen IDC Herzliya abhi shelat University of Virginia.
1 Vipul Goyal Abhishek Jain Rafail Ostrovsky Silas Richelson Ivan Visconti Microsoft Research India MIT and BU UCLA University of Salerno, Italy Constant.
On the Composition of Public- Coin Zero-Knowledge Protocols Rafael Pass (Cornell) Wei-Lung Dustin Tseng (Cornell) Douglas Wiktröm (KTH) 1.
Efficient Zero-Knowledge Proof Systems Jens Groth University College London FOSAD 2014.
Nir Bitansky and Omer Paneth. Interactive Proofs.
Non-interactive Zaps and New Techniques for NIZK Jens Groth Rafail Ostrovsky Amit Sahai University of California Los Angeles.
A Parallel Repetition Theorem for Any Interactive Argument Iftach Haitner Microsoft Research TexPoint fonts used in EMF. Read the TexPoint manual before.
CS426Fall 2010/Lecture 351 Computer Security CS 426 Lecture 35 Commitment & Zero Knowledge Proofs.
Non-interactive and Reusable Non-malleable Commitments Ivan Damgård, BRICS, Aarhus University Jens Groth, Cryptomathic A/S.
Nir Bitansky Ran Canetti Henry Cohn Shafi Goldwasser Yael Tauman-Kalai
On the Implausibility of Differing-Inputs Obfuscation (and Extractable Witness Encryption) with Auxiliary Input Daniel Wichs (Northeastern U) with: Sanjam.
Impossibility and Feasibility Results for Zero Knowledge with Public Keys Joël Alwen Tech. Univ. Vienna AUSTRIA Giuseppe Persiano Univ. Salerno ITALY Ivan.
Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity Ran Canetti, Abhishek Jain and Omer Paneth 1.
Non-Interactive Verifiable Computing August 5, 2009 Bryan Parno Carnegie Mellon University Rosario Gennaro, Craig Gentry IBM Research.
Witness Encryption and Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption Craig Gentry IBM Allison Lewko Columbia Amit.
NIR BITANSKY, OMER PANETH, ALON ROSEN ON THE CRYPTOGRAPHIC HARDNESS OF FINDING A NASH EQUILIBRIUM.
Dominique Unruh Quantum Proofs of Knowledge Dominique Unruh University of Tartu Tartu, April 12, 2012.
Bounded key-dependent message security
Topic 36: Zero-Knowledge Proofs
The Exact Round Complexity of Secure Computation
The Exact Round Complexity of Secure Computation
Yi Deng IIE,Chinese Academy of Sciences (Beijing) Joint work with
Lower Bounds on Assumptions behind Indistinguishability Obfuscation
Reusable Fuzzy Extractors for Low-Entropy Distributions
On the Size of Pairing-based Non-interactive Arguments
MPC and Verifiable Computation on Committed Data
Laconic Oblivious Transfer and its Applications
Topic 14: Random Oracle Model, Hashing Applications
Digital Signature Schemes and the Random Oracle Model
Verifiable Oblivious Storage
A Generic Approach for Constructing Verifiable Random Functions
Cryptography Lecture 19.
Digital Signature Schemes and the Random Oracle Model
Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces
Cryptographic protocols 2016, Lecture 12 Sigma protocols
Zero Knowledge Proofs. 20 Years after its Invention
Cryptography for Quantum Computers
When are Fuzzy Extractors Possible?
cryptographic protocols 2014, lecture 12 Getting full zero knowledge
Alessandra Scafuro Practical UC security Black-box protocols
Zcash adds privacy to Bitcoin’s decentralization
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
When are Fuzzy Extractors Possible?
Quantum-security of commitment schemes and hash functions
Fiat-Shamir for Highly Sound Protocols is Instantiable
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
Post-Quantum Security of Fiat-Shamir
Short Pairing-based Non-interactive Zero-Knowledge Arguments
Impossibility of SNARGs
Cryptography Lecture 21.
Cryptography Lecture 15.
Identity Based Encryption from the Diffie-Hellman Assumption
Jens Groth and Mary Maller University College London
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
Presentation transcript:

Our Current Knowledge of Knowledge Assumptions Nir Bitansky Survey talk Technically light The tree of knowledge discovers where paper comes from

A (Somewhat) True Story \ Galileo (circa 1610) “I have observed saturn 3-formed” 𝜋 “I formed the 3-nosed verb suvara ”

“I am an uber soft 3-d horsed verve” Kepler’s Discovery \ Kepler “I am an uber soft 3-d horsed verve”

What a Coincidence… 𝜋 −1 𝜎 −1 “I have observed saturn 3-formed” “I formed the 3-nosed verb suvara ” 𝜋 −1 “I have observed saturn 3-formed” \ 𝜎 −1 “I am an uber soft 3-d horsed verve”

Explanations Challenge: demonstrate knowledge w/o revealing it “concurrent and independent work” “K didn't know what he’s committing to” \ Challenge: demonstrate knowledge w/o revealing it

ZK Proofs of Knowledge [Gloldwasser-Micali-Rackoff, Feige-Shamir, Goldreich-Bellare] 𝑥∈ℒ Hide the Witness Efficient Extraction 𝑃 𝑉 Witness We say that an interactive proof is a proof of knowledge if every prover that can convince the verifier of some NP statement, must know a witness. Witness is hidden makes it non-trivial And the way that this is formalize is by requiring an efficient extractor.

Knowledge ≈ efficiently extractable from adversary The Extraction Paradigm Adversary Reduction/Sim Knowledge ≈ efficiently extractable from adversary Extractor So how do we typically capture knowledge? The common paradigm is that a given (perhaps adversarial) entity knows something if we can efficiently extract it out. Such knowledge extraction doesn’t only stand on its own, but it’s commonly used in our security analysis: reduction or simulator. Knowledge

Extraction in Cryptographic Analysis CCA2 encryption ZK simulation . . . . . . Extraction Owner of sk also generates proof of correctness What does correctness mean. The function is generated with a vk. Correctness is consistency input independence In MPC composition

How is Knowledge Extracted? Adversary ? So how do we typically capture knowledge? The common paradigm is that a given (perhaps adversarial) entity knows something if we can efficiently extract it out. Knowledge

“fake” public parameters Black-Box Extraction “fake” public parameters Adversary + trapdoor Adversary Extractor ? So how do we typically capture knowledge? The common paradigm is that a given (perhaps adversarial) entity knows something if we can efficiently extract it out. Knowledge by rewinding

Black-box reductions/simulators have barriers Non-Black-Box Techniques Limits of Black-Box Extraction Black-box reductions/simulators have barriers […, Goldreich-Krawczyk, …,Gentry-Wichs, …] Adversary Non-Black-Box Techniques [Barak, … ,B-Kalai-Paneth] ? constant-round public-coin ZK 3-message ZK SNARGs for NP . . . So how do we typically capture knowledge? The common paradigm is that a given (perhaps adversarial) entity knows something if we can efficiently extract it out. Knowledge

Knowledge Assumptions So now I want to get to our main topic which is knowledge assumptions and extractable functions and see how they fit into this picture The tree of knowledge discovers knowledge assumptions (and where violins come from)

non-black-box extractor Knowledge of Exponent Assumption [Damgård] 𝐺∼ 𝑍 𝑝 Adversary 𝑔 𝒗 𝑔 𝛼𝒗 𝑍 𝑝 non-black-box extractor meaningful assuming DLOG! 𝒗 Note that this is meaningful only assuming DLOG, or trivial. And this hardness is also why such an extractor must be non-BB. 𝑍 𝑝 𝛼 ∀𝐴 ∃𝐸 : 𝑖𝑓 𝐴 𝑔, 𝑔 𝒗 = 𝑔 𝛼𝒗 𝑡ℎ𝑒𝑛 𝐸 𝑔, 𝑔 𝒗 =𝛼

non-black-box extractor Abstracting: Extractable Primitives [Canetti-Dakdouk,…] Adversary 𝑘 𝑓 𝑘 𝑥 non-black-box extractor meaningful assuming Hardness! So how do we typically capture knowledge? The common paradigm is that a given (perhaps adversarial) entity knows something if we can efficiently extract it out. EWOF, ECRH, ENC,… 𝑥 ∀𝐴 ∃𝐸 : 𝑖𝑓 𝐴 𝑘 = 𝑓 𝑘 (𝑥) 𝑡ℎ𝑒𝑛 𝐸 𝑘 =𝑥

Other Extraction Beasts Concurrently extractable OWFs [B-Canetti-Chiesa-Goldwasser-Lin-Rubinstein-Tromer, Gupta-Sahai] Extractable IO (aka differing-input obfuscation) [Barak-Goldreich-Impagliazzo-Rudich-Sahai-Vadhan-Yang, Boyle-Chung-Pass, Ananth-Boneh-Garg-Sahai-Zhandry, Ishai-Pandey-Sahai] Auxiliary-input point obfuscation [Canetti, B-Paneth,…] So what we show is that you can combine SKFE with plain PKE to go all the way to PKFE. Not today…

Applications Which is really why extractable functions succeed in achieving applications, where there is not enough interaction to commit the adversary to some normal behavior.

Damgard CCA KEA Which is really why extractable functions succeed in achieving applications, where there is not enough interaction to commit the adversary to some normal behavior.

KEA CCA EOWF 3-ZK Canetti-Dakdouk B-Canetti-Chiesa-Goldwasser- Lin-Rubinstein-Tromer KEA 3-ZK Hada-Tanaka, Bellare-Palacio Which is really why extractable functions succeed in achieving applications, where there is not enough interaction to commit the adversary to some normal behavior.

Gennaro-Gentry-Parno-Raykova linear encryption (lattices, factoring) CCA KEA EOWF linear-only encryption ECRH B-Canetti- Chiesa-Tromer 3-ZK B-Chiesa-Ishai- Paneth-Ostrovsky Which is really why extractable functions succeed in achieving applications, where there is not enough interaction to commit the adversary to some normal behavior. SNARKs (NP) Mie, Groth, Lipmaa, Gennaro-Gentry-Parno-Raykova

KEA linear encryption (lattices, factoring) CCA EOWF linear-only ECRH 3-ZK Which is really why extractable functions succeed in achieving applications, where there is not enough interaction to commit the adversary to some normal behavior. SNARKs (NP)

Applications SNARKs (NP) Which is really why extractable functions succeed in achieving applications, where there is not enough interaction to commit the adversary to some normal behavior. SNARKs (NP)

[Boneh-Ishai-Sahai-Wu] The Power of SNARKs delegating computation proof-carrying data [Chiesa-Tromer] . . . . . . SNARKs Owner of sk also generates proof of correctness What does correctness mean. The function is generated with a vk. Correctness is consistency efficient obfuscation image authentication crypto currency [ZCash] [Boneh-Ishai-Sahai-Wu] [Tromer-Naveh]

Succinct Non-Interactive Argument of Knowledge computationally sound What’s a SNARK? Succinct Non-Interactive Argument of Knowledge 𝑐𝑟𝑠 𝑃(𝑥,𝑤) (reusable) 𝑉(𝑥) 𝜋 computationally sound fast verification |𝜋|≪|𝑤| Which is really why extractable functions succeed in achieving applications, where there is not enough interaction to commit the adversary to some normal behavior.

Succinct Non-Interactive Argument of Knowledge non-black-box extractor What’s a SNARK? Succinct Non-Interactive Argument of Knowledge 𝑐𝑟𝑠 𝑃(𝑥,𝑤) (reusable) 𝑉(𝑥) 𝜋 fast verification |𝜋|≪|𝑤| non-black-box extractor Which is really why extractable functions succeed in achieving applications, where there is not enough interaction to commit the adversary to some normal behavior. 𝑤 Variants: short/long crs, privately/publicly verifiable

Approach for SNARKs (Oversimplified) [IKOS,…,BCIOP, GGPR,…] Linear PCP + So to demonstrate how we could use knowledge to get SNARKs. I want to briefly tell you about a simple paradigm to do this (and this will be somewhat sketchy and oversimplified) Linear-Only Encryption

Linear PCP ∃LPCP w/ quasi-optimal 𝑃, “very simple” 𝑉 𝑃(𝑥,𝑤) 𝑉(𝑥) 𝝅∈ 𝔽 𝑛 𝒒∈ 𝔽 𝑛 〈𝒒,𝝅〉 𝑃(𝑥,𝑤) this talk: 1 query 𝑉(𝑥) Which is really why extractable functions succeed in achieving applications, where there is not enough interaction to commit the adversary to some normal behavior. ∃LPCP w/ quasi-optimal 𝑃, “very simple” 𝑉 [QSPs: Gentry-Gennaro-Parno-Raykova]

Linear-Only Encryption [Boneh-Segev-Waters] 𝐸 𝑥 1 ⋯𝐸( 𝑥 𝑛 ) 𝐴 linearly-homomorphic, semantic-secure 𝐸(𝑧) “valid” non-black-box extractor Which is really why extractable functions succeed in achieving applications, where there is not enough interaction to commit the adversary to some normal behavior. 𝒚∈ 𝔽 𝑛 :𝑧=〈𝒙,𝒚〉 candidates from linear schemes + KEA* (also some relaxed formulations)

Putting Them Together 𝑃(𝑥,𝑤) 𝑉(𝑥) 𝐸(𝑞 1 ),…, 𝐸(𝑞 𝑚 )∈𝔽 𝐸( 𝝅,𝒒 ) Which is really why extractable functions succeed in achieving applications, where there is not enough interaction to commit the adversary to some normal behavior.

Soundness (Knowledge) Intuition 𝐸(𝑞 1 ),…, 𝐸(𝑞 𝑚 )∈𝔽 𝑃 ∗ 𝑉(𝑥) 𝐸( 𝑧 ∗ ) accepts! non-black-box extractor Which is really why extractable functions succeed in achieving applications, where there is not enough interaction to commit the adversary to some normal behavior. 𝑧 ∗ valid PCP answer semantic-security 𝝅 ∗ ∈ 𝔽 𝑛 : 𝑧 ∗ =〈 𝝅 ∗ ,𝒒〉 decode 𝑤 〈 𝝅 ∗ ,𝒒′←$〉 valid w.h.p

Was Knowledge So Important Here? Relaxed “linear-only” ⇒ soundness (SNARG) But, knowledge is crucial when composing! “I know a hash preimage” “I also know a SNARK of previous preimage ” Often needed in applications…. bootstrapping SNARKs

Knowledge Assumptions? So Why Don’t We Like Knowledge Assumptions? candidates intuition applications What’s missing? So how do we typically capture knowledge? The common paradigm is that a given (perhaps adversarial) entity knows something if we can efficiently extract it out.

Hope for explicit non-black-box extractor? A Hole in the Reduction ZCash Adversary Reduction Extractor collision in SHA ∀𝐴 ∃𝐸 : 𝑖𝑓 𝐴 𝑘 = 𝑓 𝑘 (𝑥) 𝑡ℎ𝑒𝑛 𝐸 𝑘 =𝑥 Hope for explicit non-black-box extractor?

Hope for Explicit Extractor?

Hope for Explicit Extractor? ∃𝐸 ∀𝐴: 𝑖𝑓 𝐴 𝑘 = 𝑓 𝑘 (𝑥) 𝑡ℎ𝑒𝑛 𝐸 𝑘 =𝑥 ∀𝐴 ∃𝐸 Adversary 𝑘 𝑓 𝑘 𝑥 Universal Extractor 𝑥

Adversary’s code may be obfuscated… Made formal assuming IO Limitation [Hada-Tanak, Goldreich] Adversary’s code may be obfuscated… Adversary 𝑘 𝑓 𝑘 𝑥 Universal Extractor 𝑥 Made formal assuming IO [B-Canetti-Paneh-Rosen]

Food for Thought

Something We Can Do (std. assumptions) [B-Canetti-Paneth-Rosen] Uniform Adversary 𝑘 𝑓 𝑘 𝑥 Universal Extractor 𝑥 unsatisfying! Q1: Other extractable primitives?

Relax the Definition 𝑘≈ 𝑘 𝑓 𝑘 𝑥 𝑥 Adversary 𝑘≈ 𝑘 𝑓 𝑘 𝑥 Universal Extractor 𝑥 Sufficient for 3ZK if one-way for all 𝒌 … Q2: Sufficient for SNARKs? Constructions?

Non-Uniform Techniques? ∃𝐸 ∀𝐴: 𝑖𝑓 𝐴 𝑘 = 𝑓 𝑘 (𝑥) 𝑡ℎ𝑒𝑛 𝐸 𝑘 =𝑥 ∀𝐴 ∃𝐸 Adversary 𝑘 𝑓 𝑘 𝑥 Extractor 𝑥 Q3: Prove existence (under better assumption)

Non-Uniform Techniques? ∃𝐸 ∀𝐴: 𝑖𝑓 𝐴 𝑘 = 𝑓 𝑘 (𝑥) 𝑡ℎ𝑒𝑛 𝐸 𝑘 =𝑥 ∀𝐴 ∃𝐸 Adversary 𝑘 𝑓 𝑘 𝑥 Extractor 𝑥 Q4: Disprove existence!

Thanks! Recall what is FE In plain, say public-key, encryption Those w/ the key, others can’t tell one encrypted message from the other