Top Banner
A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme Dana Dachman-Soled University of Maryland
18

A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme

Feb 25, 2016

Download

Documents

eytan

A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme. Dana Dachman -Soled University of Maryland. CPA, CCA1 and CCA2. CPA, CCA1 and CCA2. CPA-secure Public Key Encryption. CPA, CCA1 and CCA2. CCA1-secure Public Key Encryption. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme

A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1)

Encryption Scheme

Dana Dachman-SoledUniversity of Maryland

Page 2: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme

CPA, CCA1 and CCA2

Page 3: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme

CPA, CCA1 and CCA2

π‘π‘˜ ,πΈπ‘›π‘π‘π‘˜(π‘š0) π‘π‘˜ ,πΈπ‘›π‘π‘π‘˜(π‘š1)

β‰ˆ

CPA-secure Public Key Encryption

Page 4: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme

CPA, CCA1 and CCA2

β‰ˆ

CCA1-secure Public Key Encryption

π‘π‘˜ π‘π‘˜

π‘ π‘˜ π‘ π‘˜

π‘π‘˜ ,πΈπ‘›π‘π‘π‘˜(π‘š0) π‘π‘˜ ,πΈπ‘›π‘π‘π‘˜(π‘š1)

Page 5: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme

CPA, CCA1 and CCA2

β‰ˆ

CCA2-secure Public Key Encryption

π‘π‘˜ π‘π‘˜

π‘ π‘˜ π‘ π‘˜π‘β‰ π‘βˆ— π‘β‰ π‘βˆ—

π‘π‘˜ ,πΈπ‘›π‘π‘π‘˜(π‘š1)π‘π‘˜ ,πΈπ‘›π‘π‘π‘˜(π‘š0)

Page 6: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme

Does CPA Security Imply CCA Security?

β€’ [Naor, Yung 90], [Dolev, Dwork, Naor, 00]– CPA + NIZK -> CCA1 and CCA2

β€’ Partial black-box separation– [Gertner, Malkin, Myers, 07] no β€œshielding” construction of CCA1

from CPA.β€’ Question remains open!– Even whether CCA1 -> CCA2 is not known.– Long line of work showing black-box constructions of CCA2

encryption from lower level primitives.β€’ [Peikert, Waters 11], [Rosen, Segev, 10], [Kiltz, Mohassel, O’Neill, 10]. . .

– Our work continues this line of research.

Page 7: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme

Our Results

β€’ Note: Construction is black-box, but reduction makes non-black-box use of the CCA2 adversary.

β€’ [Myers, Sergi, shelat, 12]: Black-box construction of cNM-CCA1-secure encryption from the same assumptions.

β€’ Our contribution: Extend to full CCA2 setting.β€’ Construction of a CCA2 scheme from encryption schemes

with β€œweaker” security and no additional assumptions.

Theorem: There is a black-box construction of CCA2-secure encryption from plaintext aware (sPA1) and weakly

simulatable public key encryption.

Page 8: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme

Our Assumptionsβ€”Plaintext Awareness = ciphertext creator, = extractor

Experiment β€’ pairs of public + secret keys are generatedβ€’ get random coins and public keys as inputβ€’ gets oracle access to decrypts for β€’ Let be the set of queries asked by β€’ Experiment outputs 1 if decrypted all queries in

β€œcorrectly.”

Encryption scheme is -secure if for every ppt , there exists an extractor s.t. experiment outputs 0 with negligible

probability.

I β€œknows” the underlying plaintext.Note: uses in a non-

black-box manner

Note: No auxiliary input

Page 9: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme

Our Assumptionsβ€”Weak Simulatability

β€’ samples β€œciphertexts” without knowing the plaintext.β€’ on input and valid ciphertext outputs coins for β€’ Correctness:

Candidate constructions satisfying both assumptions ([MSs12]):β€’ Damgard Elgamal Encryption scheme (DEG)β€’ Cramer-Shoup lite (CS-lite)

( 𝑓 βˆ’1 (π‘π‘˜ ,𝑐=πΈπ‘›π‘π‘π‘˜ (π‘š ) ) ,𝑐 ) (π‘Ÿ , 𝑓 (π‘π‘˜ ,π‘Ÿ ) )β‰ˆ

Page 10: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme

Overview: CCA Proof StrategiesHyrid Public Key Challenge Ciphertext Decryption Oracle

Simulated Simulated Simulated

.

.

.PPT adversary cannot

distinguish consecutive hybrids.

To reduce to security of underlying encryption scheme,

must simulate decryption oracle without knowing secret key.

Main Challenge: Constructing the

simulated decryption oracle

Page 11: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme

CCA1 from Plaintext Awareness?

β€’ Trivial: Plaintext Aware scheme is itself CCA1-secure!– To simulate the decryption oracle without

knowing the secret key, use the Extractor.

Page 12: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme

CCA2 from Plaintext Awareness?β€’ Is the plaintext aware scheme itself also CCA2-secure?β€’ An attempt: As before, simulate decryption oracle using

Extractor.β€’ Problem: Extractor is no longer guaranteed to work in the

second phase!– Once adversary receives challenge ciphertext , Extractor can fail.– E.g. adversary can re-randomize and submit to oracle. – Note that our candidate Plaintext-Aware schemes are

homomorphic! So these attacks are possible.β€’ Extractor seems to be useless.

– At first glance, seems as hard as proving that CCA1 -> CCA2.– No: Having a faulty extractor algorithm is better than no extractor.

Page 13: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme

Our ConstructionCombines techniques from [Hohenberger, Lewko, Waters 12] and [Myers, Sergi, shelat 12]

𝐢𝑇 𝑖 𝑛0=𝐸𝑛𝑐𝑝 π‘˜π‘– 𝑛0(𝑠0) 2. Inner

ciphertexts: 𝐢𝑇 𝑖 𝑛1=πΈπ‘›π‘π‘π‘˜π‘– 𝑛1(𝑠1)

𝑠0βŠ•π‘ 1=(π‘šβˆ¨ΒΏπ‘Ÿ )

𝐢𝑇1 𝐢𝑇 2 𝐢𝑇 3

π‘Ÿ1 ,β€¦π‘Ÿπ‘˜=π‘π‘Ÿπ‘”(π‘Ÿ )

3. Outer ciphertexts:

encryptions of under and randomness

. . . 𝐢𝑇 π‘˜

Public keys are chosen based

on

1. Generate for one-time signature scheme

4. Compute

5. Output:

Page 14: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme

Proof Intuition

β€’ Idea: Use extractor to simulate oracle even in the CCA2 case.

β€’ Now the extractor may answer incorrectly after the adversary receives the challenge ciphertext.

β€’ Call this event BadExtEvent

Page 15: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme

Proof Intuition

β€’ Sequence of hybrids: Show that BadExtEvent occurs with negligible probability in final hybrid.

β€’ For each hybrid, show that probability BadExtEvent occurs differs by a negligible amount.

β€’ In order to prove this, reduction must always be able to detect a bad extraction event by comparing the output of the Extractor with the output of .

Page 16: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme

Hard Case:Detecting BadExtEvent in CPA hybrid

Reduction to CPA security of inner ciphertexts

β€’ Idea for how to detect BadExtEvent: – Randomly choose – Show that the first BadExtEvent occurs on decryption of with

probability .– Say . CPA adv. knows secret key for but not

β€’ Can detect first BadExtEvent on . β€’ Places challenge ciphertext in position.

– Note that in both hybrids, is individually uniformly distributed.– Simulated oracle answers correctly until the first BadExtEvent.

𝑠0=π‘Ÿπ‘Žπ‘›π‘‘ 𝑠1=π‘Ÿπ‘Žπ‘›π‘‘ 𝑠0=π‘Ÿπ‘Žπ‘›π‘‘ 𝑠1=𝑠0βŠ• (π‘šβˆ¨ΒΏπ‘Ÿ )β‰ˆπΆπ‘‡ 𝑖 𝑛0

❑ βˆ— 𝐢𝑇 𝑖 𝑛1❑ βˆ— 𝐢𝑇 𝑖 𝑛0

❑ βˆ— 𝐢𝑇 𝑖 𝑛1❑ βˆ—

XOR to random XOR to

𝑠0=π‘Ÿπ‘Žπ‘›π‘‘ 𝑠0=π‘Ÿπ‘Žπ‘›π‘‘

Page 17: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme

Future Directions

β€’ Can high-level proof techniques be useful for constructing CCA2 from CCA1?– Non-black-box use of the adversary.– Detecting a β€œbad event” without fully simulating

the decryption oracle.β€’ Can we reduce the underlying assumptions of

our construction?

Page 18: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme

Thank you!