Top Banner
1 A New A New Interactive Interactive Hashing Hashing Theorem Theorem Iftach Haitner Iftach Haitner and Omer Reingold and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE
32

1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.

Dec 22, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.

1

A NewA New Interactive Interactive HashingHashing TheoremTheorem

Iftach HaitnerIftach Haitner and Omer Reingoldand Omer Reingold

WEIZMANNINSTITUTEOF SCIENCE

Page 2: 1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.

2

Talk PlanTalk Plan• What is Interactive Hashing

• Applications of Interactive Hashing

• The new theorem

• Applications of the new theorem

• About the proof

Page 3: 1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.

3

SS

Interactive Hashing[NOVY91]Interactive Hashing[NOVY91]

f h

xÃ{0,1}n, y=f(x)

RRhÃH

Hiding – The only information that R R obtains about y is h(y).

Binding- Eff. S S cannot find x1, x2 such thatf(x1)f(x2) and h(f(x1)) = h(f(x2)) = z.

Easy

|Easy|=2¾n

h

z = h(y)

One-way permutation:• eff. computable• hard to invert: hard to find

f-1(f(x)) for xÃ{0,1}n.h z=h(y)

Two-to-one hash function

Page 4: 1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.

4

Statistically-Hiding Statistically-Hiding CommitmentCommitment

S S RRCommit-stage

yy2 {0,1}n

Page 5: 1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.

5

Statistically-Hiding Statistically-Hiding Commitment cont.Commitment cont.

Reveal-stageSS RR

yy

Page 6: 1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.

6

Statistically-Hiding Statistically-Hiding Commitment cont.Commitment cont.

Hiding – RR does not obtain non-negligible information about y during the commit-stage.

Binding – Eff. SS cannot decommit into two different values (with non-neg. probability).

In interactive hashing RR only obtains h(y)

Same as in interactive hashing

Page 7: 1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.

7

S S (b(b2 {0,1}))

IH (NOVY) to Bit-CommitmentIH (NOVY) to Bit-Commitment

xÃ{0,1}n, y=f(x)

RRhÃH

z = h(y)

h

Let {y0,y1} = h-1(z) sorted lexicographically and let be the index of y (i.e., y= y)

c = b©

Commit stage:

Reveal stage:(x,b) h(f(x)) = z

and c = b©

Page 8: 1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.

8

SS

String-Commitment to IHString-Commitment to IH

xÃ{0,1}n, y=f(x)

RR

hÃHz = h(y)

h

Com. to y

Page 9: 1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.

9

Applications of Interactive Applications of Interactive HashingHashing

• Perfectly-hiding cmt. from owp [NOVY98]

• Statistically-hiding cmt. from regular/ appx.-preimage-size owf [HHKKMS05]

• Statistical zk argument from any owf [NOV06]

• Statistically-hiding cmt. from any OWF [HR06]

• “Information theoretic” ih, applications[OVY91,CCM98,DHRS04,CS06,NV06,...]

Page 10: 1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.

10

The NOVY IH ProtocolThe NOVY IH Protocol• A “more interactive” version of the

naïve (semi-honest) protocol.

• A particular family of two-to-one hash functions.

• Assuming that f is a OWP, the protocol satisfies both hiding and binding.

h(x) = h1(x),...,hn-1(x), where hi = 0i-1 1 {0,1}n-i

hi(x) = <hi,x>2.

Page 11: 1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.

11

The NOVY Protocol cont.The NOVY Protocol cont.

Observed by [HHKKMS05]:• Binding is guaranteed even when f is hard to

invert over Un:

hard to find an inverse f-1(y) for a uniformly chosen y2{0,1}n.

• Hiding is useful if h expects collisions w.r.t. Im(f) - when f(Un) is dense in {0,1}n

Page 12: 1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.

12

hfIm(f)

About the size of Im(f)

• [HHKKMS05,NOV06] use this observation when f(Un) is sparse

h’

Two-to-one “interactive”hash function

Non-interactive hashing

Page 13: 1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.

13

Interactive Hashing for Sparse SetsInteractive Hashing for Sparse Sets

hfIm(f)

About the size of Im(f)

• Can interactive hashing be applied directly to sparse sets?

Page 14: 1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.

14

Our ResultsOur Results• Holds w.r.t. sparse sets:

– Binding is guaranteed if f is hard w.r.t the uniform distribution over Im(f)

– Hiding is useful if h expects collisions w.r.t. Im(f) - when f(Un) is “close” to the uniform dis. over Im(f)

• Allows a more general choice of hash functions

• Improved parameters also w.r.t. the NOVY settings

• Simpler proof

In NOVY- hard to invert over {0,1}n

In NOVY- close to {0,1}n

Page 15: 1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.

15

Applications of The New Applications of The New Theorem to Bit-CommitmentTheorem to Bit-Commitment

• Reproving (as an immediate corollary) the result of [HHKKMS05]: Statistical commitment from any regular/ Appx.-preimage-size owf.

• Might simplify current constructions of statistical zk argument and statistical commitment from any owf.

Page 16: 1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.

16

L

Information-Theoretic IHInformation-Theoretic IH

z = h(y)

hSSy2 L

RRhÃH

Hiding – The only information that R R obtains about y is h(y).

Binding- Unbounded S S cannot find (with non-neg probability) y1y22 L such that h(y1) = h(y2) = z.

h

|L| << 2n/2 ? |L| > 2n/2

|LÅConsist(h1,…,hk)| << √|Consist(h1,…,hk)|

h = (h1,...,hn-1 ) ÃH n-1

z1 = h1(y)

h1

zn-1 = hn-1(y)

hn-1

Two-to-one hash function

Boolean pairwise-independent hash

functions

|L| << 2n

Consist(h1,…,hk)={y: 8i hi(y)=zi}

Consist(h1)={y: h1(y)=z1}

Page 17: 1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.

17

Our protocol (variant of NOVY)Our protocol (variant of NOVY)

RRh = (h1,...,hk ) ÃH

kz1 = h1(y)

h1

zk = hk(y)

hk

hfIm(f)

About the size of Im(f)

SSxÃ{0,1}n,

y=f(x)

Any family of Booleanpairwise-independent

hash functions

kw log(|Im(f)|)

Page 18: 1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.

18

HidingHiding

• If RR is semi-honest (follows the protocol) it obtains h(y) for a uniformly chosen h

• If RR is malicious, it obtains h(y) for an adaptively chosen h

• In many settings (e.g., commitment schemes) we can force RR to follow the protocolSame as in NOVY, but

there it is less harmful

Page 19: 1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.

19

BindingBindingMain Theorem: Let A be an alg. that breaks

the binding of the protocol with probability . Then there exists an eff. alg. MA s.t PryÃIm(f)[MA(y)2 f-1(y)]2 (2/n8)

Comparing to previous results (Im(f)= {0,1}n):• [NOVY98] - (10/poly(n))• [NOV06] - (3/n6)

* Here - proof for the NOVY settings, i.e., Im(f) = {0,1}n and the hashing is to {0,1}n-1

Page 20: 1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.

20

z1

h1

zn-1

hn-1

A

Outputs x1, x2

RRh = (h1,...,hn-1 ) ÃH

n-1

Algorithm Algorithm AA

Pr[f(x1)f(x2) Æ h(f(x1)) = h(f(x2)) = z] ¸

* z = (z1,...,zn-1 )

Page 21: 1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.

21

z1

h1

zn-1

hn-1

A

MA(y)

RRh = (h1,...,hn-1 ) ÃH

kn-

1

Returns x1 or x2

In order to success we need:y=f(x1) or y=f(x2)

! we need 8i hi(y) = zi happens with neg. probability

Choose (h1,...,hn-1 ) s.t. y is consistent

Outputs x1, x2

Page 22: 1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.

22

MA on input y2 {0,1}n:1. (h1,…, hn-ofs) Ã Searcher(y)

2. Return Inverter(h1,…, hn-ofs)

ofs2O(log(1/)+ log(n))

Inverter(h1,…, hn-ofs)1. Choose hn-ofs+1,…,hn-1 uniformly in H

2. (x1, x2) Ã ADec(h1,…, hn-1)

3. Return x1 or x2

Searcher(y):1. For i = 1 to n-ofs Do the following 2log(n) times:

• Choose uniformly at random hi2H

• If A(h1,...,hi) = hi(y), break the inner loop.

2. Return h1,…, hn-ofs

Page 23: 1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.

23

...

ConsistA(h1,...,hk) = {y: 8i hi(y) =A(h1,...,hk)}

{0,1}n

h1h2

h3

ConsistA(h1) = {y: h1(y) = A(h1)}

Pictorial description of Pictorial description of AA

hk

Page 24: 1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.

24

h1h2

h3

The evaluation of The evaluation of SearcherSearchery2{0,1}n

y2ConsistA(h1)

n-ofs

y2ConsistA(h1,...,hn-ofs)

hn-ofs DReal

(h,y)yÃ{0,1}n,hÃSearcher(y)

If Inverter does well on DReal (i.e., prob. Inverter(h)2f-1(y) is noticeable) then MA

inverts f well

Page 25: 1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.

25

h1h2

h3

The Ideal dist.The Ideal dist.

n-ofs hn-ofs DIdeal

(h,y)hÃHn-ofs

,yÃConsistA

(h)

At random

Inverter does well on DIdeal

• The distribution on (h1,…,hn-fs) is what A expects

! A returns element in f-1(ConsistA(h1,…,hn-ofs)) with non-negligible probability

• ConsistA(h1,…,hn-ofs) is small

yÃConsistA(h1,…,hn-ofs)

Page 26: 1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.

26

Proof of SecurityProof of Security

• Inverter does well on DIdeal

• DIdeal and DReal are close.

The statistical diff. between DIdeal and DReal

is larger than the success probability of Inverter on DIdeal

Page 27: 1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.

27

Refined Proximity MeasureRefined Proximity Measure

Definition: D1 (,a)-approximates D2, if there exists Bad µ sup(D1), s.t.

– D1(Bad) · .

– For every x Bad 1/a · D1(x)/D2(x) · a.

Let T be an event s.t. D1[T] ¸ + non-neg then, D2[T] ¸ non-neg

Page 28: 1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.

28

Lemma 1 DIdeal (O(2/n3),81)-approximates DReal.

Lemma 2 (informal)Inverter does well on DIdeal and its success probability does not depend on event of small probability

Proving Lemma 2: similar to the information-theoretic case

Page 29: 1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.

29

ProvingProving Lemma 1Lemma 1Since our proximity measure is “well

behaved”, it suffices to prove thatClaim 1: (h,y)hÃH,yÃConsist

A(h) (O(2/n3),1+4/n)-approx.

(h,y)yÃ{0,1}n,h ÃH | y2Consist

A(h)

Proof:

1. For almost any h2H, (about) half of {0,1}n is consistent with it

2. Almost any y2{0,1}n is consistent with (about) half of H

Page 30: 1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.

30

Further issuesFurther issues

• Linear reduction, or lower bound for the security of the reduction

• Give simpler construction for statistical zk and statistical commitment schemes from owf.

Page 31: 1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.

31

Thanks

Page 32: 1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.

32

L

ConsistA(h1,...,hn-ofs)

{y: prob. Inverter(h1,...,hn-ofs)2f-1(y) is noticeable}

Lemma 2 : Inverter does well on DIdeal and its success prob. does not depend on event of small probability

{y: probability that A breaks the binding with y (conditioned on

h1,...,hn-ofs) is noticeable}