adaptively secure succinct garbled ram with persistent...

115
1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti, Yilei Chen, Justin Holmgren, Mariana Raykova DIMACS workshop MIT Media Lab June 8~10, 2016

Upload: truongtram

Post on 12-Feb-2019

227 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

1

Adaptively Secure Succinct Garbled RAM with Persistent Memory

Ran Canetti, Yilei Chen, Justin Holmgren, Mariana Raykova

DIMACS workshopMIT Media LabJune 8~10, 2016

Page 2: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

2

: June 11, 2016, Boston, heavy snow.

Page 3: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

3

: June 11, 2016, Boston, heavy snow. Alice finds a quasi-polynomial time algorithm for factoring.

Page 4: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

4

: June 11, 2016, Boston, heavy snow. Alice finds a quasi-polynomial time algorithm for factoring.

Alice

Page 5: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

5

: June 11, 2016, Boston, heavy snow. Alice finds a quasi-polynomial time algorithm for factoring.

: Instead of submitting to STOC, she thinks it’s cool to write a program and show off to her friends.

Page 6: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

6

> Factoring.hs RSA2048

Page 7: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

7

> Factoring.hs RSA2048Running time 7 hrs 34 mins25195908475…20720357 = 83990...4079279 x 3091701...723883

Next question

Page 8: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

8

: It is slow on her laptop (quasi-polynomial time, you know) … cannot fit into a party.

Page 9: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

9

: It is slow on her laptop (quasi-polynomial time, you know) … cannot fit into a party.

: So she turns to cloud, but clouds are big brothers

Page 10: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

10

: It is slow on her laptop (quasi-polynomial time, you know) … cannot fit into a party.

: So she turns to cloud, but clouds are big brothers

: She heard that one can delegate the computation in a way that the server learns only the output of the computation but nothing else

Page 11: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

11

“My friends and NSA will be shocked by the runtime without learning anything other than the output”

Page 12: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

12

“The algorithm has huge preprocessing, stores lots of non-zero points on the Zeta function ...”

“My friends and NSA will be shocked by the runtime without learning anything other than the output”

Page 13: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

13

“The algorithm has huge preprocessing, stores lots of non-zero points on the Zeta function ...”

“My friends and NSA will be shocked by the runtime without learning anything other than the output”

“Wait ... the audiences already know too much.”

Page 14: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

14

> sudo apt-get install FHE

Page 15: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

15

> sudo apt-get install FHE> FHE Factoring.hs

Page 16: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

16

> sudo apt-get install FHE> FHE Factoring.hsTurning the program into circuits ...

Page 17: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

17

> sudo apt-get install FHE> FHE Factoring.hsTurning the program into circuits ...^C

Page 18: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

18

> sudo apt-get install FHE> FHE Factoring.hsTurning the program into circuits ...^C>> sudo apt-get install Yao> Yao Factoring.hs

Page 19: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

19

> sudo apt-get install FHE> FHE Factoring.hsTurning the program into circuits ...^C>> sudo apt-get install Yao> Yao Factoring.hsStill turning the program into circuits ...

#Yao

Page 20: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

20

> sudo apt-get install FHE> FHE Factoring.hsTurning the program into circuits ...^C>> sudo apt-get install Yao> Yao Factoring.hsStill turning the program into circuits ...^C^C^C^C^C^C^C>

Page 21: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

21

> sudo apt-get install GRAM_Lu_Ostrovsky> GRAM_Lu_Ostrovsky Factoring.hs

Page 22: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

22

> sudo apt-get install GRAM_Lu_Ostrovsky> GRAM_Lu_Ostrovsky Factoring.hsWarning: Program size as big as the running time, continue (y) or not (n)

Page 23: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

23

> sudo apt-get install GRAM_Lu_Ostrovsky> GRAM_Lu_Ostrovsky Factoring.hsWarning: Program size as big as the running time, continue (y) or not (n)n>

Page 24: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

24

> sudo apt-get install PRAM

Page 25: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

25

> sudo apt-get install PRAM> PRAM Factoring.hs

Page 26: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

26

> sudo apt-get install PRAM> PRAM Factoring.hsDone -> PRAM_Factoring

Page 27: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

27

> sudo apt-get install PRAM> PRAM Factoring.hsDone -> PRAM_Factoring> PRAM_Factoring RSA2048

Page 28: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

28

> sudo apt-get install PRAM> PRAM Factoring.hsDone -> PRAM_Factoring> PRAM_Factoring RSA2048Warning: cannot adaptively choose functions or inputs, security at user’s own risk, continue (y) or not (n)

Page 29: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

29

> sudo apt-get install PRAM> PRAM Factoring.hsDone -> PRAM_Factoring> PRAM_Factoring RSA2048Warning: cannot adaptively choose functions or inputs, security at user’s own risk, continue (y) or not (n)n

Page 30: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

30

“Don’t turn into circuits, don’t blow up too much”

“Adaptively pick integers”

“Huge amount of preprocessed data reusable”

Page 31: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

31

Garbling/randomized encoding for RAM with persistent memory

Page 32: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

32

Garbling/randomized encoding for RAM with persistent memory

mskGen =>

Page 33: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

33

Garbling/randomized encoding for RAM with persistent memory

D0

mskGen =>

msk + => G(D0)

Page 34: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

34

Garbling/randomized encoding for RAM with persistent memory

D0

mskGen =>

msk + => G(D0)

P1msk + => G(P1)

Page 35: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

35

Garbling/randomized encoding for RAM with persistent memory

D0

mskGen =>

msk + => G(D0)

P1msk + => G(P1)

G(P1)Eval G(D0) => P1(D0)

Page 36: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

36

Garbling/randomized encoding for RAM with persistent memory

D0

mskGen =>

msk + => G(D0)

P1msk + => G(P1)

G(P1)Eval G(D0) => G(D1)P1(D0)

Persistency

Page 37: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

37

Garbling/randomized encoding for RAM with persistent memory

D0

mskGen =>

msk + => G(D0)

P1msk + => G(P1)

G(P1)Eval G(D0) => G(D1)P1(D0)

P2msk + => G(P2)

Persistency

Page 38: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

38

Garbling/randomized encoding for RAM with persistent memory

D0

mskGen =>

msk + => G(D0)

P1msk + => G(P1)

G(P1)Eval G(D0) => G(D1)P1(D0)

P2msk + => G(P2)

G(P2)Eval G(D1) => G(D2)P2(D1)

...

Persistency

Page 39: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

39

Garbling/randomized encoding for RAM with persistent memory

D0

G(D0)

P1

G(P1)

Succinct

Page 40: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

40

Garbling/randomized encoding for RAM with persistent memory

?

?

P1(D0)

Adaptively simulation

secure

Page 41: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

41

Garbling/randomized encoding for RAM with persistent memory

? => G(D0)

? => G(P1)

G(P1)G(D0) <= G(D1)P1(D0)

Adaptively simulation

secure

Page 42: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

42

Garbling/randomized encoding for RAM with persistent memory

? => G(D0)

? => G(P1)

G(P1)G(D0) <= G(D1)P1(D0)

?

G(D1) P2(D1)

Adaptively simulation

secure

Page 43: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

43

Garbling/randomized encoding for RAM with persistent memory

? => G(D0)

? => G(P1)

G(P1)G(D0) <= G(D1)P1(D0)

? => G(P2)

G(P2)G(D1) <= G(D2)P2(D1)

Adaptively simulation

secure

Page 44: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

44

Theorem

Page 45: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

45

[Main Theorem]

Adaptively secure succinct garbled RAM with persistent memoryfrom indistinguishability obfuscation for circuits, and poly-to-1 collision-resistant hash function.

Page 46: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

46

Starring

Page 47: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

47

Indistinguishability Obfuscator

Page 48: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

48

iO[ F0 ] ≈ iO[ F1 ]

if F0 and F1 have identical functionality

Indistinguishability Obfuscator for circuits

Candidate constructions:[Garg-Gentry-Halevi-Raykova-Sahai-Waters ‘13], [Barak-Garg-Kalai-Paneth-Sahai ‘14], [Brakerski-Rothblum ‘14], [Pass-Seth-Telang ‘14], [Zimmerman ‘15], [Applebaum-Brakerski ‘15], [Ananth-Jain ‘15], [Bitansky-Vaikuntanathan ‘15], [Gentry-Gorbunov-Halevi ‘15], [Lin ‘16], …

Cryptanalyses:[Cheon-Han-Lee-Ryu-Stehle ‘15], [Coron et al ‘15], [Miles-Sahai-Zhandry ‘16], ...

Defined by [Barak-Goldreich-Impagliazzo-Rudich-Sahai-Vadhan-Yang ‘01]

Security:

Page 49: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

49

Poly-to-oneCollision Resistant Hash function

Page 50: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

50

Poly-to-one collision resistant hash functions

H is collision resistant + each image has at most poly preimages.

[Thm] Exists for constant c, assuming Factoring or Discrete-log is hard.

Page 51: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

51

The rest of the talk:

1. The main idea of the construction. 2. The technical heart: adaptively-enforceable accumulator.3. Wrap up, and the easiest ways to think of our scheme.

Page 52: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

52

Starting point: Canetti-Holmgren’s selective secure scheme.

Page 53: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

53

Starting point: Canetti-Holmgren’s selective secure scheme.

High-level idea of the Canetti-Holmgren construction:Garble the CPU-step circuit, encrypt and authenticate the intermediate states, memories.

Page 54: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

54

You never know how hard it is to use iO before actually play with it.

[ said Justin Holmgren, June 22, 2015, sunny ]

Page 55: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

55

Starting point: Canetti-Holmgren’s selective secure scheme.

High-level idea of the Canetti-Holmgren construction:Garble the CPU-step circuit, encrypt and authenticate the intermediate states, memories.

Canetti-Holmgren scheme details:Fixed-transcript => Fixed-access => Fixed-address => Fully secure

Page 56: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

56

Starting point: Canetti-Holmgren’s selective secure scheme.

High-level idea of the Canetti-Holmgren construction:Garble the CPU-step circuit, encrypt and authenticate the intermediate states, memories.

Canetti-Holmgren scheme details:Fixed-transcript => Fixed-access => Fixed-address => Fully secure

Indistinguishable as long as transc = (q, op) are the same.[KLW-technique]

Page 57: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

57

Starting point: Canetti-Holmgren’s selective secure scheme.

High-level idea of the Canetti-Holmgren construction:Garble the CPU-step circuit, encrypt and authenticate the intermediate states, memories.

Canetti-Holmgren scheme details:Fixed-transcript => Fixed-access => Fixed-address => Fully secure

Indistinguishable as long as transc = (q, op) are the same.[KLW-technique]

q can be different[encrypt the state]

Page 58: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

58

Starting point: Canetti-Holmgren’s selective secure scheme.

High-level idea of the Canetti-Holmgren construction:Garble the CPU-step circuit, encrypt and authenticate the intermediate states, memories.

Canetti-Holmgren scheme details:Fixed-transcript => Fixed-access => Fixed-address => Fully secure

Indistinguishable as long as transc = (q, op) are the same.[KLW-technique]

q can be different[encrypt the state]

Memory content can be different[encrypt the data]

Page 59: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

59

Starting point: Canetti-Holmgren’s selective secure scheme.

High-level idea of the Canetti-Holmgren construction:Garble the CPU-step circuit, encrypt and authenticate the intermediate states, memories.

Canetti-Holmgren scheme details:Fixed-transcript => Fixed-access => Fixed-address => Fully secure

Indistinguishable as long as transc = (q, op) are the same.[KLW-technique]

q can be different[encrypt the state]

Memory content can be different[encrypt the data]

Hide access pattern.[oram]

Page 60: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

60

Starting point: Canetti-Holmgren’s selective secure scheme.

High-level idea of the Canetti-Holmgren construction:Garble the CPU-step circuit, encrypt and authenticate the intermediate states, memories.

Canetti-Holmgren scheme details:Fixed-transcript => Fixed-access => Fixed-address => Fully secure

Indistinguishable as long as transc = (q, op) are the same.[KLW-technique]

q can be different[encrypt the state]

Memory content can be different[encrypt the data]

Hide access pattern.[oram]

Page 61: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

61

Canetti-Holmgren (ITCS16)

Page 62: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

62

Canetti-Holmgren (ITCS16) + Zoom-in the core step:

Page 63: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

63

Canetti-Holmgren (ITCS16) + Zoom-in the core step:

Koppula-Lewko-Waters (STOC15)(iO-friendly) Iterator(iO-friendly) Accumulator(iO-friendly) Splittable signature

Page 64: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

64

Canetti-Holmgren (ITCS16) + Zoom-in the core step:

Koppula-Lewko-Waters (STOC15)(iO-friendly) Iterator(iO-friendly) Accumulator(iO-friendly) Splittable signature

What is written in eprint 2015/1074

Accumulator iO-friendly Merkle-tree

Page 65: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

65

Canetti-Holmgren (ITCS16) + Zoom-in the core step:

Koppula-Lewko-Waters (STOC15)(iO-friendly) Iterator(iO-friendly) Accumulator(iO-friendly) Splittable signature

What is written in eprint 2015/1074

Accumulator iO-friendly Merkle-tree

initi

alize

G(D0)

Page 66: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

66

Canetti-Holmgren (ITCS16) + Zoom-in the core step:

Koppula-Lewko-Waters (STOC15)(iO-friendly) Iterator(iO-friendly) Accumulator(iO-friendly) Splittable signature

What is written in eprint 2015/1074

Accumulator iO-friendly Merkle-tree

initi

alize

Authenticate

G(D0)

G(Pi+1)

key

Page 67: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

67

Canetti-Holmgren (ITCS16) + Zoom-in the core step:

Koppula-Lewko-Waters (STOC15)(iO-friendly) Iterator(iO-friendly) Accumulator(iO-friendly) Splittable signature

What is written in eprint 2015/1074

Accumulator iO-friendly Merkle-tree

initi

alize

Authenticate

update

G(D0)

G(Pi+1)

G(Di+1)

key

Page 68: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

68

Canetti-Holmgren (ITCS16) + Zoom-in the core step:++ Zoom-in the accumulator

Page 69: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

69

Canetti-Holmgren (ITCS16) + Zoom-in the core step:++ Zoom-in the accumulator

Properties needed for the Accumulator- Normal property like a Merkle-tree.

#Merkletree

Page 70: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

70

Canetti-Holmgren (ITCS16) + Zoom-in the core step:++ Zoom-in the accumulator

Properties needed for the Accumulator- Normal property like a Merkle-tree.

#Merkletree

Page 71: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

71

Canetti-Holmgren (ITCS16) + Zoom-in the core step:++ Zoom-in the accumulator

Properties needed for the Accumulator- Normal property like a Merkle-tree.

#Merkletree

Page 72: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

72

Canetti-Holmgren (ITCS16) + Zoom-in the core step:++ Zoom-in the accumulator

Properties needed for the Accumulator- Normal property like a Merkle-tree.

#Merkletree

Page 73: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

73

Canetti-Holmgren (ITCS16) + Zoom-in the core step:++ Zoom-in the accumulator

Properties needed for the Accumulator- Normal property like a Merkle-tree.- Enforcement (iO-friendly property):

there’s only one preimage x* of the current root value y*.

#Merkletree

y*

x*

Page 74: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

74

Canetti-Holmgren (ITCS16) + Zoom-in the core step:++ Zoom-in the accumulator

Properties needed for the Accumulator- Normal property like a Merkle-tree.- Enforcement (iO-friendly property):

there’s only one preimage x* of the current root value y*.

Impossible information theoretically.

#Merkletree

y*

x*

Page 75: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

75

Canetti-Holmgren (ITCS16) + Zoom-in the core step:++ Zoom-in the accumulator

Properties needed for the Accumulator- Normal property like a Merkle-tree.- Enforcement (iO-friendly property):

there’s only one preimage x* of the current root value y*.

Impossible information theoretically.

KLW’s computational enforcement: Normal.Gen( )->HEnforce.Gen( x*, y*)->H*, H ≈ H*

#Merkletree

y*

x*

Page 76: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

76

Canetti-Holmgren (ITCS16) + Zoom-in the core step:++ Zoom-in the accumulator

Properties needed for the Accumulator- Normal property like a Merkle-tree.- Enforcement (iO-friendly property):

there’s only one preimage x* of the current root value y*.

Impossible information theoretically.

KLW’s computational enforcement: Normal.Gen( )->HEnforce.Gen( x*, y*)->H*, H ≈ H*

Alternatively: SSB hashing => [Ananth-Chen-Chung-Lin-Lin]

#Merkletree

y*

x*

Page 77: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

77

Selective Enforcing Adaptive Enforcing

Page 78: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

78

Selective Enforcing Adaptive Enforcing

x* <= Adversary

Page 79: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

79

Gen( ) => H

Selective Enforcing Adaptive Enforcing

Enforcing(x*, y*) => H*

x* <= Adversary

Page 80: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

80

Gen( ) => H

Selective Enforcing Adaptive Enforcing

Enforcing(x*, y*) => H*

Gen( ) => Hx* <= Adversary

Page 81: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

81

Gen( ) => H

Selective Enforcing Adaptive Enforcing

Enforcing(x*, y*) => H*

Gen( ) => H

x* <= Adversary(H)

x* <= Adversary

Page 82: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

82

Gen( ) => H

Selective Enforcing Adaptive Enforcing

Enforcing(x*, y*) => H*

Gen( ) => H

Enforcing(x*, y*) => H*

x* <= Adversary(H)

x* <= Adversary

Page 83: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

83

( … wait, what?)

Gen( ) => H

Selective Enforcing Adaptive Enforcing

Enforcing(x*, y*) => H*

Gen( ) => H

Enforcing(x*, y*) => H*

x* <= Adversary(H)

x* <= Adversary

Page 84: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

84

#Mindblowing

Page 85: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

85

Fact ICan separate the key

Page 86: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

86

What is written in eprint 2015/1074

Accumulator iO-friendly Merkle-tree

initi

alize

Authenticate

update

G(D0)

G(Pi+1)

G(Di+1)

key

key hk vk= +

Page 87: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

87

What is written in eprint 2015/1074

Accumulator iO-friendly Merkle-tree

initi

alize

Authenticate

update

G(D0)

G(Pi+1)

G(Di+1)

key

key hk vk= +

hk

vk

hk

Page 88: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

88

Adaptive Enforcing

hk

Page 89: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

89

Adaptive Enforcing

x* <= Adversary( hk )

hk

Page 90: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

90

Adaptive Enforcing

x* <= Adversary( hk )

hk

vk vk*(x*) ≈

Page 91: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

91

Fact IIIf you believe diO ...

Page 92: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

92

Adaptive Enforcingkey hk vk= +

Page 93: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

93

Adaptive Enforcingkey hk vk= +

hk

always_hk_Gen( ) -> hk := CRHF key h

Page 94: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

94

Adaptive Enforcing

x* <= Adversary(H)

key hk vk= +

hk

always_hk_Gen( ) -> hk := CRHF key h

Page 95: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

95

Adaptive Enforcing

x* <= Adversary(H)

key hk vk= +

hk

vk

always_hk_Gen( ) -> hk := CRHF key h

normal_vk_Gen( ) -> vk vk(x,y) = diO( if h(x)=y, output 1; else: output 0 )

Page 96: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

96

Adaptive Enforcing

x* <= Adversary(H)

key hk vk= +

hk

vk vk*(x*)

always_hk_Gen( ) -> hk := CRHF key h

normal_vk_Gen( ) -> vk vk(x,y) = diO( if h(x)=y, output 1; else: output 0 )

enforce_vk_Gen( x*, y* ) -> vk* vk*(x,y) = diO( if y!=y* and h(x)=y, output 1; Elseif y=y* and x=x*, output 1; Else: output 0 )

Page 97: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

97

Fact III:If you don’t believe diO, can still do this with iO.

Page 98: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

98

From iO + preimage-bounded CRHF:

c-to-1 CRHF can be constructed from discrete-log or factoring

Page 99: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

99

From iO + preimage-bounded CRHF:

c-to-1 CRHF can be constructed from discrete-log or factoring

enforce_vk( x*, y* ) -> vk* vk*(x,y) = diO( if y!=y* and h(x)=y, output 1; Elseif y=y* and x=x*, output 1; Else: output 0 )

Page 100: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

100

From iO + preimage-bounded CRHF:

c-to-1 CRHF can be constructed from discrete-log or factoring

enforce_vk( x*, y* ) -> vk* vk*(x,y) = diO( if y!=y* and h(x)=y, output 1; Elseif y=y* and x=x*, output 1; Else: output 0 )

By diO-iO equivalence lemma [ Boyle-Chung-Pass ‘14 ]:“ If f1 and f2 differ only on polynomially many input-output values, and they are hard to find, then iO(f1) ≈ iO(f2) ”

Page 101: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

101

From iO + preimage-bounded CRHF:

c-to-1 CRHF can be constructed from discrete-log or factoring

enforce_vk( x*, y* ) -> vk* vk*(x,y) = diO( if y!=y* and h(x)=y, output 1; Elseif y=y* and x=x*, output 1; Else: output 0 )

From shrinking 1 bit to length-halving: Merkle-Damgaard.

Page 102: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

102

Fact IV:Adaptive Enforceable

Accumulator done

Page 103: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

103

Rest of the upgrades:

Canetti-Holmgren scheme details:Fixed-transcript => Fixed-access => Fixed-address => Fully secure

Indistinguishable as long as transc = (q, op) are the same.[KLW-technique. Assume iO]

q can be different[encrypt the state]

Memory content can be different[encrypt the data]

Hide access pattern.[oram]

Page 104: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

104

Rest of the upgrades:

Canetti-Holmgren scheme details:Fixed-transcript => Fixed-access => Fixed-address => Fully secure

Indistinguishable as long as transc = (q, op) are the same.[KLW-technique. Assume iO]

q can be different[encrypt the state]

Memory content can be different[encrypt the data]

Hide access pattern.[oram]

+ adaptively enforceable accumulator [ from iO+dlog or factoring ]

Page 105: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

105

Rest of the upgrades:

Canetti-Holmgren scheme details:Fixed-transcript => Fixed-access => Fixed-address => Fully secure

Indistinguishable as long as transc = (q, op) are the same.[KLW-technique. Assume iO]

q can be different[encrypt the state]

Memory content can be different[encrypt the data]

Hide access pattern.[oram]

Need a special property of the ORAM“Strong local randomness”, satisfied by Chung-Pass ORAM.With this property, can “guess” polynomially many addresses.

+ adaptively enforceable accumulator [ from iO+dlog or factoring ]

Page 106: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

106

Rest of the upgrades:

Canetti-Holmgren scheme details:Fixed-transcript => Fixed-access => Fixed-address => Fully secure

Indistinguishable as long as transc = (q, op) are the same.[KLW-technique. Assume iO]

q can be different[encrypt the state]

Memory content can be different[encrypt the data]

Hide access pattern.[oram]

Need a special property of the ORAM“Strong local randomness”, satisfied by Chung-Pass ORAM.With this property, can “guess” polynomially many addresses.

[Ananth-Chen-Chung-Lin-Lin, eprint 2015/1082] can be viewed as accomplishing this for all the steps.

+ adaptively enforceable accumulator [ from iO+dlog or factoring ]

SSB hash [Hubacek-W

ichs]

[OPWW

]

Page 107: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

107

Summary

1. Adaptively secure garbled RAM with persistent memory. 2. Everything is succinct.3. Upgrading to delegation with verifiability is almost for free.4. “Reusability” is natural.5. New iO-friendly tool: adaptively-enforceable accumulator (from

iO+Preimage-bounded-CRHF)

Page 108: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

108

Scenes

Page 109: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

109

Page 110: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

110

> sudo apt-get install GRAM_Canetti_Holmgren

Page 111: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

111

> sudo apt-get install GRAM_Canetti_Holmgrenpackage indistinguishability_obfuscation not an accepted assumption, security at user’s own risk, continue (y) or not (n)

Page 112: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

112

> sudo apt-get install GRAM_Canetti_Holmgrenpackage indistinguishability_obfuscation not an accepted assumption, security at user’s own risk, continue (y) or not (n)y

Page 113: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

113

> sudo apt-get install GRAM_Canetti_Holmgrenpackage indistinguishability_obfuscation not an accepted assumption, security at user’s own risk, continue (y) or not (n)y> upgrade GRAM_CCHRDone

Page 114: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

114

> sudo apt-get install GRAM_Canetti_Holmgrenpackage indistinguishability_obfuscation not an accepted assumption, security at user’s own risk, continue (y) or not (n)y> upgrade GRAM_CCHRDone > NSAcloud: GRAM_CCHR_Factoring RSA2048

Page 115: Adaptively Secure Succinct Garbled RAM with Persistent …dimacs.rutgers.edu/Workshops/RAM/Slides/chen.pdf · 1 Adaptively Secure Succinct Garbled RAM with Persistent Memory Ran Canetti,

115

> sudo apt-get install GRAM_Canetti_Holmgrenpackage indistinguishability_obfuscation not an accepted assumption, security at user’s own risk, continue (y) or not (n)y> upgrade GRAM_CCHRDone > NSAcloud: GRAM_CCHR_Factoring RSA2048Running time 1.0s25195908475…20720357 = 83990...4079279 x 3091701...723883

Next question