Foundations of Cryptography Lecture 7 Lecturer:Danny Harnik.

Slides:



Advertisements
Similar presentations
Foundations of Cryptography Lecture 3 Lecturer: Moni Naor.
Advertisements

Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles Padro,
Short seed extractors against quantum storage Amnon Ta-Shma Tel-Aviv University 1.
How to get more mileage from randomness extractors Ronen Shaltiel University of Haifa.
Deterministic extractors for bit- fixing sources by obtaining an independent seed Ariel Gabizon Ran Raz Ronen Shaltiel Seedless.
Computational Privacy. Overview Goal: Allow n-private computation of arbitrary funcs. –Impossible in information-theoretic setting Computational setting:
Foundations of Cryptography Lecture 2: One-way functions are essential for identification. Amplification: from weak to strong one-way function Lecturer:
Simple extractors for all min- entropies and a new pseudo- random generator Ronen Shaltiel Chris Umans.
Pairwise Key Agreement in Broadcasting Networks Ik Rae Jeong.
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Foundations of Cryptography Lecture 11 Lecturer: Moni Naor.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
CS555Topic 191 Cryptography CS 555 Topic 19: Formalization of Public Key Encrpytion.
CIS 5371 Cryptography 3b. Pseudorandomness.
Tight Bounds for Unconditional Authentication Protocols in the Moni Naor Gil Segev Adam Smith Weizmann Institute of Science Israel Modeland Shared KeyManual.
Foundations of Cryptography Lecture 5 Lecturer: Moni Naor.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Foundations of Cryptography Lecture 4 Lecturer: Moni Naor.
Introduction to Modern Cryptography, Lecture 12 Secure Multi-Party Computation.
Eran Omri, Bar-Ilan University Joint work with Amos Beimel and Ilan Orlov, BGU Ilan Orlov…!??!!
NON-MALLEABLE EXTRACTORS AND SYMMETRIC KEY CRYPTOGRAPHY FROM WEAK SECRETS Yevgeniy Dodis and Daniel Wichs (NYU) STOC 2009.
Quantum information as high-dimensional geometry Patrick Hayden McGill University Perspectives in High Dimensions, Cleveland, August 2010.
Information Security for Sensors Overwhelming Random Sequences and Permutations Shlomi Dolev, Niv Gilboa, Marina Kopeetsky, Giuseppe Persiano, and Paul.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Lecturer: Moni Naor Foundations of Cryptography Lecture 4: One-time Signatures, UOWHFs.
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
Position Based Cryptography* Nishanth Chandran Vipul Goyal Ryan Moriarty Rafail Ostrovsky UCLA CRYPTO ‘09.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Leakage-Resilient Storage Francesco Davì Stefan Dziembowski Daniele Venturi SCN /09/2010 Sapienza University of Rome.
Computer Security CS 426 Lecture 3
Foundations of Cryptography Lecture 9 Lecturer: Moni Naor.
Foundations of Cryptography Lecture 2 Lecturer: Moni Naor.
Adaptively Secure Broadcast, Revisited
Public-Key Encryption with Lazy Parties Kenji Yasunaga Institute of Systems, Information Technologies and Nanotechnologies (ISIT), Japan Presented at SCN.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Rei Safavi-Naini University of Calgary Joint work with: Hadi Ahmadi iCORE Information Security.
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark ECRYPT Autumn School, Bertinoro Wednesday, October.
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark 9 th workshop on QIP 2006, Paris Tuesday, January.
1 Cryptography NOTES. 2 Secret Key Cryptography Single key used to encrypt and decrypt. Key must be known by both parties. Assuming we live in a hostile.
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
On the Communication Complexity of SFE with Long Output Daniel Wichs (Northeastern) joint work with Pavel Hubáček.
Introduction to Quantum Key Distribution
Lecture 2: Introduction to Cryptography
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
Cryptography In the Bounded Quantum-Storage Model
Randomness Extraction Beyond the Classical World Kai-Min Chung Academia Sinica, Taiwan 1 Based on joint works with Xin Li, Yaoyun Shi, and Xiaodi Wu.
Software Security Seminar - 1 Chapter 4. Intermediate Protocols 발표자 : 이장원 Applied Cryptography.
1 Leonid Reyzin Boston University Adam Smith Weizmann  IPAM  Penn State Robust Fuzzy Extractors & Authenticated Key Agreement from Close Secrets Yevgeniy.
Position Based Cryptography Nishanth Chandran Vipul Goyal Ryan Moriarty Rafail Ostrovsky UCLA.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Software Security Seminar - 1 Chapter 2. Protocol Building Blocks 발표자 : 최두호 Applied Cryptography.
Homework #1 J. H. Wang Oct. 9, 2012.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Multi-Party Computation r n parties: P 1,…,P n  P i has input s i  Parties want to compute f(s 1,…,s n ) together  P i doesn’t want any information.
Lower bounds for Unconditionally Secure MPC Ivan Damgård Jesper Buus Nielsen Antigoni Polychroniadou Aarhus University.
Intrusion Resilience via the Bounded-Storage Model Stefan Dziembowski Warsaw University and CNR Pisa.
Sampling of min-entropy relative to quantum knowledge Robert König in collaboration with Renato Renner TexPoint fonts used in EMF. Read the TexPoint.
Cryptography Lecture 4.
Cryptography Lecture 6.
When are Fuzzy Extractors Possible?
Cryptography Lecture 24.
When are Fuzzy Extractors Possible?
Position Based Cryptography*
Information-Theoretic Security
Cryptography Lecture 5.
Kai Bu 03 Cryptanalysis Kai Bu
Cryptography Lecture 3.
Presentation transcript:

Foundations of Cryptography Lecture 7 Lecturer:Danny Harnik

Maurer ’ s Bounded Storage Model Most Cryptographic tasks are only possible when parties are known to be bounded. “ Mainstream Cryptography ” : Assume parties are time bounded (run in polynomial time). Maurer ’ s model: Assume parties have bounded storage. Remark: Bounded Storage ≠ Bounded Space. Measures only the storage capacity at one point of the process.

The bounded storage model: The setting A long random string R is transmitted. Honest parties store small portions of R. Parties interact. Protocol is secure even against dishonest parties which store almost all of R. A long random string R of length N Alice Bob Malicious party Stores ¾N bits Stores N ½ (Arbitrary function of R)

Example: Key-Agreement Alice and Bob interact over a public channel (with no initial secret key). They want to agree on a secret key. Alice Bob Eavesdropper public channel key ??

A long random string R of length N Protocol: Key-Agreement [CM97] A long random string R is transmitted. Alice and Bob store random subsets of size ~N ½. Send position of subsets and agree on content of intersection. Next, we show that an eavesdropper which stores ¾N bits has a lot of entropy on the key. Alice Bob Eavesdropper Stores N ½ key Does not know the key!

¾N bits key The view of the adversary Simplifying assumption: The adversary stores a subset bits of R of size ¾N. The sets chosen by the players are random. The set which defines the key is a random set. The adversary does not remember ~ ¼N bits. Eavesdropper random set From my point of view the key is a high- entropy source! * This holds even when the adversary stores an arbitrary function of R [NZ93]. ¾ known ¼ unknown

Randomness Extractors [NZ93] Extract randomness from arbitrary distributions which contain sufficient (min)-entropy. Use a short seed of truly random bits. Output is (close to) uniform even when the adversary knows the seed. Relation to BSM pointed out by [Lu02,Vad03] high entropy distribution Extractor seed random output

A long random string R of length N Key-Agreement using extractors A long random string R is transmitted. Alice and Bob store random subsets of size ~N ½. Send position of subsets and agree on content of intersection. Alice randomly chooses a seed and sends it to Bob. Both apply an extractor To receive the key. Alice Bob Stores N ½ Extractor seed random key

Further Improvements Instead of random subsets, Alice & Bob remember pairwise independent locations Eavesdropper still has high min-entropy [NZ]. Saves communication when finding the intersection of both sides. Can further use better “ Samplers ” to choose these locations. Only need to send seed to the sampler in order to agree on intersection.

The Secret Key Setting Seed to sampler is used as the secret key. Alice & Bob only store the bits at the locations the sampler chooses. Can use small set for Alice and Bob. For the Eavesdropper this set is a high min-entropy source. By applying extractor, receive a long key that is close to uniform from Eavesdropper ’ s point of view. Best result so far for message of length m [Vad03]: Alice & Bob store only O(m + log 1/ ε ) Secret Key length: O(log N + log 1/ ε )

The bounded storage model Practical? Depends on ratio between price of memory and speed of broadcast. Most of the research so far focused on: Key agreement [Mau93,CM97]. Secret-key encryption [Mau93,CM97,AR99,ADR02,DR02,DM02,Lu02,Vad03]. Advantages: Clean model. Security does not require unproven assumptions. Everlasting security: The security is guaranteed even if at a later stage the adversary gains more memory.