Cryptography and Game Theory: Designing Protocols for Exchanging Information Gillat Kol and Moni Naor.

Slides:



Advertisements
Similar presentations
Fair Computation with Rational Players Adam Groce and Jonathan Katz University of Maryland.
Advertisements

Adaptively Attribute-Hiding ( Hierarchical ) Inner Product Encryption
Visual Cryptography Moni Naor Adi Shamir Presented By:
Games for Exchanging Information
Gate Evaluation Secret Sharing and Secure Two-Party Computation Vladimir Kolesnikov University of Toronto
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Efficient Two-party and Multiparty Computation against Covert Adversaries Vipul Goyal Payman Mohassel Adam Smith Penn Sate UCLAUC Davis.
 1. Introduction to game theory and its solutions.  2. Relate Cryptography with game theory problem by introducing an example.  3. Open questions and.
Rational Oblivious Transfer KARTIK NAYAK, XIONG FAN.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Digital Signatures and Hash Functions. Digital Signatures.
22C:19 Discrete Structures Integers and Modular Arithmetic
4 Why Should we Believe Politicians? Lupia and McCubbins – The Democratic Dilemma GV917.
Eran Omri, Bar-Ilan University Joint work with Amos Beimel and Ilan Orlov, BGU Ilan Orlov…!??!!
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Traitor Tracing Papers Benny Chor, Amos Fiat and Moni Naor, Tracing Traitors (1994) Moni Naor and Benny Pinkas, Threshold Traitor Tracing (1998) Presented.
7. Asymmetric encryption-
Yan Huang, Jonathan Katz, David Evans University of Maryland, University of Virginia Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose.
Session 4 Asymmetric ciphers.
Introduction to Cryptography and Security Mechanisms: Unit 5 Theoretical v Practical Security Dr Keith Martin McCrea
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Stream cipher diagram + + Recall: One-time pad in Chap. 2.
CNS2010handout 10 :: digital signatures1 computer and network security matt barrie.
Certificateless encryption and its infrastructures Dr. Alexander W. Dent Information Security Group Royal Holloway, University of London.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.

Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
1 Constructing Pseudo-Random Permutations with a Prescribed Structure Moni Naor Weizmann Institute Omer Reingold AT&T Research.
DANSS Colloquium By Prof. Danny Dolev Presented by Rica Gonen
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Public Key Algorithms 4/17/2017 M. Chatterjee.
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
Introduction to Computer and Network Security Iliano Cervesato 26 August 2008 – Modern Cryptography.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Public Key Model 8. Cryptography part 2.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
8. Data Integrity Techniques
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Cryptography Lecture 8 Stefan Dziembowski
1 AN EFFICIENT METHOD FOR FACTORING RABIN SCHEME SATTAR J ABOUD 1, 2 MAMOUN S. AL RABABAA and MOHAMMAD A AL-FAYOUMI 1 1 Middle East University for Graduate.
Public-Key Encryption with Lazy Parties Kenji Yasunaga Institute of Systems, Information Technologies and Nanotechnologies (ISIT), Japan Presented at SCN.
Problems with symmetric (private-key) encryption 1) secure distribution of keys 2) large number of keys Solution to both problems: Public-key (asymmetric)
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
CS555Spring 2012/Topic 111 Cryptography CS 555 Topic 11: Encryption Modes and CCA Security.
Section 4.4: The RSA Cryptosystem Practice HW Handwritten and Maple Exercises p at end of class notes.
Public-Key Encryption
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Chapter 7 – Confidentiality Using Symmetric Encryption.
Rational Cryptography Some Recent Results Jonathan Katz University of Maryland.
Flipping coins over the telephone and other games.
Overview of Cryptography & Its Applications
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
On Forward-Secure Storage Stefan Dziembowski Warsaw University and University of Rome La Sapienza.
Utility Dependence in Correct and Fair Rational Secret Sharing Gilad Asharov Yehuda Lindell Bar-Ilan University, Israel.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Secure Computation with Minimal Interaction, Revisited Yuval Ishai (Technion) Ranjit Kumaresan (MIT) Eyal Kushilevitz (Technion) Anat Paskin-Cherniavsky.
INCS 741: Cryptography Overview and Basic Concepts.
Intro to Cryptography ICS 6D Sandy Irani. Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information,
Cryptographic methods. Outline  Preliminary Assumptions Public-key encryption  Oblivious Transfer (OT)  Random share based methods  Homomorphic Encryption.
Key Exchange in Systems VPN usually has two phases –Handshake protocol: key exchange between parties sets symmetric keys –Traffic protocol: communication.
Presentation transcript:

Cryptography and Game Theory: Designing Protocols for Exchanging Information Gillat Kol and Moni Naor

Our Goal Our Goal: Designing protocols encouraging rational players to exchange information Examples we deal with:  Rational secure function evaluation.  Rational secret sharing. this talk

Talk Plan Tool: Meaningful / Meaningless Encryption Application: Rational Secret Sharing

A public-key encryption scheme E. Special property: Some public keys are Meaningless - Yield encryptions that cannot be decrypted, even with unbounded computational power!  Cipher contains no information about the plaintext:  m,m', the distribution {E(pub_key,r,m)} r is identical to {E(pub_key,r,m’ )} r. Distinguishing Meaningful from Meaningless is hard. Given two public keys, one meaningful and one meaningless, guessing which is which cannot be done by a PPT with a non-negligible advantage over 1/2. Meaningful / Meaningless Encryption E plaintext ciphertext pub_key rand meaningless

A Construction based on Goldwasser and Micali’s Public Key Cryptosystem Private Key: Two large primes P and Q Public Key: (N,x) where N=PQ and x is:  Quadratic non-residue of N (x ≠ z 2 mod N) w.p. β.  Quadratic residue of N w.p. 1-β. Encryption: Encrypt each bit b i of the message:  Choose y i and calculate c i = y i 2 x b i mod N.  The ciphertext is (c 1,...,c n ). Decryption: Using the private key (P,Q): b i =0 iff c i is a quadratic residue. If x is a residue, then c i = y i 2 x b i is always a residue! meaningful key meaningless key Recall, in GM x is always a non-residue

Talk Plan Tool: Meaningful / Meaningless Encryption Application: Rational Secret Sharing

Secret Sharing k-out-of-n secret sharing: a dealer privately distributes shares of a secret s to a group of n players s.t.:  Given ≥ k shares, s can be reconstructed.  Given < k shares, no info about s can be inferred. Secret sharing assumes that players are either malicious or honest. However, in some situations it makes more sense to view players as rational.  P i tries to maximize a utility (payoff) function u i describing his gain for any outcome of the protocol. E.g. P i gets $100 if he learns the secret. u i (P i learns secret) = 100

Rational Secret Sharing [HT04] Good RSS scheme: Dealing: k-out-of-n share assignment Reconstruction: Game Theoretically stable Our Model:  Players prefer to learn the secret: u i (P i learns secret) > u i (P i doesn’t learn secret)  Communicating via a simultaneous broadcast channel. + no rushing! new requirement = no player can gain from deviating

The Crux of Rational Secret Sharing Cryptographic schemes require players to reveal their shares in order to reconstruct the secret. Problem: A rational player has no incentive to cooperate, since no one can punish him later.  Keeping silent is at least as good as revealing. Solution:  Constructing protocols that proceed in a sequence of iterations.  Ensuring that players won’t be able to identify the last iteration.  A player caught cheating is punished in the next iteration. If players are able to identify it, they deviate in the last round. Consequentially, they deviate in all the previous rounds as well. This process is called Backward Induction.

Previous Works Solutions were suggested in [ HT04 ], [ GK06 ], [ LT06 ] and [ ADGH06 ].  Deal with more involved models.  We’ll see a simplified version of their protocols. Show that protocols using computational based cryptography have a weak point. Suggest a new scheme, using a Meaningful / Meaningless encryption, overcoming the problem. Our Contribution

A Rational Secret Sharing Scheme Dealing: Assign P i with a k-out-of-n share of s + authen info. Reconstruction: In every iteration, players run SFE taking the shares and authen info as inputs:  Check the shares’ authenticity. Abort in case of deviations.  w.p. β ( TBD ) reconstruct and return s.  w.p. 1-β return . Continue to the next iteration. For a small enough β, the protocol is stable.  Deviations will most likely lead to an early abortion. Punishment! real iteration fake iteration

Problem: The SFE of the first iteration can be broken after an exponential number of rounds b.  Round b is essentially the last. As before, players deviate if it is reached.  Round b-1 is now essentially the last. Players deviate for the same reason.  Eventually, the instability in iteration b causes instability from iteration 1. Backward Induction causes exponential events to be amplified. backward induction Backward Induction …

Our Idea As before, an execution of the protocol consists of a sequence of fake iterations followed by a real one, in which the secret is revealed. However, we ’ ll implement the fake rounds using meaningless keys. Thus, no information about the shares exists in fake rounds. Now, there is no bound on the protocol length, and therefore no Backward Induction! Dealing: As before, except that the authentications are information theoretic.

Our Reconstruction Protocol In each iteration: Key Gen: New keys for E  are generated via (unfair) SFE. Gives each player pub_key + a share of priv_key. Encryption: Each player encrypts his share. Ciphertexts are broadcasted. Verification: The encryptions are validated via SFE. Receives as input the shares of priv_key. However, the shares of s are not used. Exchange: Each player broadcasts his share of priv_key. During the first meaningful iteration the ciphertexts are decrypted using priv_key and s is reconstructed. same  as before Meaningless key  fake iteration Meaningful key  real iteration prob of generating a meaningful key why would players encrypt their true shares?

Additional Results The scheme is naturally resistant to coalitions.  The SFEs used are such. Can be generalize to handle rational SFE.  Technique: Composing Meaningful \ Meaningless Encryptions with Yao’s Garbled Circuit. Getting rid of the assumption that the channel is simultaneous at the cost of longer protocols (linear in the range size). STOC08 paper: Characterization of the non- cryptographic case.

Thank You!