Download pptx - Extractable Functions

Transcript
Page 1: Extractable Functions

Extractable Functions

Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen

Page 2: Extractable Functions

Largest Known Prime

257,885,161 โˆ’ 1

Electronic Frontier Foundation offers $250,000 prize for a prime with at least a billion

digitsโ€œThe first number larger then that is not divisible

by any number other than 1 and itselfโ€

Page 3: Extractable Functions

Knowledge

Algorithm

Knowledge

Polynomial TimeExtraction Procedure

Page 4: Extractable Functions

Proofs of Knowledge

๐‘ƒ ๐‘‰๐‘ฅโˆˆโ„’

Witness Extraction Hide the Witness

Secrecy : Zero-Knowledge \ Witness indistinguishability

Goal: Extract knowledge that is not publicly available

Page 5: Extractable Functions

CCA Encryption

๐ด๐‘ƒ๐พ๐ธ๐‘›๐‘ (๐‘)

๐‘

๐ท๐‘’๐‘๐ธ๐‘›๐‘ (๐‘ฅ)

๐‘ฅ

ReductionTo CPA

Extraction๐‘ฅ

Page 6: Extractable Functions

More Knowledge

Zero-knowledge Proofs, Signatures, Non-malleable Commitments, Multi-party Computation, Obfuscation,โ€ฆ

๐ดReduction

Extraction๐‘ฅ

Page 7: Extractable Functions

How to Extract?

Algorithm

Knowledge

Extraction?

Page 8: Extractable Functions

Extraction by Interaction

Or : Black-Box Extraction

Adversary Extraction

Public Parameters

Page 9: Extractable Functions

Out of Reach Applications

๐‘ƒ ๐‘‰๐‘ƒ ๐‘‰

3-MessageZero-Knowledge

2-MessageSuccinct Argument

(SNARG)

Page 10: Extractable Functions

Out of Reach Applications

๐‘ƒ ๐‘‰๐‘ƒ ๐‘‰

[Goldreich-Krawczyk][Gentry-Wichs]

Black-Box Security Proof is Impossible

Page 11: Extractable Functions

Knowledge of Exponent

Adversary๐‘” , h๐‘”๐‘ฅ , h๐‘ฅ

๐‘ฅ Extraction

[Damgรฅrd 92]

Non-Black-Box

Extraction

Page 12: Extractable Functions

Applications of KEA

3-MessageZero-Knowledge

2-MessageSuccinct Argument

(SNARG)

Knowledge of Exponent Assumption* (KEA) *and

variants

[HT98,BP04,Mie08,G10,L12,BCCT13,GGPR13,BCIOP13]

Page 13: Extractable Functions

Extractable Functions

Adversary๐‘˜โ†$

๐‘“ ๐‘˜(๐‘ฅ)๐‘ฅ Extraction

A family of function is extractable if:

[Canetti-Dakdouk 08]

Page 14: Extractable Functions

Remarks on EF

โ€ข KEA is an example for EF.โ€ข We want EF that are also one-

way.โ€ข The image of should be

sparse.Adversary

๐‘˜โ†$

๐‘“ ๐‘˜(๐‘ฅ)๐‘ฅ Extraction

OWF, CRHF

Page 15: Extractable Functions

Applications of EF

3-MessageZero-Knowledge

2-MessageSuccinct Argument

(Privately Verifiable)

Knowledge of Exponent

Extractable One-Way Functions (EOWF)

Extractable Collision-Resistant Hash Functions (ECRH)

[BCCT12,GLR12,DFH12]

Page 16: Extractable Functions

What is missing?

โ€ข Clean assumptions โ€ข Candidatesโ€ข Strong applications

Page 17: Extractable Functions

A Reduction Using EF

๐ดReduction

๐ธ๐‘ฅ

Assuming:

๐‘˜โ†$

๐‘“ ๐‘˜(๐‘ฅ)

Page 18: Extractable Functions

Do Extractable One-Way

Functions with an Explicit Extractor

Exist?

Page 19: Extractable Functions

It depends on the Auxiliary Input.

Page 20: Extractable Functions

Example: Zero-Knowledge

๐‘ƒ ๐‘‰๐‘ฅโˆˆโ„’๐‘˜๐‘“ ๐‘˜ (๐‘ก )

๐‘ฅ

Auxiliary input

Page 21: Extractable Functions

Definition of EF with A.I.For every and auxiliary inputthere exist and auxiliary inputsuch that for every auxiliary input :

Page 22: Extractable Functions

Types of A.I.For every and auxiliary inputthere exist and auxiliary inputsuch that for every auxiliary input :

Individual \ CommonBounded \ Unbounded

Page 23: Extractable Functions

What type of A.I.

do we need?

Page 24: Extractable Functions

Example: Zero-KnowledgeZero-Knowledge:For every there exists a simulator such that for every , For need bounded A.I.For sequential composition need unbounded A.I. What you get from individual A.I.:For every and every there exists a simulator such that

Page 25: Extractable Functions

PossibleImpossible Open

EOWF* with bounded A.I.:EOWF with unbounded common A.I.:

Subexp-LWEIndistinguishability Obfuscation

Explicit ExtractorDelegation for P from Subexp-PIR[Kalai-Raz-Rothblum13]

Page 26: Extractable Functions

Generalized EOWF

EOWF* = Privately-Verifiable Generalized EOWF1. EOWF* suffices for applications of EOWF.2. The impossibility results holds also for EOWF* 3. Can remove * assuming publicly-verifiable delegation for P (P-certificates)

Page 27: Extractable Functions

Application

3-Message Zero-KnowledgeEOWF

3-Message Zero-Knowledge

For verifiers w. bounded A.I .

EOWF withbounded

A.I.

EOWF* withbounded

A.I.

โ‡’

โ‡’โ‡’

[BCCGLRT13]

Page 28: Extractable Functions

Construction

Survey

Impossibility

Page 29: Extractable Functions

Construction

EOWF* with Bounded A.I fromPrivately-Verifiable Delegation for P

EOWF with Bounded A.I fromPublicly-Verifiable Delegation for P

Page 30: Extractable Functions

First Attemptโ€ข OWF โ€ข Extraction from

(no restriction on space or running time)

โ€ข Single function - No key (impossible for unbounded A.I)

Page 31: Extractable Functions

First Attempt

๐‘“ (๐‘– , ๐‘ )=ยฟ

๐‘– ,๐‘ โˆˆ {0 ,1 }๐‘› , PRG: {0 ,1 }๐‘›โ†’ {0 ,1 }๐‘›

Page 32: Extractable Functions

First Attempt

๐‘“ (๐‘– , ๐‘ )={PRG (๐‘  )     if    ๐‘–โ‰ 0๐‘›

๐‘  (1๐‘› ) if ๐‘–=0๐‘›

๐‘– ,๐‘ โˆˆ {0 ,1 }๐‘› , PRG: {0 ,1 }๐‘›โ†’ {0 ,1 }๐‘›

Interpert as a program outputting bits

Page 33: Extractable Functions

Extraction

๐ด (1๐‘›)โ†’ ๐‘ฆ

๐‘“ (๐‘– , ๐‘ )={PRG (๐‘  )     if    ๐‘–โ‰ 0๐‘›

๐‘  (1๐‘› ) if ๐‘–=0๐‘›

๐ธ (1๐‘› )โ†’0๐‘› , ๐ด

๐‘“ (0๐‘› ,๐ด )=๐ด (1๐‘›)=๐‘ฆ

()

Page 34: Extractable Functions

One-Wayness

๐‘“ (๐‘– , ๐‘ )={PRG (๐‘  )     if    ๐‘–โ‰ 0๐‘›

๐‘  (1๐‘› ) if ๐‘–=0๐‘›

1. The image of is sparse

Page 35: Extractable Functions

Problem

is not poly-time computable!

๐‘“ (๐‘– , ๐‘ )={๐‘ƒ ๐‘…๐บ๐‘  (๐‘  )     if    ๐‘–โ‰ 0๐‘›

๐‘  (1๐‘›) if ๐‘–=0๐‘›

Solution: Delegation for P(following the protocols of

[B01,BLV03])

Page 36: Extractable Functions

Delegation for P

๐‘ƒ ๐‘‰Gen ($ )โ†’๐œŽ

poly (๐‘‡๐‘€ ) polylog (๐‘‡๐‘€ )<๐‘›

๐œ‹ :๐‘€ (1๐‘›)โ†’ ๐‘ฆ

Page 37: Extractable Functions

Final Construction ๐‘“ (๐‘– , ๐‘  ,๐‘Ÿ , ๐‘ฆโˆ— ,๐œŽ โˆ— ,๐œ‹โˆ—)

๐‘–=0๐‘›๐‘–โ‰ 0๐‘›

Output:

If is a valid proof for under Output:

Page 38: Extractable Functions

Extraction

๐ด (1๐‘›)โ†’(๐‘ฆ ,๐œŽ )

When is a proof that under ๐ธ (1๐‘› )โ†’(0๐‘› ,๐ด ,๐‘Ÿ , ๐‘ฆ ,๐œŽ ,๐œ‹โˆ—)

๐‘“

Page 39: Extractable Functions

One-Wayness

1. The image of is sparse2. Soundness of delegation

Page 40: Extractable Functions

Generalized EOWF๐‘… ( ๐‘“ (๐‘ฅ ) ,๐‘ฅ โ€ฒ )Hardness: For a random it is hard to find Extraction:For every there exists such that

Privately-Verifiable GEOWF:Can efficiently test only given

Page 41: Extractable Functions

Impossibility

Assuming indistinguishability obfuscation,

there is not EOWF with unbounded common auxiliary input

Page 42: Extractable Functions

Intuition

Adversary ๐‘˜๐‘“ ๐‘˜ (๐‘ฅ )๐‘ฅ AdversaryNon-Black-

Box Extractor

Common A.I Universal ExtractorThere exists s.t. for every and :

Page 43: Extractable Functions

Plan

1. Assuming virtual black-box obfuscation [Goldreich, Hada-Tanaka]

2. Assuming indistinguishability obfuscation

Page 44: Extractable Functions

Common A.I.

๐ด๐‘˜ ,๐‘ง

๐‘“ ๐‘˜(๐‘ฅ)

๐‘ฅ๐ธ

Page 45: Extractable Functions

Universal Extraction

๐‘“ ๐‘˜(๐‘ฅ)

๐‘ฅUniversa

l Extracto

r

๐‘˜ ,๐‘ง=ยฟ๐ด

Universal Adversary๐ด๐‘˜

Page 46: Extractable Functions

Black-Box Extraction

๐‘“ ๐‘˜(๐‘ฅ)

๐‘ฅUniversa

l Extracto

r

๐‘˜ ,๐‘ง=ยฟ๐ด

Universal Adversary๐‘˜ ๐ด

Black-box obfuscation

Page 47: Extractable Functions

Black-Box Extraction

Black-Box Extractor

๐‘˜Adversary๐‘ฅ๐‘˜=๐‘ƒ๐‘…๐น ๐‘ (๐‘˜) ๐‘“ ๐‘˜(๐‘ฅ๐‘˜)

๐‘ฅ๐‘˜ Adversary๐‘ฅ๐‘˜=๐‘ˆ๐‘›

Page 48: Extractable Functions

Indistinguishability Obfuscation

๐ถ1๐ถ2 โ‰ก

Compute the same function

Page 49: Extractable Functions

Indistinguishability Obfuscation

Extractor

๐‘˜Adversary๐‘ฅ๐‘˜=๐‘ƒ๐‘…๐น ๐‘ (๐‘˜) ๐‘“ ๐‘˜(๐‘ฅ๐‘˜)

๐‘ฅ๐‘˜

Prove that the obfuscation hides

Page 50: Extractable Functions

Indistinguishability Obfuscation

Extractor

๐‘˜ ๐‘ฅ๐‘˜=๐‘ƒ๐‘…๐น ๐‘ (๐‘˜) ๐‘“ ๐‘˜(๐‘ฅ๐‘˜)๐‘ฅ๐‘˜

Extractor

๐‘˜ ๐‘“ ๐‘˜(๐‘ฅ๐‘˜)๐‘ฅ๐‘˜

โ‰ˆ

hides Alternative adversary

Page 51: Extractable Functions

Alternative Adversary Using the Sahai-Waters puncturing technique

๐‘ƒ๐‘…๐น ๐‘  ๐‘“ ๐‘˜

๐‘˜ ๐‘“ ๐‘˜(๐‘ฅ๐‘˜)

Page 52: Extractable Functions

Indistinguishability Obfuscation

Extractor

๐‘˜ ๐‘“ ๐‘˜(๐‘ฅ๐‘˜)๐‘ฅ๐‘˜

hides

Page 53: Extractable Functions

Back to the Construction?

Page 54: Extractable Functions

PossibleImpossible Open

EOWF withunbounded individual A.I. Extractable CRHF\COM\1-to-1 OWF

Page 55: Extractable Functions

Thank You


Recommended