Transcript
Page 1: Extractable  Functions Fiction or Reality?

EXTRACTABLE FUNCTIONSFICTION OR REALITY?

Nir Bitansky (TAU) Ran Canetti (BU & TAU)

Omer Paneth (BU) Alon Rosen (IDC)

Page 2: Extractable  Functions Fiction or Reality?

2

Knowledge is Elusive (assuming )

Knowing isnโ€™t like knowing

Knowing isnโ€™t like knowing

Knowing how to prove isnโ€™t like knowing

Page 3: Extractable  Functions Fiction or Reality?

3

ZK Proofs of KnowledgeGoldwasser-Micali-Rackoff, Feige-Shamir, Goldreich-Bellare

efficientextractor

๐’ฑ๐’ซโˆ—

๐‘คโˆˆ๐‘น๐‘ณ(๐‘ฅ )

๐‘ฅ

๐‘Ž๐‘๐‘๐‘’๐‘๐‘ก

Page 4: Extractable  Functions Fiction or Reality?

4

Effective Knowledge

=what can be

efficiently extractedfrom the adversary

Page 5: Extractable  Functions Fiction or Reality?

5

Extraction is Essential to Cryptographic Analysis

Composition

Input Independence in MPC

ZK simulation (the trapdoor paradigm)

โ‹ฎ

โ‹ฎ

Page 6: Extractable  Functions Fiction or Reality?

6

How is Knowledge Extracted?

Page 7: Extractable  Functions Fiction or Reality?

7

The Black-Box Tradition (aka Rewinding)

extractor

๐ด

Page 8: Extractable  Functions Fiction or Reality?

8

extractor

๐ด

reduction/simulator

Black-Box (Turing) Reductions/Simulators

Page 9: Extractable  Functions Fiction or Reality?

9

Using The Adversaryโ€™s Code

Aextractor

reduction/simulator

Page 10: Extractable  Functions Fiction or Reality?

10

The Black-Box Barrier

Black-Box

SNARGs for NP(Succinct Non-Interactive Arguments)

Gentry-Wichs

3-ZKGoldreich-Krawczyk

O(1)-public-coin-ZKGoldreich-Krawczyk

most of cryptoas we know it!

Non-Black-Box

Page 11: Extractable  Functions Fiction or Reality?

11

Beyond the Barrier

-round public-coin ZKwith

non-black-box simulation

Barak

Page 12: Extractable  Functions Fiction or Reality?

12

Post Barak

SNARGs3-ZK

O(1)-public-coin-ZKBarak

resettably-sound-ZKBarak-Goldreich-Goldwasser-Lindell

simultaneously-resettable-ZKDeng-Goyal-Sahai

O(1)-covert-MPCGoyal-Jain

(uniform) O(1)-concurrent-ZKChung-Lin-Pass

interaction

โ€ฆ

Page 13: Extractable  Functions Fiction or Reality?

13

Knowledge Assumptionsand

Extractable Functions

Page 14: Extractable  Functions Fiction or Reality?

14

Damgรฅrdโ€™s Knowledge of Exponent Assumption

Page 15: Extractable  Functions Fiction or Reality?

15

๐ด

Damgรฅrdโ€™s Knowledge of Exponent Assumption

๐‘”๐‘ฅ , h๐‘ฅ๐‘” , h๐‘” , hโ†๐บโˆ—

๐‘ฅ

Page 16: Extractable  Functions Fiction or Reality?

16

๐‘”h

๐‘”2๐‘”3โ€ฆ

h2

h3

โ‹ฎ

is -sparse

Page 17: Extractable  Functions Fiction or Reality?

17

๐ด

Damgรฅrdโ€™s Knowledge of Exponent Assumption

efficientextractor ๐‘ฅ

๐‘”๐‘ฅ , h๐‘ฅ๐‘” , h๐‘” , hโ†๐บโˆ—

๐ด

๐‘ฅ

Page 18: Extractable  Functions Fiction or Reality?

18

Extractable FunctionsCanetti-Dakdouk

Page 19: Extractable  Functions Fiction or Reality?

19

efficientextractor

๐‘˜

Extractable FunctionsCanetti-Dakdouk

๐‘“ ๐‘˜(๐‘ฅ)

๐‘ฅ โ€ฒ๐‘“ ๐‘˜ (๐‘ฅโ€ฒ )= ๐‘“ ๐‘˜(๐‘ฅ)

OWFCRH

COM

๐ด

๐ด

Page 20: Extractable  Functions Fiction or Reality?

21

Black-Box Extraction is Impossible

Page 21: Extractable  Functions Fiction or Reality?

22

Black-Box Extraction is Impossible

efficientextractor

๐ด

black-box extractor must invert the one-way

๐‘˜ ๐‘“ ๐‘˜(๐‘ฅ)

๐‘˜ โ€ฒ ๐‘“ ๐‘˜โ€ฒ (๐‘ƒ๐‘…๐น ๐‘ (๐‘˜

โ€ฒ))

Page 22: Extractable  Functions Fiction or Reality?

23

Extractable Functionsin Non-Interactive Applications

O(1)-concurrent ZK*assuming concurrent extraction

3-ZK

KEAEOWF

B-Canetti-Chiesa-Goldwasser-Lin-

Rubinstein-Tromer

Hada-Tanaka,Micali-Lepinski*,Bellare-Palacio

BCCGLRT

Canetti-Dakdouk Damgard

Gupta-Sahai

Page 23: Extractable  Functions Fiction or Reality?

24

Extractable Functionsin Non-Interactive Applications

O(1)-concurrent ZK*assuming concurrent extraction

3-ZK

SNARKs (NP)

KEAEOWF ECRH

publicly verifiable

privatelyverifiable

Mie, DiCrescenzo

-Lipmaa*

Damgard BCCGLRT,Damgard-

Faust-Hazay

Groth,Lipmaa,B-Canetti-Chiesa-Tromer,Gennaro-Gentry-Parno-

Raykiova, B-Chiesa-Ishai-Ostrovsky-Paneth

BCCGLRT,DFH

Page 24: Extractable  Functions Fiction or Reality?

25

Extractable Functionsin Non-Interactive Applications

O(1)-concurrent ZK*assuming concurrent extraction

3-ZK

SNARKs (NP)

KEAEOWF ECRH

publicly verifiable

privatelyverifiable

proof-carrying data

delegation

targeted-malleabilitysuccinct keysin functional

enc/sig

Page 25: Extractable  Functions Fiction or Reality?

27

Example: 3-ZK

Page 26: Extractable  Functions Fiction or Reality?

28

The Feige-Shamir Protocol

๐‘‰๐‘ขโ†๐‘ˆ

๐‘ƒ๐‘“ (๐‘ข)

๐‘ฅ ,๐‘ค ๐‘ฅ

witness-hidingproof of knowing

witness-indistinguishable proof of knowing

Page 27: Extractable  Functions Fiction or Reality?

30

The Feige-Shamir Protocol

๐‘‰๐‘ขโ†๐‘ˆ

๐‘ƒ๐‘ฅ ,๐‘ค ๐‘ฅ

witness-indistinguishable proof of knowing

``interactively-extractableโ€

Page 28: Extractable  Functions Fiction or Reality?

31

3-ZK from EOWFsB-Goldwasser-Canetti-Chiesa-Lin-Rubinstein-Tromer

๐‘‰๐‘ขโ†๐‘ˆ

๐‘ƒ๐‘ฅ ,๐‘ค ๐‘ฅ

witness-indistinguishable proof of knowing

``interactively-extractableโ€

Page 29: Extractable  Functions Fiction or Reality?

32

๐‘‰๐‘ขโ†๐‘ˆ

๐‘ƒ๐‘ฅ ,๐‘ค ๐‘ฅ

witness-indistinguishable proof of knowing

๐‘˜

EOWF

+๐‘Š ๐ผ 1

+๐‘Š ๐ผ 2

๐‘˜โ†๐พ

3-ZK from EOWFsB-Goldwasser-Canetti-Chiesa-Lin-Rubinstein-Tromer

Page 30: Extractable  Functions Fiction or Reality?

33

Do Extractable Functions Really Exist?

Whatโ€™s Beyond Knowledge Assumptions?

Can We Construct Explicit Extractors?

Page 31: Extractable  Functions Fiction or Reality?

34

Auxiliary Information

Page 32: Extractable  Functions Fiction or Reality?

35

Auxiliary Information

efficientextractor

๐‘˜๐‘“ ๐‘˜(๐‘ฅ)

๐‘ฅ โ€ฒ๐ด

๐ด

๐‘ง

Page 33: Extractable  Functions Fiction or Reality?

36

๐‘‰๐‘ขโ†๐‘ˆ

๐‘ƒ๐‘ฅ ,๐‘ค ๐‘ฅ

witness-indistinguishable proof of knowing

๐‘˜

EOWF

+๐‘Š ๐ผ 1

+๐‘Š ๐ผ 2

A.I.

๐‘˜โ†๐พ

Page 34: Extractable  Functions Fiction or Reality?

37

Common Auxiliary Information

efficientextractor

๐‘˜๐‘“ ๐‘˜(๐‘ฅ)

๐‘ฅ โ€ฒ๐ด

๐ด

๐‘ง โˆ€ ๐ดโˆƒ ๐ธโˆ€ ๐‘ง

Page 35: Extractable  Functions Fiction or Reality?

38

Common A.I. EOWFs vs obfuscationHada-Tanaka, Goldreich

efficientextractor

๐‘ง=ยฟ ๐ด

๐‘˜ ๐ด ๐‘“ ๐‘˜(๐‘ฅ)

may be โ€œobfuscatedโ€

Page 36: Extractable  Functions Fiction or Reality?

39

Individual Auxiliary Information

efficientextractor

๐‘˜๐‘“ ๐‘˜(๐‘ฅ)

๐‘ฅ โ€ฒ๐ด

๐ด

๐‘ง๐‘ง โ€ฒโ‰  โˆ€ ๐ดโˆƒ ๐ธโˆ€ ๐‘งโˆƒ๐‘ง โ€ฒ

Page 37: Extractable  Functions Fiction or Reality?

40

Individual Auxiliary Information

๐‘˜๐‘“ ๐‘˜(๐‘ฅ)

๐‘ฅ โ€ฒ

โ€ฆโ€ฆ

โ€ฆ

๐ด

โ€ฆโ€ฆ

โ€ฆ

๐ธโ€ฆโ€ฆ

โˆ€ ๐ดโˆƒ ๐ธ

Page 38: Extractable  Functions Fiction or Reality?

41

๐‘‰๐‘ขโ†๐‘ˆ

๐‘ƒ๐‘ฅ ,๐‘ค ๐‘ฅ

witness-indistinguishable proof of knowing

๐‘˜

EOWF

+๐‘Š ๐ผ 1

+๐‘Š ๐ผ 2

canโ€™t fixin advance

Is Individual A.I. Enough?

๐‘˜โ†๐พ

Page 39: Extractable  Functions Fiction or Reality?

43

Some Answers

Page 40: Extractable  Functions Fiction or Reality?

44

impossible possibleopen

EOWFswith common A.I.

indistinguishabilityobfuscation

efficientextractor

๐ด

๐‘ง

uniform EOWFswith no A.I.

efficientextractor

๐ด

๐‘งexplicit

Page 41: Extractable  Functions Fiction or Reality?

45

impossible possibleopen

EOWFswith common A.I.

indistinguishabilityobfuscation

efficientextractor

๐ด

๐‘ง

efficientextractor

๐ด

EOWFswith bounded A.I.

|๐‘ง|<๐ต(๐‘›)explicit

Page 42: Extractable  Functions Fiction or Reality?

46

impossible possibleopen

EOWFs withcommon unbounded A.I.

indistinguishabilityobfuscation

efficientextractor

๐ด

EOWFswith bounded A.I.

efficientextractor

๐ด

|๐‘ง|<ยฟ ๐‘“ (๐‘ฅ )โˆจยฟ|๐‘ง|>ยฟ ๐‘“ (๐‘ฅ )โˆจยฟ explicit

NIUA for (SNARGs for P,

P-certificates Chung-Lin-Pass)

Page 43: Extractable  Functions Fiction or Reality?

47

impossible possibleopen

indistinguishabilityobfuscation

privโ€™-verโ€™ SNARGs for PKalai-Raz-Rothblum:

subexp-PIR (e.g., LWE)

efficientextractor

๐ด

privately-verifiable Generalized EOWFs

with bounded A.I.

efficientextractor

๐ด

|๐‘ง|<ยฟ ๐‘“ (๐‘ฅ )โˆจยฟ|๐‘ง|>ยฟ ๐‘“ (๐‘ฅ )โˆจยฟ

EOWFs withcommon unbounded A.I.

Page 44: Extractable  Functions Fiction or Reality?

48

impossible possibleopen

indistinguishabilityobfuscation

privโ€™-verโ€™ SNARGs for PKalai-Raz-Rothblum:

subexp-PIR (e.g., LWE)

efficientextractor

๐ด

privately-verifiable Generalized EOWFs

with bounded A.I.

efficientextractor

๐ด

|๐‘ง|<ยฟ ๐‘“ (๐‘ฅ )โˆจยฟ|๐‘ง|>ยฟ ๐‘“ (๐‘ฅ )โˆจยฟ

privately-verifiable Generalized EOWFs

common (unbounded) A.I.

Page 45: Extractable  Functions Fiction or Reality?

49

impossible possibleopen

indistinguishabilityobfuscation

privโ€™-verโ€™ SNARGs for PKalai-Raz-Rothblum:

subexp-PIR (e.g., LWE)

efficientextractor

๐ด

privately-verifiable Generalized EOWFs

with bounded A.I.

|๐‘ง|>ยฟ ๐‘“ (๐‘ฅ )โˆจยฟ

privately-verifiable Generalized EOWFs

common (unbounded) A.I.

3-ZK ArgOK2-ZK Arg

bounded A.I. verifiers

Page 46: Extractable  Functions Fiction or Reality?

50

impossible possibleopen

efficientextractor

๐ด

efficientextractor

๐ด

|๐‘ง|<ยฟ ๐‘“ (๐‘ฅ )โˆจยฟ|๐‘ง|>ยฟ ๐‘“ (๐‘ฅ )โˆจยฟ

efficientextractor

๐ด

๐‘งโ‰  ๐‘ง โ€ฒ

EOWFswith (unbounded)

individual A.I.

Page 47: Extractable  Functions Fiction or Reality?

51

Ideas

Page 48: Extractable  Functions Fiction or Reality?

52

Common A.I. Extractionvs.

Indistinguishability Obfuscation

Page 49: Extractable  Functions Fiction or Reality?

53

The Universal Adversary

efficientextractor

๐‘ง=ยฟ ๐ด

๐‘˜ ๐ด ๐‘“ ๐‘˜(๐‘ฅ)

Page 50: Extractable  Functions Fiction or Reality?

54

The Universal Adversary

efficientextractor

๐‘ง=ยฟ

๐‘˜ ๐ด ๐‘“ ๐‘˜(๐‘ฅ)

may be โ€œobfuscatedโ€

Kd87x*$S49d6##nasdil&&KmwLPes6Vd#@,lLSfs03K(#talkem,;eHLSOLKd87x*$S49d6##nasdil&&KmwLPes6Vd#@,lLSfs03K(#talkem,;eHLSOL

Page 51: Extractable  Functions Fiction or Reality?

55

The Universal Adversary

efficientextractor

๐‘˜ ๐‘“ ๐‘˜(๐‘ฅ)Kd87x*$S49d6##nasdil&&KmwLPes6Vd#@,lLSfs03K(#talkem,;eHLSOL

๐ด

Page 52: Extractable  Functions Fiction or Reality?

56

Black-Box Extraction is Impossible

efficientextractor

๐ด

black-box extractor must invert the one-way

๐‘˜ ๐‘“ ๐‘˜(๐‘ฅ)

๐‘˜ โ€ฒ ๐‘“ ๐‘˜โ€ฒ (๐‘ƒ๐‘…๐น ๐‘ (๐‘˜

โ€ฒ))

Page 53: Extractable  Functions Fiction or Reality?

57

The Universal Adversary

efficientextractor

๐‘˜ ๐‘“ ๐‘˜(๐‘ฅ)Kd87x*$S49d6##nasdil&&KmwLPes6Vd#@,lLSfs03K(#talkem,;eHLSOL

๐ด๐‘ 

Page 54: Extractable  Functions Fiction or Reality?

58

What Kind of Obfuscation?

๐ด๐‘ 

Kd87x*$S49d6##nasdil&&KmwLPes6Vd#@,lLSfs03K(#talkem,;eHLSOL?

Evidence that VBB obfuscation of is impossible(it is pseudo-entropic)

Goldwasser-Kalai, B-Canetti-Paneth-Rosen

Need to hide PRF value only on the particular point (out of Extโ€™s control) โ€“ use Sahai-Waters puncturing

Page 55: Extractable  Functions Fiction or Reality?

59

What Kind of Obfuscation?

๐ด๐‘ 

Kd87x*$S49d6##nasdil&&KmwLPes6Vd#@,lLSfs03K(#talkem,;eHLSOL?

Evidence that VBB obfuscation of is impossible(it is pseudo-entropic)

Goldwasser-Kalai, B-Canetti-Paneth-Rosen

Need to hide PRF value only on the particular point (out of Extโ€™s control) โ€“ use Sahai-Waters puncturing

Page 56: Extractable  Functions Fiction or Reality?

60

What Kind of Obfuscation?

๐ด๐‘ 

Kd87x*$S49d6##nasdil&&KmwLPes6Vd#@,lLSfs03K(#talkem,;eHLSOL?

Evidence that VBB obfuscation of is impossible(it is pseudo-entropic)

Goldwasser-Kalai, B-Canetti-Paneth-Rosen

Need to hide PRF value only on the particular point (out of Extโ€™s control) โ€“ use Sahai-Waters puncturing

A.I. depends on โ€“ but, with IndObf looks as if it doesnโ€™t

Page 57: Extractable  Functions Fiction or Reality?

61

Extractable One-Way Functionsw.r.t Bounded A.I.

Page 58: Extractable  Functions Fiction or Reality?

62

efficientextractor

๐‘˜ ๐‘“ ๐‘˜(๐‘ฅ)๐ด

If You Canโ€™t Extract Whatโ€™s inside the Head,

Extract the Head [Barak]

๐ด

Page 59: Extractable  Functions Fiction or Reality?

63

First Attempt

๐‘“ (๐‘– , ๐‘ )

Goal: keyless

parsed as a machinewith output bits

normal branch trapdoor branch

Ingredient:

๐‘–โ‰ 0๐‘› ๐‘–=0๐‘›

๐‘ƒ๐‘…๐บ (๐‘  ) ๐‘ (1๐‘›)

Page 60: Extractable  Functions Fiction or Reality?

65

Extractability

๐‘ฆโˆˆ {0 ,1 }2๐‘›๐ด(๐‘ง , โ‹…)1๐‘›

โ‰ค๐‘›

efficientextractor

๐ด(๐‘ง , โ‹…)0๐‘› ,

๐‘“

๐‘“ (๐‘– , ๐‘ )๐‘–โ‰ 0๐‘› ๐‘–=0๐‘›

๐‘ƒ๐‘…๐บ (๐‘  ) ๐‘ (1๐‘›)

Page 61: Extractable  Functions Fiction or Reality?

66

One-Wayness

For :

Inverter finds s.t But a.s. has Kolmogorov complexity

๐‘“ (๐‘– , ๐‘ )๐‘–โ‰ 0๐‘› ๐‘–=0๐‘›

๐‘ƒ๐‘…๐บ (๐‘  ) ๐‘ (1๐‘›)

Page 62: Extractable  Functions Fiction or Reality?

67

not bounded by any polynomial

Barak ZK: solved by interactive universal arguments for non-deterministic computations Barak-Lindell-Vadhan ZK: solved assuming non-interactive universal argumentsfor non-deterministic computations (Micaliโ€™s CS proofs)

Problem

๐‘“ (๐‘– , ๐‘ )๐‘–โ‰ 0๐‘› ๐‘–=0๐‘›

๐‘ƒ๐‘…๐บ (๐‘  ) ๐‘ (1๐‘›)

Page 63: Extractable  Functions Fiction or Reality?

68

NIUAs for Deterministic Computations

๐‘ƒ ๐‘‰

๐บ๐œŽ

๐œ‹

= โ€œ outputs after stepsโ€

referencestring

poly ยฟ poly ยฟ

๐œŽ

Page 64: Extractable  Functions Fiction or Reality?

69

๐‘“ (๐‘– , ๐‘  ,๐‘Ÿ ,๐œ‹โˆ— , ๐‘ฆ โˆ— ,๐œŽโˆ—)

Instead of running , the trapdoor branch verifies a proof that

out:

if is a valid proofthat w.r.t out:

๐‘–โ‰ 0๐‘› ๐‘–=0๐‘›

One-wayness: maintained by the soundness of the NIUA.

Extraction: given the code of , compute a proof for

EOWFs from NIUAs

Page 65: Extractable  Functions Fiction or Reality?

70

๐‘“ (๐‘– , ๐‘  ,๐‘Ÿ ,๐œ‹โˆ— , ๐‘ฆ โˆ— ,๐œŽโˆ—)

Instead of running , the trapdoor branch verifies a proof that

out:

if is a valid proofthat w.r.t out:

๐‘–โ‰ 0๐‘› ๐‘–=0๐‘›

One-wayness: maintained by the soundness of the NIUA.

Extraction: given the code of , compute a proof for

EOWFs from NIUAs

relies on public-verifiability(soundness holds in presence of verification key )

Page 66: Extractable  Functions Fiction or Reality?

71

Generalized EOWFs from privately-verifiable NIUAs

๐‘… ( ๐‘“ (๐‘ฅ ) ,๐‘ฅ โ€ฒ )

Hardness: given where hard to find

Extractabilitygiven code that outputs ,

can extract

Private-verification: can be computed given the private

Public-verification: can be effโ€™ computed by anyone

Can be constructed from subexp LWE [Kalai-Raz-Rothblum]Sufficient for 2/3-ZK

Page 67: Extractable  Functions Fiction or Reality?

73

impossible possibleopen

Open Questions

Construct a (uniform) ECRH

EOWFs w.r.t individual auxiliary information

EOWFs w.r.t to common โ€œbenignโ€ distributions

Page 68: Extractable  Functions Fiction or Reality?

74


Top Related