cryptography - École normale supérieurenitulesc/files/slides/esof.pdf · 9. . . password...

24
CRYPTOGRAPHY

Upload: others

Post on 30-Sep-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CRYPTOGRAPHY - École Normale Supérieurenitulesc/files/slides/ESOF.pdf · 9. . . Password Protected Secret Sharing stores the secret into N servers using a password retrieves her

CRYPTOGRAPHY

Page 2: CRYPTOGRAPHY - École Normale Supérieurenitulesc/files/slides/ESOF.pdf · 9. . . Password Protected Secret Sharing stores the secret into N servers using a password retrieves her

Enc Dec

Privacy

pk sk

Authenticity

Sign proof

Integrity

f(x)

Page 3: CRYPTOGRAPHY - École Normale Supérieurenitulesc/files/slides/ESOF.pdf · 9. . . Password Protected Secret Sharing stores the secret into N servers using a password retrieves her

Store Data in the Cloud

3

Server

data

data

Page 4: CRYPTOGRAPHY - École Normale Supérieurenitulesc/files/slides/ESOF.pdf · 9. . . Password Protected Secret Sharing stores the secret into N servers using a password retrieves her

Cloud Computing

4

Server

data

data

Page 5: CRYPTOGRAPHY - École Normale Supérieurenitulesc/files/slides/ESOF.pdf · 9. . . Password Protected Secret Sharing stores the secret into N servers using a password retrieves her

Untrusted Cloud Provider

5

Server

data

data

Page 6: CRYPTOGRAPHY - École Normale Supérieurenitulesc/files/slides/ESOF.pdf · 9. . . Password Protected Secret Sharing stores the secret into N servers using a password retrieves her

Security Properties

6

Server

data

data

Computation Integrity

Confidentiality

Page 7: CRYPTOGRAPHY - École Normale Supérieurenitulesc/files/slides/ESOF.pdf · 9. . . Password Protected Secret Sharing stores the secret into N servers using a password retrieves her

Confidentiality

7

data

Confidentiality

data

Server

data✘ User creates an encryption key

✘ Encrypts her data using this key

✘ Stores her encrypted data in the Cloud

Page 8: CRYPTOGRAPHY - École Normale Supérieurenitulesc/files/slides/ESOF.pdf · 9. . . Password Protected Secret Sharing stores the secret into N servers using a password retrieves her

8

Where to Store the Key?

? Key Management

Protect the secret key

✘ Users can remember just low entropy passwords (and not too many)

✘ User has to store her secret key on some device

✘ The storage device can also get corrupted

Page 9: CRYPTOGRAPHY - École Normale Supérieurenitulesc/files/slides/ESOF.pdf · 9. . . Password Protected Secret Sharing stores the secret into N servers using a password retrieves her

9

. . .

Password Protected Secret Sharing

✘ stores the secret into N servers using a password

✘ retrieves her secret even under corruptions

Page 10: CRYPTOGRAPHY - École Normale Supérieurenitulesc/files/slides/ESOF.pdf · 9. . . Password Protected Secret Sharing stores the secret into N servers using a password retrieves her

10

. . .

✘ Only needs to remember username & password

✘ Needs at least t+1 honest servers to retrieve key

Retrieve the Stored Secret Key

Page 11: CRYPTOGRAPHY - École Normale Supérieurenitulesc/files/slides/ESOF.pdf · 9. . . Password Protected Secret Sharing stores the secret into N servers using a password retrieves her

11

. . .

✘ If at most t servers are corrupted, they do not learn anything about the secret

✘ Retrieval with all bad servers does not leak password

Secure Recovery even under Corruptions

Page 12: CRYPTOGRAPHY - École Normale Supérieurenitulesc/files/slides/ESOF.pdf · 9. . . Password Protected Secret Sharing stores the secret into N servers using a password retrieves her

12

. . .

Password Protected Secret Sharing

[ACNP16]: Robust Password-Protected Secret Sharing joint work with M. Abdalla, M. Cornejo, D. Pointcheval

Page 13: CRYPTOGRAPHY - École Normale Supérieurenitulesc/files/slides/ESOF.pdf · 9. . . Password Protected Secret Sharing stores the secret into N servers using a password retrieves her

Delegated Computation

13

? ? ?

Task

Server

data

Algorithm f(x)

User requires data processing(eg: a personalised diet)

Page 14: CRYPTOGRAPHY - École Normale Supérieurenitulesc/files/slides/ESOF.pdf · 9. . . Password Protected Secret Sharing stores the secret into N servers using a password retrieves her

14

Server

f(x)=y

data

Answer y’

Trust the server or ask for a proof

Delegated Computation

Page 15: CRYPTOGRAPHY - École Normale Supérieurenitulesc/files/slides/ESOF.pdf · 9. . . Password Protected Secret Sharing stores the secret into N servers using a password retrieves her

15

Server

Integrity- verify computation result

- proof π that shows knowledge of the process

- Server should know all the computation steps

π

data

Verify the Solution: SNARK

Page 16: CRYPTOGRAPHY - École Normale Supérieurenitulesc/files/slides/ESOF.pdf · 9. . . Password Protected Secret Sharing stores the secret into N servers using a password retrieves her

16

Server

Integrity- verify computation result

- proof π that shows knowledge of the process

- Server should know all the computation steps

π

data

Verify the Solution: SNARK

Existing Solutions:

[BCC+14] The hunting of the SNARK. N. Bitansky, R. Canetti, A. Chiesa, S. Goldwasser, H. Lin, A. Rubinstein, E. Tromer.

[GGPR13] Quadratic span programs and succinct NIZKs without PCPs. R. Gennaro, C. Gentry, B. Parno, M. Raykova

Page 17: CRYPTOGRAPHY - École Normale Supérieurenitulesc/files/slides/ESOF.pdf · 9. . . Password Protected Secret Sharing stores the secret into N servers using a password retrieves her

17

Server

Integrity

what if Server receives part of

the knowledge from outside?

π

data

OSNARK: Prove with Black-box Access

Page 18: CRYPTOGRAPHY - École Normale Supérieurenitulesc/files/slides/ESOF.pdf · 9. . . Password Protected Secret Sharing stores the secret into N servers using a password retrieves her

18

Server

Integrity

what if Server receives part of

the knowledge from outside?

π

data

OSNARK: Prove with Black-box Access

[FN16] On the (In)security of SNARKs in the Presence of OraclesDario Fiore, Anca Nitulescu.

Page 19: CRYPTOGRAPHY - École Normale Supérieurenitulesc/files/slides/ESOF.pdf · 9. . . Password Protected Secret Sharing stores the secret into N servers using a password retrieves her

Quantum Adversaries

19

Server

Post-Quantum Integrity

Proofs resistant to quantum attacks

π

data

Page 20: CRYPTOGRAPHY - École Normale Supérieurenitulesc/files/slides/ESOF.pdf · 9. . . Password Protected Secret Sharing stores the secret into N servers using a password retrieves her

Quantum Adversaries

20

Server

Post-Quantum Integrity

Proofs resistant to quantum attacks

π

data

[GMNO18] Lattice-Based zk-SNARKs from Square Span ProgramsJoint work with Rosario Gennaro, Michele Minelli, Michele Orrù

Page 21: CRYPTOGRAPHY - École Normale Supérieurenitulesc/files/slides/ESOF.pdf · 9. . . Password Protected Secret Sharing stores the secret into N servers using a password retrieves her

Verifiable Computation with Privacy of Inputs

21

Confidentiality

data

Server

Page 22: CRYPTOGRAPHY - École Normale Supérieurenitulesc/files/slides/ESOF.pdf · 9. . . Password Protected Secret Sharing stores the secret into N servers using a password retrieves her

Verifiable Computation on Encrypted Data

22

Server

Apply FHE Eval

Computation Integrity

π

Page 23: CRYPTOGRAPHY - École Normale Supérieurenitulesc/files/slides/ESOF.pdf · 9. . . Password Protected Secret Sharing stores the secret into N servers using a password retrieves her

Verifiable Computation on Encrypted Data

23

Server

Apply FHE Eval

Computation Integrity

π

Page 24: CRYPTOGRAPHY - École Normale Supérieurenitulesc/files/slides/ESOF.pdf · 9. . . Password Protected Secret Sharing stores the secret into N servers using a password retrieves her

Verifiable Computation on Encrypted Data

24

Server

Apply FHE Eval

Computation Integrity

π

Anonymous Submission: Dedicated SNARK: Better efficiency than applying existing solutions