25
Authenticating Computation on Groups: New Homomorphic Primitives and Applications Dario Catalano Università di Catania Antonio Marcedone Cornell University Orazio Puglisi Università di Catania 1

Authenticating Computation on Groups: New Homomorphic ...€¦ · (Calculus , Alice, 30) (Algebra, Alice, 28) (Calculus , Bob, 28) Delegating Computation on Authenticated Data What

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Authenticating Computation on Groups: New Homomorphic ...€¦ · (Calculus , Alice, 30) (Algebra, Alice, 28) (Calculus , Bob, 28) Delegating Computation on Authenticated Data What

Authenticating Computation on Groups: New Homomorphic Primitives and

Applications

Dario Catalano Università di Catania

Antonio Marcedone Cornell University

Orazio Puglisi Università di Catania

1

Page 2: Authenticating Computation on Groups: New Homomorphic ...€¦ · (Calculus , Alice, 30) (Algebra, Alice, 28) (Calculus , Bob, 28) Delegating Computation on Authenticated Data What

Outline

Delegating computation on authenticated data Motivating example Linearly Homomorphic Signature Authenticated Encryption

Linearly Homomorphic Authenticated Encryption with Public Verifiability (LAEPuV) Definition and security Generic Construction outline and Instantiation

Other results

Authenticaticating Computation on Groups: New Primitives and Applications

2

Page 3: Authenticating Computation on Groups: New Homomorphic ...€¦ · (Calculus , Alice, 30) (Algebra, Alice, 28) (Calculus , Bob, 28) Delegating Computation on Authenticated Data What

Authenticaticating Computation on Groups: New Primitives and Applications

3

Delegating Computation on Authenticated Data

(Calculus , Alice, 30)

(Algebra, Alice, 28)

(Calculus , Bob, 28)

Page 4: Authenticating Computation on Groups: New Homomorphic ...€¦ · (Calculus , Alice, 30) (Algebra, Alice, 28) (Calculus , Bob, 28) Delegating Computation on Authenticated Data What

Delegating Computation on Authenticated Data

What is the grade of Alice in Calculus?

The Grade of Alice in Calculus is 30

Authenticaticating Computation on Groups: New Primitives and Applications

4

Page 5: Authenticating Computation on Groups: New Homomorphic ...€¦ · (Calculus , Alice, 30) (Algebra, Alice, 28) (Calculus , Bob, 28) Delegating Computation on Authenticated Data What

Delegating Computation on Authenticated Data

What is the average grade in Calculus?

The average grade in Calculus is 29

Authenticaticating Computation on Groups: New Primitives and Applications

5

Page 6: Authenticating Computation on Groups: New Homomorphic ...€¦ · (Calculus , Alice, 30) (Algebra, Alice, 28) (Calculus , Bob, 28) Delegating Computation on Authenticated Data What

Linearly Homomorphic Signatures (M

1,Sign(sk,M

1))

(M2,Sign(sk,M

2))

….. (M

n,Sign(sk,M

n))

COMBINE(PK,f,...)

(f(M1,...,M

n),

Sign(sk,f(M1,...,M

n))

Verification is done w.r.t. a function f:

Ver(pk, f, M, σ) The signatures must be succinct (indipendent on the

number of messages).

Authenticaticating Computation on Groups: New Primitives and Applications

6

[Desmedt93], [JMSW02], [BFKW09]

Page 7: Authenticating Computation on Groups: New Homomorphic ...€¦ · (Calculus , Alice, 30) (Algebra, Alice, 28) (Calculus , Bob, 28) Delegating Computation on Authenticated Data What

Delegating Computation on Authenticated Data

What is the average grade in Calculus?

The average grade in Calculus is 29

Authenticaticating Computation on Groups: New Primitives and Applications

7

Page 8: Authenticating Computation on Groups: New Homomorphic ...€¦ · (Calculus , Alice, 30) (Algebra, Alice, 28) (Calculus , Bob, 28) Delegating Computation on Authenticated Data What

Authenticaticating Computation on Groups: New Primitives and Applications

8

Authenticated Encryption

(Calculus , Alice, 30)

(Algebra, Alice, 28)

(Calculus , Bob, 28)

Page 9: Authenticating Computation on Groups: New Homomorphic ...€¦ · (Calculus , Alice, 30) (Algebra, Alice, 28) (Calculus , Bob, 28) Delegating Computation on Authenticated Data What

Authenticaticating Computation on Groups: New Primitives and Applications

9

Authenticated Encryption

(Calculus , Alice, 30) (Calculus , Alice, 30)

(Algebra , Alice, 28)

(Calculus , Bob, 28)

(Calculus , Alice, ##)

(Algebra , Alice, ??)

(Calculus , Bob, !!) Simmetric Cryptography Asimmetric

Cryptography

TLS – SSH – IpSec

[BelNam00]

[An01]

Page 10: Authenticating Computation on Groups: New Homomorphic ...€¦ · (Calculus , Alice, 30) (Algebra, Alice, 28) (Calculus , Bob, 28) Delegating Computation on Authenticated Data What

Authenticated Encryption

What is the grade of Alice in Calculus?

The Grade of Alice in Calculus is ##

## 30

Authenticaticating Computation on Groups: New Primitives and Applications

10

Page 11: Authenticating Computation on Groups: New Homomorphic ...€¦ · (Calculus , Alice, 30) (Algebra, Alice, 28) (Calculus , Bob, 28) Delegating Computation on Authenticated Data What

Authenticated Encryption

What is the average grade in Calculus?

The average grade in Calculus is **

Authenticaticating Computation on Groups: New Primitives and Applications

11

Page 12: Authenticating Computation on Groups: New Homomorphic ...€¦ · (Calculus , Alice, 30) (Algebra, Alice, 28) (Calculus , Bob, 28) Delegating Computation on Authenticated Data What

Delegating Computation on Authenticated Data with privacy

What is the average grade in Calculus?

The average grade in Calculus is **

** 29

## ?? **

Authenticaticating Computation on Groups: New Primitives and Applications

12

Page 13: Authenticating Computation on Groups: New Homomorphic ...€¦ · (Calculus , Alice, 30) (Algebra, Alice, 28) (Calculus , Bob, 28) Delegating Computation on Authenticated Data What

Linearly Homomorphic Authenticated Encryption with Public Verifiability

AE-KeyGen(1λ,k )→(sk, vk)

AE-Encrypt (sk, FID, i, M) → C

AE-Verify(vk, FID, C, f)→{0,1}

AE-Decrypt (sk, FID, C, f) → M or

AE-Eval(vk, f, FID, {Ci }i=1,...,k) →C

Security: LH-IND-CCA for privacy, LH-Uf-CMA for integrity Authenticaticating Computation on Groups:

New Primitives and Applications 13

Public Verifiability

Inspired by [JY14]

Page 14: Authenticating Computation on Groups: New Homomorphic ...€¦ · (Calculus , Alice, 30) (Algebra, Alice, 28) (Calculus , Bob, 28) Delegating Computation on Authenticated Data What

Authenticaticating Computation on Groups: New Primitives and Applications

14

LAEPuV - General Construction M message space, additive group R randomness space, multiplicative group

C ciphertext space, multiplicative group

Page 15: Authenticating Computation on Groups: New Homomorphic ...€¦ · (Calculus , Alice, 30) (Algebra, Alice, 28) (Calculus , Bob, 28) Delegating Computation on Authenticated Data What

Authenticaticating Computation on Groups: New Primitives and Applications

15

LAEPuV - General Construction

T IND-CPA secure

Public Key Encryption Scheme

Encpk(M1,R1)*Encpk(M2,R2)=Encpk(M1+M2,R1*R2)

M message space, additive group R randomness space, multiplicative group

C ciphertext space, multiplicative group

Page 16: Authenticating Computation on Groups: New Homomorphic ...€¦ · (Calculus , Alice, 30) (Algebra, Alice, 28) (Calculus , Bob, 28) Delegating Computation on Authenticated Data What

Authenticaticating Computation on Groups: New Primitives and Applications

16

LAEPuV - General Construction

T IND-CPA secure

Public Key Encryption Scheme

Encpk(M1,R1)*Encpk(M2,R2)=Encpk(M1+M2,R1*R2)

M message space, additive group R randomness space, multiplicative group

C ciphertext space, multiplicative group

Σ Linearly Homomorphic signature

scheme for elements in M

Page 17: Authenticating Computation on Groups: New Homomorphic ...€¦ · (Calculus , Alice, 30) (Algebra, Alice, 28) (Calculus , Bob, 28) Delegating Computation on Authenticated Data What

Authenticaticating Computation on Groups: New Primitives and Applications

17

LAEPuV - General Construction

T IND-CPA secure

Public Key Encryption Scheme

Encpk(M1,R1)*Encpk(M2,R2)=Encpk(M1+M2,R1*R2)

M message space, additive group R randomness space, multiplicative group

C ciphertext space, multiplicative group

Σ Linearly Homomorphic signature

scheme for elements in M

H Random Oracle

HK:{0,1}*→C

Page 18: Authenticating Computation on Groups: New Homomorphic ...€¦ · (Calculus , Alice, 30) (Algebra, Alice, 28) (Calculus , Bob, 28) Delegating Computation on Authenticated Data What

Authenticaticating Computation on Groups: New Primitives and Applications

18

LAEPuV – Encryption

M

ENC

C

HOM-SIGN

σ C*Enc(b)

DEC

Page 19: Authenticating Computation on Groups: New Homomorphic ...€¦ · (Calculus , Alice, 30) (Algebra, Alice, 28) (Calculus , Bob, 28) Delegating Computation on Authenticated Data What

Authenticaticating Computation on Groups: New Primitives and Applications

19

LAEPuV – Eval

σ

C

HOM-EVAL

Page 20: Authenticating Computation on Groups: New Homomorphic ...€¦ · (Calculus , Alice, 30) (Algebra, Alice, 28) (Calculus , Bob, 28) Delegating Computation on Authenticated Data What

Authenticaticating Computation on Groups: New Primitives and Applications

20

LAEPuV – Practical Instantiation

Page 21: Authenticating Computation on Groups: New Homomorphic ...€¦ · (Calculus , Alice, 30) (Algebra, Alice, 28) (Calculus , Bob, 28) Delegating Computation on Authenticated Data What

Other results (in the paper)

A Linearly homomorphic signature scheme to sign elements in (bilinear) groups

This has nice applications in the context of On-line/Off-line signatures

Authenticaticating Computation on Groups: New Primitives and Applications

21

Page 22: Authenticating Computation on Groups: New Homomorphic ...€¦ · (Calculus , Alice, 30) (Algebra, Alice, 28) (Calculus , Bob, 28) Delegating Computation on Authenticated Data What

Related works

Efficient Delegation of Computation over encrypted data [JY14], [FGP14]

Authenticaticating Computation on Groups: New Primitives and Applications

22

Page 23: Authenticating Computation on Groups: New Homomorphic ...€¦ · (Calculus , Alice, 30) (Algebra, Alice, 28) (Calculus , Bob, 28) Delegating Computation on Authenticated Data What

Authenticaticating Computation on Groups: New Primitives and Applications

23

Very efficient

General construction

Public Verifiability

Only linear functions

Needs ROM

Conclusion and Open problems

Page 24: Authenticating Computation on Groups: New Homomorphic ...€¦ · (Calculus , Alice, 30) (Algebra, Alice, 28) (Calculus , Bob, 28) Delegating Computation on Authenticated Data What

Interesting Open questions remain :

• How to extend to more general functionalities?

• How to avoid ROM?

Authenticaticating Computation on Groups: New Primitives and Applications

24

Conclusion and Open problems

Page 25: Authenticating Computation on Groups: New Homomorphic ...€¦ · (Calculus , Alice, 30) (Algebra, Alice, 28) (Calculus , Bob, 28) Delegating Computation on Authenticated Data What

Authenticaticating Computation on Groups: New Primitives and Applications

25