Introduction to the Bounded-Retrieval Model - PowerPoint PPT Presentation

1 / 42
About This Presentation
Title:

Introduction to the Bounded-Retrieval Model

Description:

Title: On Forward-Secure Storage Author: Stefan Dziembowski Last modified by: utente10 Created Date: 8/15/2006 5:07:49 PM Document presentation format – PowerPoint PPT presentation

Number of Views:73
Avg rating:3.0/5.0
Slides: 43
Provided by: Stefan243
Category:

less

Transcript and Presenter's Notes

Title: Introduction to the Bounded-Retrieval Model


1
Introduction to the Bounded-Retrieval Model
  • Stefan Dziembowski

University of Rome La Sapienza
Warsaw University
2
The main idea
  • Bounded-Retrieval Model
  • Construct cryptographic protocols where
  • the secrets are so large that they cannot be
    efficiently stolen.
  • D. Dagon, W. Lee, R. J. Lipton
  • Protecting Secret Data from Insider Attacks.
  • Financial Cryptography 2005
  • G. Di Crescenzo, R. Lipton and S. Walfish
  • Perfectly Secure Password Protocols in the
    Bounded Retrieval Model
  • TCC 2006
  • S. Dziembowski
  • Intrusion-Resilience via the Bounded-Storage
    Model
  • TCC 2006
  • Perfectly Secure Password Protocols in the
    Bounded Retrieval Model
  • D. Cash, Y. Z. Ding, Y. Dodis, W. Lee, R. Lipton
    and S. Walfish

3
Plan
  • Introduction to the Bounded Retrieval Model
  • Motivation
  • An entity-authentication protocol
  • Connections to the BSM
  • Forward-Secure Storage

4
The problem
  • Computers can be infected by mallware!
  • The virus can
  • take control over the machine,
  • steal some secrets stored on the machine.
  • Can we run any crypto on such machines?

5
Is there any remedy?
  • If

the virus can download all the data stored on
the machine
then
the situation looks hopeless.
Assume that he cannot do it!
Idea
6
The general model
no virus
no virus
no virus
The total amount of retrieved data is bounded!
7
Our goal
  • Try to preserve as much security as possible
    (assuming the scenario from the previous slide).

Of course
as long as the virus is controlling the machine
nothing can be done.
Therefore
we care about the periods when the machine is
free of viruses.
8
Two variants
How does the virus decide what the retrieve?
Variant 1 D06a,D06b,CDDLLW07 He can compute
whatever he wants on the victims machine.
Variant 2 CLW06, He can only access some
individual bits on the victims machine (slow
memory)
9
Practicality?
10
An example entity authentication
the user
11
Entity authentication the solution
key R
00011010011101001001101011100111011111101001110101
010101001001010011110000100111111110001010
verifies
example of f Yy1,,ym is a set of indices in
R f(Y,(R1,,Rt)) (Ry1,,Rym)

y1
y2
ym
00011010011101001001101011100111011111101001110101
010101001001010011110000100111111110001010
12
Security of the authentication protocol
Theorem D06,CDDLLW07
The adversary that retrieved a constant
fraction of R does is not able to impersonate the
user.
(This of course holds in the periods when the
virus is not on the machine.)
13
A related concept the Bounded Storage Model
  • This is related to the Bounded Storage Model
    (BSM) Maurer 1992
  • In the BSM the security of the protocols is based
    on the assumption that one can broadcast more
    bits than the adversary can store.
  • In the BSM the computing power of the adversary
    may be unlimited.

14
The Bounded-Storage Model (BSM) an introduction
short initial key K
randomizer disappears
knows Uh(R)
Eve shouldnt be able to distinguish X from
random
X ?
15
How is BSM related to our model?
  • Seems that the assumptions are oposite

transmission storage
BSM cheap expensive
LCM expensive cheap
16
BSM vs. BRM
Bounded-Storage Model
R comes from a satellite
stored value U
Bounded-Retrieval Model
R is stored on a computer
retrieved value U
17
Consider again the authentication protocol
verifies
Observation
In the authentication protocol one could use a
BSM-secure function f.
18
Overview of the results
  • An entity authentication protocol
  • A session-key exchange protocol
  • in the Random Oracle Model D06a
  • in the plain model CDDLLW07
  • Forward Secure Storage D06b an encryption
    scheme secure in the BRM

19
Plan
  • Forward-Secure Storage
  • IT-secure
  • computationally-secure
  • a scheme with a conjectured hybrid security
  • Connections with the theory of Harnik and Naor

20
Forward Secure Storage (FSS) - the motivation
  • One of the following happens 
  • The key K leaks to the adversary
  • or
  • The adversary breaks the scheme

key K
message M
C E(K,M)
installs a virus
C
retrieves C
The adversary can compute M
21
The idea
  • Design an encryption scheme such that
  • the ciphertext C is so large that the
  • adversary cannot retrieve it completely

message M
ciphertext CEncr(K,M)
22
Forward-Secure Storage a more detailed view
  • The adversary to compute an arbitrary function h
    of C.

length t
ciphertext CEncr(K,M)
function h
retrieved value Uh(C)
length s ltlt t
K
M ?
23
Computational power of the adversary
  • We consider the following variants
  • computational the adversary is limited to
    poly-time
  • information-theoretic the adversary is
    infinitely-powerful
  • hybrid the adversary gains infinite power after
    he computed the function h.This models the fact
    that the in the future the current cryptosystems
    may be broken!

24
Information-theoretic solution a wrong idea
f secure in the BSM
key
f(
)
,
K
R

X
M
message
xor
Y
ciphertextin the BSMencryption
ciphertext (R,Y)
Shannon theorem
this cannot work!
25
What exactly goes wrong?
  • Suppose the adversary has some information about
    M.
  • He can see
  • (R, f(K,R) xor M ).
  • So, he can solve (for K) the equation
  • W f(K,R) xor M.
  • If he has enough information about M, and K is
    short, he will succed!
  • Idea Blind the message M!

denote it W
26
A better idea
key is a pair (K,Z)
f(
)
,
K
R

X
Z
M
message
xor
Y
ciphertext (R,Y)
27
Why does it work?
  • Intuition
  • The adversary can compute any function h of 
  • Y is of no use for him, since it is xor-ed with a
    random string Z! 
  • So if this FSS scheme can be broken then also the
    BSM function f can be broken 
  • (by an adversary that uses the same amount of
    memory).

R
Y f(K,R) xor M xor Z
28
Problem with the information-theoretic scheme
  • The secret key needs to be larger than the
    message!
  • What if we want the key to be shorter?
  • We need to switch to the computational setting...

29
Computational FSS (with a short key)
  • (Encr,Decr) an IT-secure FSS
  • (E,D) a standard encryption scheme

Encr1(
)
,
K
M
Encr(
)
,
K
K
E(
)
,
K
M
K is a random key for the standard encryption
scheme
Intuition when the adversary learns K he has no
idea about K and therefore no idea about M.
30
Hybrid security
  • What about the hybrid security?
  • Recall the scenario

ciphertext CEncr(K,M)
h
retrieved value Uh(C)
M ?
31
Is this scheme secure in the hybrid model?
Encr(
)
,
K
K
E(
)
,
K
M
  • The adversary retrives only the second part! 
  • Later, when she gets infinite computing  power,
    she can recover the message M! 
  • Thus, the scheme is not secure in the  hybrid
    model!

32
A scheme (Encr2,Decr2)
  • Does there exist an FSS scheme with hybrid
    security (and a short key)?
  • Idea Generate K pseudorandomly!
  • (Encr,Decr) an IT-secure FSS
  • G a cryptographic PRG

)
Encr2(
,
K
M
Encr(
)
,
G(K)
M
33
Is the scheme from the previous slide secure?
  • It cannot be IT-secure, but is it
  • computationally-secure?
  • secure in the hybrid model?
  • We leave it as an open problem. Looks secure...
  • We can show the following
  • Very informally,

it is secure if one-way functions cannot be used
to construct Oblivious Transfer.
34
Computational security of Encr2 (1/2)
We show that if
  • there exists an adversary A
  • that breaks the (Encr2,Decr2) scheme

then
  • one can construct an Oblivious Transfer protocol
    with
  • an unconditional privacy of the Sender
  • privacy of the Receiver based on the security of
    the PRG G.

35
Computational security of Encr2 (2/2)
  • Simplification assume that M 1 and the
    adversary can guess it with probability 1.
  • We construct an honest-but-curious Rabin OT.

sender input M
receiver
A computationally-limited sender cannot
distinguish these cases!
K
Encr(X,M)
U - memory of the adversary
If X is random then the receiver learns nothing
about M (this follows from the IT-security of
Encr)!
M
36
How to interpret this result?
  • Which PRGs G are safe to use in this protocol?
  • In some sense those that cannot be used to
    construct OT.
  • But maybe there exist wrong PRGs...
  • (see S. Dziembowski and U. Maurer
  • On Generating the Initial Key in the
    Bounded-Storage Model, EUROCRYPT '04)

37
Hybrid security of Encr2
  • The argument for the hybrid security is slightly
    weaker.
  • We can construct only an OT-protocol with a
    computationally-unbounded algorithm for the
    Receiver...
  • This is because the receiver has to simulate an
    unbounded adversary.

receiver
38
Summary
ITsecurity hybrid security comp. security
the first scheme secure secure secure
the second scheme notsecure notsecure secure
the third scheme notsecure maybesecure maybesecure
39
A complexity-theoretic view
  • Suppose the adversary wants to know if a given C
    is a ciphertext of some message M.
  • NP-language
  • L C there exists K such that C Encr(K,M).

standard encryption
FSS
Can we compress C to some U, s.t. U ltlt C so
that later we can decide if C is in L basing on
U, and using infinite computing power?
is C in L?
40
The theory of Harnik and Naor
  • This question was recently studied in
  • Danny Harnik, Moni Naor
  • On the Compressibility of NP Instances and
  • Cryptographic Applications
  • FOCS 2006
  • See also
  • Bella Dubrov, Yuval Ishai
  • On the Randomness Complexity of Efficient
    Sampling
  • STOC 2006

41
Compressibility of NP Instances
  • Informally, an NP language L is compressible if
    there exists an efficient algorithm that
  • compresses every string X to a shorter string U,
  • in such a way that an infinitely-powerful solver
    can decide
  • if X is in L basing only on U.

Proving that some language is incompressible (from
standard assumptions) is an open problem. .
This is why showing an FSS scheme provably-secure
in the hybrid model may be hard!
42
Thanks!
Write a Comment
User Comments (0)
About PowerShow.com