Four-Round Secure Computation without Setup

Slides:



Advertisements
Similar presentations
Efficient Private Approximation Protocols Piotr Indyk David Woodruff Work in progress.
Advertisements

Efficiency vs. Assumptions in Secure Computation Yuval Ishai Technion & UCLA.
Secure Evaluation of Multivariate Polynomials
Efficient Two-party and Multiparty Computation against Covert Adversaries Vipul Goyal Payman Mohassel Adam Smith Penn Sate UCLAUC Davis.
Semi-Honest to Malicious Oblivious-Transfer The Black-box Way Iftach Haitner Weizmann Institute of Science.
1 Vipul Goyal Abhishek Jain UCLA On the Round Complexity of Covert Computation.
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE Bar-Ilan University Gilad Asharov UCLA Abhishek Jain NYU Adriana.
1 Vipul Goyal Abhishek Jain Rafail Ostrovsky Silas Richelson Ivan Visconti Microsoft Research India MIT and BU UCLA University of Salerno, Italy Constant.
Two Round MPC via Multi-Key FHE Daniel Wichs (Northeastern University) Joint work with Pratyay Mukherjee.
Simons Institute, Cryptography Boot Camp
1 Cross-Domain Secure Computation Chongwon Cho (HRL Laboratories) Sanjam Garg (IBM T.J. Watson) Rafail Ostrovsky (UCLA)
Efficient and Robust Private Set Intersection and multiparty multivariate polynomials Dana Dachman-Soled 1, Tal Malkin 1, Mariana Raykova 1, Moti Yung.
Lattice-Based Cryptography: From Practice to Theory to Practice Vadim Lyubashevsky INRIA / CNRS / ENS Paris (September 12, 2011)
Improved Non-Committing Encryption with Application to Adaptively Secure Protocols joint work with Dana Dachman-Soled (Columbia Univ.), Tal Malkin (Columbia.
On the Communication Complexity of SFE with Long Output Daniel Wichs (Northeastern) joint work with Pavel Hubáček.
1 Information Security – Theory vs. Reality , Winter Lecture 10: Garbled circuits and obfuscation Eran Tromer Slides credit: Boaz.
Secure Computation Lecture Arpita Patra. Recap >> Improving the complexity of GMW > Step I: Offline: O(n 2 c AND ) OTs; Online: i.t., no crypto.
China Summer School on Lattices and Cryptography Craig Gentry and Shai Halevi June 4, 2014 Homomorphic Encryption over Polynomial Rings.
Secure Computation Lecture Arpita Patra. Recap > Shamir Secret-sharing > BGW Protocol based on secret-sharing > Offline/Online phase > Creating.
Based on work with: Sergey Gorbunov and Vinod Vaikuntanathan Homomorphic Commitments & Signatures Daniel Wichs Northeastern University.
Secure Computation (Lecture 9-10) Arpita Patra. Recap >> MPC with honest majority in i.t. settings > Protocol using (n,t)-sharing, proof of security---
China Summer School on Lattices and Cryptography Craig Gentry and Shai Halevi June 3, 2014 Fully Homomorphic Encryption and Bootstrapping.
Secure Computation Lecture Arpita Patra. Recap >Three orthogonal problems- (n,t)-sharing, reconstruction, multiplication protocol > Verifiable Secret.
Round-Efficient Multi-Party Computation in Point-to-Point Networks Jonathan Katz Chiu-Yuen Koo University of Maryland.
The Many Faces of Garbled Circuits MIT Vinod Vaikuntanathan.
Cryptographic methods. Outline  Preliminary Assumptions Public-key encryption  Oblivious Transfer (OT)  Random share based methods  Homomorphic Encryption.
Multi-Party Computation r n parties: P 1,…,P n  P i has input s i  Parties want to compute f(s 1,…,s n ) together  P i doesn’t want any information.
Efficient Leakage Resilient Circuit Compilers
The Exact Round Complexity of Secure Computation
The Exact Round Complexity of Secure Computation
Lower Bounds on Assumptions behind Indistinguishability Obfuscation
Carmit Hazay (Bar-Ilan University, Israel)
Adaptively Secure Multi-Party Computation from LWE (via Equivocal FHE)
Stochastic Streams: Sample Complexity vs. Space Complexity
Randomness and Computation
New Characterizations in Turnstile Streams with Applications
On the Size of Pairing-based Non-interactive Arguments
Computational Fuzzy Extractors
TCC 2016-B Composable Security in the Tamper-Proof Hardware Model under Minimal Complexity Carmit Hazay Bar-Ilan University, Israel Antigoni Ourania.
MPC and Verifiable Computation on Committed Data
Committed MPC Multiparty Computation from Homomorphic Commitments
Laconic Oblivious Transfer and its Applications
Modern symmetric-key Encryption
Secret Sharing (or, more accurately, “Secret Splitting”)
The Learning With Errors Problem
Course Business I am traveling April 25-May 3rd
Background: Lattices and the Learning-with-Errors problem
Verifiable Oblivious Storage
Maliciously Secure Two-Party Computation
Equivalence of Search and Decisional (Ring-) LWE
Turnstile Streaming Algorithms Might as Well Be Linear Sketches
Cryptography Lecture 6.
Cryptography for Quantum Computers
When are Fuzzy Extractors Possible?
cryptographic protocols 2014, lecture 12 Getting full zero knowledge
Vadim Lyubashevsky IBM Research -- Zurich
Rishab Goyal Venkata Koppula Brent Waters
Expected Constant-Round Protocols for Broadcast
Multi-Party Computation: Second year
Cynthia Dwork Moni Naor Guy Rothblum
When are Fuzzy Extractors Possible?
On the Efficiency of 2 Generic Cryptographic Constructions
Cryptography Lecture 8.
Cryptography Lecture 6.
Emanuele Viola Harvard University June 2005
Limits of Practical Sublinear Secure Computation
Two-Round Adaptively Secure Protocols from Standard Assumptions
Helen: Maliciously Secure Coopetitive Learning for Linear Models
Impossibility of SNARGs
Presentation transcript:

Four-Round Secure Computation without Setup TCC 2017 Four-Round Secure Computation without Setup Zvika Brakerski (Weizmann Institute of Science) Shai Halevi (IBM) Antigoni Polychroniadou (Cornell Tech)

Secure Multi-Party Computation (MPC) f(x1, x2, x3, x4) = (y1, y2 ,y3 ,y4 ) x1 x1 x1 y4 y1 x4 Goal: Correctness: Everyone computes f(x1,…,x4) Security: Nothing else but the output is revealed Adversary PPT Malicious Static x2 y3 y2 x3

Secure MPC protocols with Motivating Question? Can we construct Secure MPC protocols with optimal Round Complexity? f(x1, x2, x3, x4) = (y1, y2 ,y3 ,y4 ) x1 x1 x1 y4 y1 x4 Goal: Correctness: Everyone computes f(x1,…,x4) Security: Nothing else but the output is revealed Adversary PPT Malicious Static x2 y3 y2 x3

State-of-the-Art: Computational Setting O(1)-round protocols* 4-round protocol [KOS03, Pas04,DI05,DI06, IPS08,Wee10, Goy11,LP11, GLOV12] 6-round protocol This work 1st O(1)-round protocol [GMPP] Lower Bound: 4 rounds for simultaneous- message MPC and 2PC [BMR] O(dF)-round protocol 2016 2017 [GMW] Lower Bound: 5 rounds for sequential 2PC [KO04,ORS15] 1990 2003-2012 1987 *20-30 rounds

Target - This slide is linked to slide 2 4-round Protocols 2PC 4-round 2PC from sub-exponential assumptions [GMPP16] 4-round 2PC from polynomial assumptions [COSV17] (next talk) MCF MPC 4-round MPC [This work] Concurrent work of [ACJ17] 4-round MCF from sub-exponential assumptions [GMPP16] 4-round MCF from polynomial assumptions [COSV17] (next talk)

Our Results Theorem 1. (informal) LWE  3-round semi-malicious MPC Our MPC results are based on FHE techniques Instantiations: [PPV08]: adaptive PRGs [LPS17]: sub-exp. time-lock puzzles ([GMPP16] can also be based on [LPS17]) Theorem 2. (informal) Adaptive Commitments + sub-exp. LWE  4-round malicious MPC

Homomorphic Encryption 𝑠𝑘,𝑝𝑘 𝑐←𝐸𝑛 𝑐 𝑝𝑘 𝑥 𝑐 ∗ 𝑐 ∗ ←𝐸𝑣𝑎 𝑙 𝑝𝑘 (𝑓, 𝑐) 𝐷𝑒 𝑐 𝑠𝑘 𝑐 ∗ =𝑓(𝑥)

Multi-Key Homomorphic Encryption 𝑠 𝑘 1 ,𝑝 𝑘 1 𝑠 𝑘 2 ,𝑝 𝑘 2 𝑐 1 ←𝐸𝑛 𝑐 𝑝 𝑘 1 𝑥 1 𝑐 2 ←𝐸𝑛 𝑐 𝑝 𝑘 2 𝑥 2 𝑐 ∗ 𝑐 ∗ … 𝑐 ∗ ←𝑀𝑢𝑙𝑡𝑖𝐸𝑣𝑎 𝑙 𝑝 𝑘 𝑖 𝑖 (𝑓, 𝑐 𝑖 𝑖 ) 𝑐 𝑁 ←𝐸𝑛 𝑐 𝑝 𝑘 𝑁 𝑥 𝑁 𝑠 𝑘 𝑁 ,𝑝 𝑘 𝑁 M𝑢𝑙𝑡𝑖𝐷𝑒 𝑐 𝑠 𝑘 𝑖 𝑖 𝑐 ∗ =𝑓( 𝑥 1 ,…, 𝑥 𝑛 ) 𝑐 ∗ Computing on data encrypted under multiple keys Key generation: 𝑠 𝑘 𝑖 ,𝑝 𝑘 𝑖 ←𝐾𝑒𝑦𝐺𝑒𝑛 $ , 𝑖=1,2, …,𝑁 𝐄𝐧𝐜𝐫𝐲𝐩𝐭𝐢𝐨𝐧: 𝑐 𝑖 ←𝐸𝑛 𝑐 𝑝 𝑘 𝑖 𝑥 𝑖 Evaluation: 𝑐 ∗ ←𝑀𝑢𝑙𝑡𝑖𝐸𝑣𝑎 𝑙 𝑝 𝑘 𝑖 𝑖 (𝑓, 𝑐 𝑖 𝑖 ) Decryption: M𝑢𝑙𝑡𝑖𝐷𝑒 𝑐 𝑠 𝑘 𝑖 𝑖 𝑐 ∗ =𝑓( 𝑥 1 ,…, 𝑥 𝑛 ) [Lopez-AltTromerVaikuntanathan12] from NTRU (also from (R)LWE for few players) [ClearMcGoldrick14, MukherjeeWichs15] LWE-based for poly # of players

Previous Approach With Setup Without Setup [GentrySahaiWaters13] FHE [MW16]: [GMPP16]: [GentrySahaiWaters13] FHE 2-round MPC in the CRS model [MW16] Multi-Key FHE 4-round Multi-party coin flipping [GMPP16] 2-round MPC in the CRS model 6-round MPC

3-round Semi-malicious MPC Our Approach 04 STEP 4-round malicious MPC Compile Semi-malicious to malicious Prove correctness of decryption: using 4-round ZK proofs Prove correctness of encryption: 3-round ZK proofs impossible [GoldreichKrawczyk96] Use 3-round WI proofs + adaptive commitments to build 3-round non-malleable ‘ZK-like’ proofs 3-round Semi-malicious MPC: 02 STEP 03 STEP Use Leakage resilience of dual-Regev 3-round Semi-malicious MPC Distributed key gen. (malicious) Encryption (semi-malicious) 01 STEP Decryption (semi-malicious) Using Regev FHE dual-Regev FHE Multi-Key FHE [CM15,MW16]

Our Approach for semi-malicious MPC 2-round semi-malicious MPC in the CRS model [MW16] Replace CRS with a 1-round malicious distributed key generation step 3-round semi-malicious MPC

Learning with Errors (LWE) [R’05] Parameters: q (modulus), n (dimension), m>n (# of samples) Secret: uniformly random vector 𝒔∈ 𝑍 𝑞 𝑛 Input: random matrix 𝑩∈ 𝑍 𝑞 𝑛×𝑚 , vector 𝒃∈ 𝑍 𝑞 𝑚 Computed as 𝒆 chosen from some distribution s.t. |𝒆|≪𝑞 whp 𝒃 is close to the row space of 𝑩 Decision LWE: B,𝑏 is pseudo-random B + (𝑚𝑜𝑑 𝑞) = b s e

Multi-Key FHE [CM’15,MW’16] Special case for N=2 B b1 = -s1B-e1 A1 = t1 = (s1, 1) : t1 A1 ≈ 0 B acts as CRS B b2 = -s2B-e2 A2 = t2 = (s2, 1) : t2 A2 ≈ 0 En c 𝐀 𝟏 𝑥 : C = A1R + xG R is a random 0-1 matrix, G is a “gadget matrix” Decryption invariant: t1 C ≈ x t1G Want to expand C into C* relative to t*=(t1 |t2) With the same invariant: t*C ≈ x t* G*

Multi-Key FHE [CM’15,MW’16] Special case for N=2 B b1 = -s1B-e1 A1 = t1 = (s1, 1) : t1 A1 ≈ 0 B acts as CRS B b2 = -s2B-e2 A2 = t2 = (s2, 1) : t2 A2 ≈ 0 En c 𝐀 𝟏 𝑥 : C = A1R + xG Note: t2C = (s2B + b1)R + xt2G ≈ (b1 - b2)R + xt2G Expanded ciphertext: C* = 𝑪 𝑫 𝟎 𝑪 ( D TBD ) Want: t*C* = [t1C, t1D+t2C] ≈ [xt1G, xt2G]= xt* G* Encrypt R to help find D such that t1D ≈ (b2 - b1)R

CRS-Free Variant, 1st Try Special case for N=2 B1 Each party chooses own Bi B2 A1 = A2 = b1,1 = -s1B1-e1 b2,2 = -s2B2-e2 (B2, b2,2) (B1, b1,1) b2,1= -s2B1-e’2 b1,2= -s1B2-e’1 b1 = b1,1|b1,2 B1 B2 =B b2 = b2,1|b2,2

CRS-Free Variant, 1st Try b1 = b1,1|b1,2 B1 B2 =B b2 = b2,1|b2,2 Is it correct? YES We again have a common B, individual bi’s Can proceed as before Is it secure? NO! For a malicious matrix 𝐵 1 , the vector 𝑏 2,1 =−𝑠 2 𝐵 1 − 𝑒 2 ′ (𝑚𝑜𝑑 𝑞) may leak 𝑠 2

CRS-Free Variant, 2nd Try Switch to “dual GSW” Important change: use instead of Another change: add noise during encryption (rather than key-generation) Why does it matter? has low-dimension (=few bits) leaks very little about 𝑠 2 “dual GSW” is resilient to a little leakage on the sk Bi Bi B1 𝒃 𝟐,𝟏 = s2

CRS-Free Variant, 2nd Try B2 Special case for N=2 B1 Each party chooses own Bi A1 = A2 = -s2B2 b1,1 = -s1B1 b2,2 = (B2, b2,2) (B1, b1,1) b2,1= -s2B1 b1,2= -s1B2 b1,1|b1,2 B1 B2 =B b1 = b2 = b2,1|b2,2

CRS-Free Variant, 2nd Try B Public key of 𝑃 𝑖 is Ai= 𝐸𝑛 𝑐 𝐴 𝑖 𝑥 = Same invariant as in GSW: 𝒔𝑪≈𝒙⋅𝒔𝑮 The rest of the construction works as in [MW16] bi C Ai R E G = × + + 𝑥

Security Enough to show that 𝐸𝑛 𝑐 𝐴 𝑖 0 pseudorandom Break ctxt into 𝑪 𝟏 =𝑩𝑹+𝑬, 𝒄 𝟐 = 𝒃 𝒊 𝑹+𝒆′ We use |𝐸|≪| 𝑒 ′ |≪𝑞 C C1 c2

Security Enough to show that 𝐸𝑛 𝑐 𝐴 𝑖 0 pseudorandom Break ctxt into 𝑪 𝟏 =𝑩𝑹+𝑬, 𝒄 𝟐 = 𝒃 𝒊 𝑹+𝒆′ We use |𝐸|≪| 𝑒 ′ |≪𝑞 𝑃𝐾, 𝐶 1 , 𝑐 2 = 𝐴 𝑖 , 𝐵𝑅+𝐸 , 𝑏 𝑖 𝑅+ 𝑒 ′ C C1 c2

Security Enough to show that 𝐸𝑛 𝑐 𝐴 𝑖 0 pseudorandom Break ctxt into 𝑪 𝟏 =𝑩𝑹+𝑬, 𝒄 𝟐 = 𝒃 𝒊 𝑹+𝒆′ We use |𝐸|≪| 𝑒 ′ |≪𝑞 𝑃𝐾, 𝐶 1 , 𝑐 2 = 𝐴 𝑖 , 𝐵𝑅+𝐸 , 𝑏 𝑖 𝑅+ 𝑒 ′ = 𝐴 𝑖 , 𝐵𝑅+𝐸 , − 𝒔 𝒊 𝑩𝑅+ 𝑒 ′ C C1 c2

Security Enough to show that 𝐸𝑛 𝑐 𝐴 𝑖 0 pseudorandom Break ctxt into 𝑪 𝟏 =𝑩𝑹+𝑬, 𝒄 𝟐 = 𝒃 𝒊 𝑹+𝒆′ We use |𝐸|≪| 𝑒 ′ |≪𝑞 𝑃𝐾, 𝐶 1 , 𝑐 2 = 𝐴 𝑖 , 𝐵𝑅+𝐸 , 𝑏 𝑖 𝑅+ 𝑒 ′ = 𝐴 𝑖 , 𝐵𝑅+𝐸 , − 𝑠 𝑖 𝐵𝑅+ 𝑒 ′ ≈ 𝐴 𝑖 , 𝐵𝑅+𝐸 , − 𝒔 𝒊 𝑩𝑹+𝑬 + 𝑒 ′ C C1 c2 𝑒 ′ ≈ 𝑒 ′ − 𝑠 𝑖 𝐸

Security Enough to show that 𝐸𝑛 𝑐 𝐴 𝑖 0 pseudorandom Break ctxt into 𝑪 𝟏 =𝑩𝑹+𝑬, 𝒄 𝟐 = 𝒃 𝒊 𝑹+𝒆′ We use |𝐸|≪| 𝑒 ′ |≪𝑞 𝑃𝐾, 𝐶 1 , 𝑐 2 = 𝐴 𝑖 , 𝐵𝑅+𝐸 , 𝑏 𝑖 𝑅+ 𝑒 ′ = 𝐴 𝑖 , 𝐵𝑅+𝐸 , − 𝑠 𝑖 𝐵𝑅+ 𝑒 ′ ≈ 𝐴 𝑖 , 𝐵𝑅+𝐸 , − 𝑠 𝑖 𝐵𝑅+𝐸 + 𝑒 ′ ≃ 𝐴 𝑖 , 𝑼 𝟐 , − 𝑠 𝑖 𝑼 𝟐 + 𝑒 ′ C C1 c2 𝑒 ′ ≈ 𝑒 ′ − 𝑠 𝑖 𝐸 LWE

Security Enough to show that 𝐸𝑛 𝑐 𝐴 𝑖 0 pseudorandom Break ctxt into 𝑪 𝟏 =𝑩𝑹+𝑬, 𝒄 𝟐 = 𝒃 𝒊 𝑹+𝒆′ We use |𝐸|≪| 𝑒 ′ |≪𝑞 𝑃𝐾, 𝐶 1 , 𝑐 2 = 𝐴 𝑖 , 𝐵𝑅+𝐸 , 𝑏 𝑖 𝑅+ 𝑒 ′ = 𝐴 𝑖 , 𝐵𝑅+𝐸 , − 𝑠 𝑖 𝐵𝑅+ 𝑒 ′ ≈ 𝐴 𝑖 , 𝐵𝑅+𝐸 , − 𝑠 𝑖 𝐵𝑅+𝐸 + 𝑒 ′ ≃ 𝐴 𝑖 , 𝑈 2 , − 𝑠 𝑖 𝑈 2 + 𝑒 ′ ≈( 𝐴 𝑖 , 𝑈 2 , 𝑈 3 ) C C1 c2 𝑒 ′ ≈ 𝑒 ′ − 𝑠 𝑖 𝐸 LWE LHL

3-round Semi-malicious MPC 1st round (distributed key generation step) Each party i chooses Bi,, 𝑖=1,2, …,𝑁 2nd round (encryption and key generation) Each party i runs 𝑠 𝑘 𝑖 ,𝑝 𝑘 𝑖 ←𝐾𝑒𝑦𝐺𝑒𝑛 ( Bi 𝑖) and broadcasts 𝑐 𝑖 ←𝐸𝑛 𝑐 𝑝 𝑘 𝑖 𝑥 𝑖 3rd round (Decryption) All parties run multi-key FHE evaluation to generate ctxt 𝑐 ∗ ←𝑀𝑢𝑙𝑡𝑖𝐸𝑣𝑎 𝑙 𝑝 𝑘 𝑖 𝑖 𝑓, 𝑐 𝑖 𝑖 Output phase Parties run distributed decryption to recover the output M𝑢𝑙𝑡𝑖𝐷𝑒 𝑐 𝑠 𝑘 𝑖 𝑖 𝑐 ∗ =𝑓( 𝑥 1 ,…, 𝑥 𝑛 )

Getting Malicious Security Proof of correct decryption in four rounds Using more or less standard techniques Proof of correct encryption in three rounds, using heavy tools: Adaptive commitments Sprinkle complexity leveraging as needed This Photo by Unknown Author is licensed under CC BY-NC-ND

Our Results Theorem 1. (Informal) LWE  3-round semi-malicious MPC Instantiations: [LPS17]: sub-exp. time-lock puzzles Theorem 2. (Informal) Adaptive Commitments + sub-exp. LWE  4-round malicious MPC MPC MCF 2PC First 4-round MPC protocol from sub-exponential assumptions

Thank you!