Top Banner
Leakage-Flexible CCA-secure PKE: Simple Construction and Free of Pairing Baodong Qin Shengli Liu Shanghai Jiao Tong University PKC 2014 March 26, 2014 1
28

Leakage-Flexible CCA-secure PKE · •Refined subgroup indistinguishability (RSI) assumption •Leakage-resilient CCA-secure PKE under the RSI assumptions •Conclusion 2 . 1. Models

Aug 20, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Leakage-Flexible CCA-secure PKE · •Refined subgroup indistinguishability (RSI) assumption •Leakage-resilient CCA-secure PKE under the RSI assumptions •Conclusion 2 . 1. Models

Leakage-Flexible CCA-secure PKE: Simple Construction and Free of Pairing

Baodong Qin Shengli Liu

Shanghai Jiao Tong University

PKC 2014 March 26, 2014

1

Page 2: Leakage-Flexible CCA-secure PKE · •Refined subgroup indistinguishability (RSI) assumption •Leakage-resilient CCA-secure PKE under the RSI assumptions •Conclusion 2 . 1. Models

Contents

• Models of Key Leakage

• Previous Constructions and Limitations

• Refined subgroup indistinguishability (RSI) assumption

• Leakage-resilient CCA-secure PKE under the RSI assumptions

• Conclusion

2

Page 3: Leakage-Flexible CCA-secure PKE · •Refined subgroup indistinguishability (RSI) assumption •Leakage-resilient CCA-secure PKE under the RSI assumptions •Conclusion 2 . 1. Models

1. Models of Key Leakage

3

Page 4: Leakage-Flexible CCA-secure PKE · •Refined subgroup indistinguishability (RSI) assumption •Leakage-resilient CCA-secure PKE under the RSI assumptions •Conclusion 2 . 1. Models

Traditional Security Models

• e.g. public-key setting

(SK, R) are private, (PK, C ) are public

Semantic security[GM84]

Chosen-ciphertext security[NY90,RS91]

SK C:=EncPK(M;R)

(PK,C)

PK

Bob Alice

4

Eve Dec(SK, ·)

Page 5: Leakage-Flexible CCA-secure PKE · •Refined subgroup indistinguishability (RSI) assumption •Leakage-resilient CCA-secure PKE under the RSI assumptions •Conclusion 2 . 1. Models

Real-Life Environments

• Leaking information

– Electromagnetic radiation

– Time

– Sound

– Temperature

……

– Memory attack [HSHCPCFAF08]

C:=EncPK(M;R)

Bob Alice Side-channel

attacks

5

Page 6: Leakage-Flexible CCA-secure PKE · •Refined subgroup indistinguishability (RSI) assumption •Leakage-resilient CCA-secure PKE under the RSI assumptions •Conclusion 2 . 1. Models

Real-Life Environments

• Leaked information: sounds, power…

Not all information is useful, but some

may reveals secret key

How to model key leaks?

f(SK) SK

6

Page 7: Leakage-Flexible CCA-secure PKE · •Refined subgroup indistinguishability (RSI) assumption •Leakage-resilient CCA-secure PKE under the RSI assumptions •Conclusion 2 . 1. Models

Key Leakage Models

• Only computation leaks information, e.g., [MicaliR04]

• Bounded leakage model, e.g., [AkaviaGV09,NaorS09]

• Continual leakage model, e.g.,

[BrakerskiKKV10, DodisHLW10]

• Auxiliary input model, e.g. [DodisKL09]

• Continual auxiliary input model, e.g. [YuenCZY12]

• ……

7

Page 8: Leakage-Flexible CCA-secure PKE · •Refined subgroup indistinguishability (RSI) assumption •Leakage-resilient CCA-secure PKE under the RSI assumptions •Conclusion 2 . 1. Models

Bounded-Leakage Model

• ∑ |fi| ≤ λ (bound)

• Leakage-rate: λ/|SK|

Leakage flexible if λ/|SK|=1-o(1)

fn(SK) 111

f1(SK) 101 SK

8

Page 9: Leakage-Flexible CCA-secure PKE · •Refined subgroup indistinguishability (RSI) assumption •Leakage-resilient CCA-secure PKE under the RSI assumptions •Conclusion 2 . 1. Models

Adversary PK

SK

Challenger

M0, M1

C*=Enc(PK, Mb)

b’

Advantage:=|Pr[b=b’]-1/2|

Leakage-resilient CCA PKE

9

Page 10: Leakage-Flexible CCA-secure PKE · •Refined subgroup indistinguishability (RSI) assumption •Leakage-resilient CCA-secure PKE under the RSI assumptions •Conclusion 2 . 1. Models

2. Previous Constructs and Limitations

10

Page 11: Leakage-Flexible CCA-secure PKE · •Refined subgroup indistinguishability (RSI) assumption •Leakage-resilient CCA-secure PKE under the RSI assumptions •Conclusion 2 . 1. Models

Previous Constructions

• Against passive attacks, e.g.,

[BHHO08,GPV08,HLWW13,NS09,Regev05,…]

• Against active attacks, e.g.,

[LZSS12,LWZ13,NS09,DHLW10,GHV12,QL13,…] Good security, good efficiency, lower leakage rate

Good security, good efficiency, higher leakage rate

Good security, bad efficiency, flexible leakage

Good security, good efficiency, flexible leakage ??

Leakage-flexible CCA PKE

[DHLW10,GHV12] Practical, but complicated construction,

involve pairing

11

Page 12: Leakage-Flexible CCA-secure PKE · •Refined subgroup indistinguishability (RSI) assumption •Leakage-resilient CCA-secure PKE under the RSI assumptions •Conclusion 2 . 1. Models

Our Contributions

• General instantiation of [QL13] LR-CCA , applying universal hash proof system[CS02] and one-time lossy filter [QL13] – Refined subgroup indistinguishability (RSI)

assumption, Including DCR, QR…

• Improved leakage-rate: From 1/2-o(1) to 1-o(1) – 1/2-o(1) (DDH, DCR) from [QL13], improved to

– leakage-flexible CCA-secure PKE • Practical, Simple construction, Without pairing

• Under a special RSI assumption

12

Page 13: Leakage-Flexible CCA-secure PKE · •Refined subgroup indistinguishability (RSI) assumption •Leakage-resilient CCA-secure PKE under the RSI assumptions •Conclusion 2 . 1. Models

3. RSI Assumption

13

Page 14: Leakage-Flexible CCA-secure PKE · •Refined subgroup indistinguishability (RSI) assumption •Leakage-resilient CCA-secure PKE under the RSI assumptions •Conclusion 2 . 1. Models

RSI Assumption

• Group description: (G, T, g, h), such that

G=G1xG2

G1 and G2 are cyclic groups; g and h are generators.

r1:=ord(g), r2:=ord(h)

gcd(r1,r2)=1 (==> G is also a cyclic group)

Elements in G are efficiently checkable.

An upper bound T ≥ r1 x r2.

14

Page 15: Leakage-Flexible CCA-secure PKE · •Refined subgroup indistinguishability (RSI) assumption •Leakage-resilient CCA-secure PKE under the RSI assumptions •Conclusion 2 . 1. Models

RSI Assumption

15

Page 16: Leakage-Flexible CCA-secure PKE · •Refined subgroup indistinguishability (RSI) assumption •Leakage-resilient CCA-secure PKE under the RSI assumptions •Conclusion 2 . 1. Models

Example: a special RSI assumption (G, T, g, h)

G. Nieto, et.al [NBD2005] 16

Page 17: Leakage-Flexible CCA-secure PKE · •Refined subgroup indistinguishability (RSI) assumption •Leakage-resilient CCA-secure PKE under the RSI assumptions •Conclusion 2 . 1. Models

4. From RSI to PKE

17

Page 18: Leakage-Flexible CCA-secure PKE · •Refined subgroup indistinguishability (RSI) assumption •Leakage-resilient CCA-secure PKE under the RSI assumptions •Conclusion 2 . 1. Models

From RSI (G, T, g, h) to Hash Proof System

• Subset membership problem

Valid vs Invalid

• Projective hash {Hsk: GG}, skZT :

• If c =gr∈G1 with witness r, then

18

Page 19: Leakage-Flexible CCA-secure PKE · •Refined subgroup indistinguishability (RSI) assumption •Leakage-resilient CCA-secure PKE under the RSI assumptions •Conclusion 2 . 1. Models

From RSI to Hash Proof System • -universal HPS:

for c ∈G\G1, the guess probability of value Hsk(c) conditioned on pk, is at most .

• Suppose e ≥ 2 is the smallest prime factor of r1. Then

• Reduce the guess probability to by

n-fold parallelization.

19

Page 20: Leakage-Flexible CCA-secure PKE · •Refined subgroup indistinguishability (RSI) assumption •Leakage-resilient CCA-secure PKE under the RSI assumptions •Conclusion 2 . 1. Models

From RSI to One-Time Lossy Filter • (Dom, l)-One-time lossy filter: (FGen, FEval, FTag)

– FGen(1) (ek, td); ek also determines a tag space T,

Tinj T , Tlossy T , Tinj Tlossy =

– FEval(ek, t, x) computes fek,t(x).

If t=(ta, tc) Tinj , fek,t(x) is injective.

If t=(ta, tc)Tlossy , fek,t(x) has at most 2l values.

– FTag(td, ta) tc, such that t=(ta, tc) is a lossy tag.

Indistinguishability: { (ek, (ta, tc)) } random tc { (ek, (ta, tc’)) } tc’ =FTag(td, ta)

Evasiveness Given a lossy tag (ta, tc’), it is hard to get a new non-injective one.

20

Page 21: Leakage-Flexible CCA-secure PKE · •Refined subgroup indistinguishability (RSI) assumption •Leakage-resilient CCA-secure PKE under the RSI assumptions •Conclusion 2 . 1. Models

From RSI to One-Time Lossy Filter

• Construction idea

• All-but-one lossy function + chameleon hash function

• All-but-one lossy function: all tags are injective except one lossy t*

21

Page 22: Leakage-Flexible CCA-secure PKE · •Refined subgroup indistinguishability (RSI) assumption •Leakage-resilient CCA-secure PKE under the RSI assumptions •Conclusion 2 . 1. Models

From RSI to One-Time Lossy Filter

• Constructing ABO-Lossy Function from RSI

• Constructing OT-LF from Chameleon Hash and ABO-Lossy Function

Page 23: Leakage-Flexible CCA-secure PKE · •Refined subgroup indistinguishability (RSI) assumption •Leakage-resilient CCA-secure PKE under the RSI assumptions •Conclusion 2 . 1. Models

From RSI to One-Time Lossy Filter • ABO-lossy function from RSI assumption • A simple example: (G, T, g, h)

• If b=b*, then Fabo(ek, b,x)=gsx ∈ G1, hence |Fabo(b*,x)|≤r1. • If b≠b*, then (gshb-b*)x is injective, since gshb-b* is a

generator of G.

23

Page 24: Leakage-Flexible CCA-secure PKE · •Refined subgroup indistinguishability (RSI) assumption •Leakage-resilient CCA-secure PKE under the RSI assumptions •Conclusion 2 . 1. Models

Final Step: PKE = HPS + OT-LF

If c G1, K=Hsk(c)=pkr

Extractor OT-LF

masking message authentication

24

K=Hsk(c)

M

=Mh(K)

h

=fek, t(K)

C

(C, h, ,, tc)

t=(C, h,, tc)

c G\G1, K is n-entropic

Page 25: Leakage-Flexible CCA-secure PKE · •Refined subgroup indistinguishability (RSI) assumption •Leakage-resilient CCA-secure PKE under the RSI assumptions •Conclusion 2 . 1. Models

Parameters

25

1/q

Page 26: Leakage-Flexible CCA-secure PKE · •Refined subgroup indistinguishability (RSI) assumption •Leakage-resilient CCA-secure PKE under the RSI assumptions •Conclusion 2 . 1. Models

Comparison

26

Page 27: Leakage-Flexible CCA-secure PKE · •Refined subgroup indistinguishability (RSI) assumption •Leakage-resilient CCA-secure PKE under the RSI assumptions •Conclusion 2 . 1. Models

Conclusion

• A general assumption: RSI

• Improve leakage rate 1/2-o(1) from [QL13] (DDH,DCR) to 1-o(1) under a special RSI assumption.

• The first pairing-free leakage-flexible CCA-secure PKE

27

Page 28: Leakage-Flexible CCA-secure PKE · •Refined subgroup indistinguishability (RSI) assumption •Leakage-resilient CCA-secure PKE under the RSI assumptions •Conclusion 2 . 1. Models

28