Transcript
Page 1: Information Theoretic Cryptography Introduction

Information Theoretic Cryptography

Introduction

Benny Applebaum

Tel Aviv University

BIU Winter-School of Information-Theoretic Cryptography

February 2020

Page 2: Information Theoretic Cryptography Introduction

Communication and Computation in the presence of adversary

Honest party Honest party

Adversary

Computational Cryptography

Page 3: Information Theoretic Cryptography Introduction

โ€ข Encryption

โ€ข Authentication

Honest party Honest party

Adversary

Computational Cryptography

Page 4: Information Theoretic Cryptography Introduction

โ€ข Commitments

โ€ข Coin Tossing

โ€ข ZK-Proofs

โ€ข Secure Computation

Adversary

Computational Cryptography

Page 5: Information Theoretic Cryptography Introduction

Exploit computational limitation to achieve privacy/authenticity/โ€ฆ

AdversaryPoly-bounded

Computational Cryptography

Page 6: Information Theoretic Cryptography Introduction

Information-Theoretic Cryptography

Exploit information gaps to achieve privacy/authenticity/โ€ฆ

AdversaryComputationally unbounded

Page 7: Information Theoretic Cryptography Introduction

Exploit information gaps to achieve privacy/authenticity/โ€ฆ

AdversaryComputationally unbounded

Information-Theoretic Cryptography

Page 8: Information Theoretic Cryptography Introduction

AdversaryComputationally unbounded

Exploit information gaps to achieve privacy/authenticity/โ€ฆ

Information-Theoretic Cryptography

Page 9: Information Theoretic Cryptography Introduction

(Shallow) Comparison

Computational Cryptography

โ€ข Comp-limited adversary

โ€ข Unproven assumptions

โ€ข Composability issues

โ€ข Complicated defโ€™s

โ€ข Allows magic (PRG/PKC/OT/)

โ€ข Short keys

โ€ข May be comp. expensive

IT Cryptography

โ€ข Comp-unbounded adversary

โ€ข Unconditional (no assumptions)

โ€ข Good closure properties

โ€ข Easy to define and work with (concretely)

โ€ข No magic (useless w/o information gaps)

โ€ข Long keys/large communication

โ€ข Typically fast (for short messages)

Page 10: Information Theoretic Cryptography Introduction

Obfustopia

Secure Computation

Public-Key

Symmetric

Information Theoretic

The Crypto TowerAssumption

Page 11: Information Theoretic Cryptography Introduction

Obfustopia

Secure Computation

Public-Key

Symmetric

Information Theoretic

The Crypto Tower

One-time pad

AES

RSA

OT

Obfuscation

Time (per-bit)

Page 12: Information Theoretic Cryptography Introduction

Obfustopia

Secure Computation

Public-Key

Symmetric

Information Theoretic

The Crypto Tower: Realistic View

Page 13: Information Theoretic Cryptography Introduction

Obfustopia

Secure Computation

Public-Key

Symmetric

Information Theoretic

The Crypto Tower: Realistic View

GGMGLHILL

DDH-KARSA-OAEPFDH-RSA

GMW-MPC GMW-ZK Yao-GC

MMAPS-based obfuscation

Page 14: Information Theoretic Cryptography Introduction

Obfustopia

Secure Computation

Public-Key

Symmetric

Information Theoretic

The best of all worlds

Problem

Page 15: Information Theoretic Cryptography Introduction

Obfustopia

Secure Computation

Public-Key

Symmetric

Information Theoretic

The best of all worlds

Problem

Problem

Page 16: Information Theoretic Cryptography Introduction

Two Case Studies:

Perfect Encryption & Error Correcting Codes

Image credits:

Photo: CC BY SA 4.0, by DobriZheglov, https://commons.wikimedia.org/wiki/File:Claude_Shannon_1776.jpgAli Baba's cave: CC BY 2.5, by Dake, https://commons.wikimedia.org/wiki/File:Zkip_alibaba{1,2,3}.png

Page 17: Information Theoretic Cryptography Introduction

Case Study 1: Perfect Encryption [Shannon 48]

Alice Bob

Message ๐‘€ โˆˆ 0,1 ๐‘›

Page 18: Information Theoretic Cryptography Introduction

Case Study 1: Perfect Encryption [Shannon 48]

Secrecy: For every ๐‘‹, ๐‘Œ โˆˆ 0,1 ๐‘› EK(๐‘‹) โ‰ก EK(๐‘Œ)

where ๐พ โˆˆ๐‘… ๐‘ฒ

๐‘€ โˆˆ 0,1 ๐‘›

Private key ๐พ โˆˆ ๐‘ฒ

Ciphertext EK(๐‘€)Encryption Decryption

Private key ๐พ โˆˆ ๐‘ฒ

๐‘€ โˆˆ 0,1 ๐‘›

Page 19: Information Theoretic Cryptography Introduction

Perfect SecrecySecrecy: For every ๐‘‹, ๐‘Œ โˆˆ 0,1 ๐‘› EK(๐‘‹) โ‰ก EK(๐‘Œ)

where ๐พ โˆˆ๐‘… ๐‘ฒ

โˆ€ ๐ถ, Pr๐พ๐ธ๐พ ๐‘‹ = ๐ถ = Pr

๐พ๐ธ๐พ ๐‘Œ = ๐ถ

Page 20: Information Theoretic Cryptography Introduction

Statistical SecrecySecrecy: For every ๐‘‹, ๐‘Œ โˆˆ 0,1 ๐‘› EK(๐‘‹) โ‰ˆ EK(๐‘Œ)

where ๐พ โˆˆ๐‘… ๐‘ฒ

โˆ€ set of ciphertexts ๐‘†, Pr๐พ๐ธ๐พ ๐‘‹ โˆˆ ๐‘† โ‰ˆ๐›ฟ Pr

๐พ๐ธ๐พ ๐‘Œ โˆˆ ๐‘†

Page 21: Information Theoretic Cryptography Introduction

Statistical SecrecySecrecy: For every ๐‘‹, ๐‘Œ โˆˆ 0,1 ๐‘› EK(๐‘‹) โ‰ˆ EK(๐‘Œ)

where ๐พ โˆˆ๐‘… ๐‘ฒ

โˆ€ unbounded ๐ด๐‘‘๐‘ฃ, Pr๐พ๐ด๐‘‘๐‘ฃ ๐ธ๐พ ๐‘‹ = 1 โˆ’ Pr

๐พ๐ด๐‘‘๐‘ฃ ๐ธ๐พ ๐‘Œ = 1 โ‰ค ๐›ฟ

Page 22: Information Theoretic Cryptography Introduction

Computational Secrecy [GMโ€™82]Secrecy: For every ๐‘‹, ๐‘Œ โˆˆ 0,1 ๐‘› EK(๐‘‹) โ‰ˆ EK(๐‘Œ)

where ๐พ โˆˆ๐‘… ๐‘ฒ

โˆ€ comp โˆ’ bounded ๐ด๐‘‘๐‘ฃ, Pr๐พ๐ด๐‘‘๐‘ฃ ๐ธ๐พ ๐‘‹ = 1 โˆ’ Pr

๐พ๐ด๐‘‘๐‘ฃ ๐ธ๐พ ๐‘Œ = 1 โ‰ค ๐›ฟ

Page 23: Information Theoretic Cryptography Introduction

One-Time Pad is Perfectly Secure

Message ๐‘€ โˆˆ 0,1 ๐‘›

Private key ๐พ โˆˆ๐‘… 0,1 ๐‘›Private key ๐พ โˆˆ๐‘… 0,1 ๐’

EK ๐‘€ = ๐พโŠ•๐‘€

โˆ€๐‘‹, ๐‘Œ, EK(๐‘‹) โ‰ก EK(๐‘Œ)

DK ๐ถ = ๐ถ โŠ•๐พ๐‘ฎ

๐‘ฎ ๐‘ฎ

+

โˆ’Encryption Decryption

Page 24: Information Theoretic Cryptography Introduction

Proofโˆ€๐‘‹, ๐‘Œ, EK(๐‘‹) โ‰ก EK(๐‘Œ)

Claim: โˆ€ ๐‘‹, ๐ถ, Pr๐พ๐ธ๐พ ๐‘‹ = ๐ถ = 1/|๐บ|

Pr๐พ๐พ +๐‘€ = ๐ถ = Pr

๐พ๐พ = ๐ถ โˆ’๐‘€ = 1/|๐บ|

Put differently: For every ๐‘‹ the mapping ๐พ โ†ฆ ๐ธ๐พ ๐‘‹

is a bijection from randomness space to ciphertext space

In fact, non-degenerate linear mapping

Page 25: Information Theoretic Cryptography Introduction

Efficiency Measures

Alice Bob

Message ๐‘€ โˆˆ 0,1 ๐‘›

Private key ๐พ โˆˆ๐‘… 0,1 ๐‘› Private key ๐พ โˆˆ 0,1 ๐’

EK ๐‘€ = ๐พโŠ•๐‘€ DK ๐ถ = ๐ถ โŠ•๐พ+ โˆ’

Communication, Randomness, Round complexity

โ€ข OTP: Optimal !

Page 26: Information Theoretic Cryptography Introduction

Riddle: Broadcast Encryption [Fiat-Naor94]

Alice

Bob1

Message ๐‘€ โˆˆ {0,1}Subset ๐‘†

Keys ๐พ1, โ€ฆ , ๐พ๐‘

key ๐พ1

EK ๐‘€, ๐‘†

Bob N

key ๐พ๐‘

Subset S Can decrypt iff๐’Š โˆˆ ๐‘บBob ๐’Š

โ€ฆ

โ€ฆ

key ๐พ๐‘–

Page 27: Information Theoretic Cryptography Introduction

Riddle: Broadcast Encryption [Fiat-Naor94]

Alice

Bob1

Message ๐‘€ โˆˆ {0,1}Subset ๐‘†

Keys ๐พ1, โ€ฆ , ๐พ๐‘

key ๐พ1

EK ๐‘€, ๐‘†

Communication?

Randomness (length of each key)?

Best tradeoffs?

Bob N

key ๐พ๐‘

Subset S Can decrypt iff๐’Š โˆˆ ๐‘บBob ๐’Š

โ€ฆ

โ€ฆ

key ๐พ๐‘–

Page 28: Information Theoretic Cryptography Introduction

Case Study 2: Error Correction/Detection [Hamming47, Shannon48]

Codeword ๐ถ = (๐ถ1, โ€ฆ , ๐ถ๐‘)

Encode Decode ๐‘€ โˆˆ 0,1 ๐‘›๐‘€ โˆˆ 0,1 ๐‘˜

Can tamper (erase/corrupt)

up to ๐œน-fraction of symbols

or โŠฅ

Shannon: Solutions with optimal communication overhead

โ€ข Random linear mapping is optimal [Varshamov]

โ€ข Later efficient constructions

Page 29: Information Theoretic Cryptography Introduction

Unified view: Distributed Storage

Alice

Message ๐‘€ โˆˆ 0,1 ๐‘˜

๐ถ1

Bob N

๐ถ๐‘

Encoding

โ€ฆ

๐ถ๐‘–

Coding setting:

Adv. actively corrupts/erase servers

Decoding๐‘€ โˆˆ 0,1 ๐‘˜

Page 30: Information Theoretic Cryptography Introduction

Unified view: Distributed Storage

Alice

Message ๐‘€ โˆˆ 0,1 ๐‘˜

๐ถ1

Bob N

๐ถ๐‘

Encoding

โ€ฆ

๐ถ๐‘–

Secrecy setting:

Adversary passively corrupts servers

Decoding๐‘€ โˆˆ 0,1 ๐‘˜

Page 31: Information Theoretic Cryptography Introduction

Unified view: Distributed Storage

Alice

Message ๐‘€ โˆˆ 0,1 ๐‘˜

๐พ

๐ธ๐พ ๐‘€ = ๐พ +๐‘€

Encoding

Secrecy setting:

Adversary passively corrupts servers

Decoding๐‘€ โˆˆ 0,1 ๐‘˜

Page 32: Information Theoretic Cryptography Introduction

Unified view: Distributed Storage

Alice

Message ๐‘€ โˆˆ 0,1 ๐‘˜

๐พ1

Bob N

๐‘€ +๐พ1 +โ‹ฏ+ ๐พ๐‘

Encoding

โ€ฆ

๐พ๐‘–

Secrecy setting:

Adversary passively corrupts servers

Decoding๐‘€ โˆˆ 0,1 ๐‘˜

Page 33: Information Theoretic Cryptography Introduction

Can we achieve privacy & resiliency?

Alice

Message ๐‘€ โˆˆ 0,1 ๐‘˜

๐พ1

Bob N

๐‘€ +๐พ1 +โ‹ฏ+ ๐พ๐‘

Encoding

โ€ฆ

๐พ๐‘–

Secrecy setting:

Adversary passively corrupts servers

Decoding๐‘€ โˆˆ 0,1 ๐‘˜

Page 34: Information Theoretic Cryptography Introduction

Secret-Sharing (Giladโ€™s talk)

Alice

Message ๐‘€ โˆˆ 0,1 ๐‘˜

๐ถ1

Bob N

๐ถ๐‘

Encoding

โ€ฆ

๐ถ๐‘–

Threshold setting:

Corruption bounds ๐‘‡๐‘Ž๐‘๐‘ก๐‘–๐‘ฃ๐‘’ , ๐‘‡๐‘’๐‘Ÿ๐‘Ž๐‘ ๐‘ข๐‘Ÿ๐‘’ , ๐‘‡๐‘๐‘Ž๐‘ ๐‘ ๐‘–๐‘ฃ๐‘’

Decoding๐‘€ โˆˆ 0,1 ๐‘˜

Page 35: Information Theoretic Cryptography Introduction

Secret-Sharing (Giladโ€™s talk)

Alice

Message ๐‘€ โˆˆ 0,1 ๐‘˜

๐ถ1

Bob N

๐ถ๐‘

Encoding

โ€ฆ

๐ถ๐‘–

Threshold setting:

Corruption bounds ๐‘‡๐‘Ž๐‘๐‘ก๐‘–๐‘ฃ๐‘’ , ๐‘‡๐‘’๐‘Ÿ๐‘Ž๐‘ ๐‘ข๐‘Ÿ๐‘’ , ๐‘‡๐‘๐‘Ž๐‘ ๐‘ ๐‘–๐‘ฃ๐‘’

Decoding๐‘€ โˆˆ 0,1 ๐‘˜

Page 36: Information Theoretic Cryptography Introduction

General Secret-Sharing (Bennyโ€™s talk)

Alice

Message ๐‘€ โˆˆ 0,1 ๐‘˜

๐ถ1

Bob N

๐ถ๐‘

Encoding

โ€ฆ

๐ถ๐‘–

General corruption patterns:

โ€ข Related to Broadcast encryption problem

โ€ข Huge gaps between LBs and UBs

Decoding๐‘€ โˆˆ 0,1 ๐‘˜

Page 37: Information Theoretic Cryptography Introduction

Private Information Retrieval (Yuval+Klim)

Alice

Message ๐‘€ โˆˆ 0,1 ๐‘˜

๐ถ1

Bob N

๐ถ๐‘

Encoding

โ€ฆ

๐ถ๐‘– Decoding๐‘€ โˆˆ 0,1 ๐‘˜

Page 38: Information Theoretic Cryptography Introduction

Private Information Retrieval (Yuval+Klim)

Bob N

โ€ฆ

๐‘€

Alice

Decoding

Page 39: Information Theoretic Cryptography Introduction

Private Information Retrieval (Yuval+Klim)

๐‘€

Bob N

๐‘€

โ€ฆ

๐‘€

๐‘€[๐‘–]

Alice

index ๐‘– โˆˆ {1,โ€ฆ , ๐‘˜}

Hide access pattern i

Page 40: Information Theoretic Cryptography Introduction

Private Information Retrieval (Yuval+Klim)

Bob N

โ€ฆ

๐‘€[๐‘–]

Alice

index ๐‘–

Hide access pattern i

โ€ข Power of non-linearity

โ€ข Huge gaps between LBs and UPs

Page 41: Information Theoretic Cryptography Introduction

Computation: Beyond Storage

๐‘ฅ1

๐‘ฅ2 ๐‘ฅ3

๐‘ฅ4

๐‘ฅ5

๐‘ฅ6

TrustedParty

Page 42: Information Theoretic Cryptography Introduction

Consensus (Ittaiโ€™s talk) Achieving Agreement at the presence of failures/corruptions/delays

1

56

3

2

4

Only correctness requirement No privacy requirements

1

1

1

1

Page 43: Information Theoretic Cryptography Introduction

General Secure Computation (Yuvalโ€™s talk)Compute joint function of the parties inputs

๐‘ฅ1

๐‘ฅ2 ๐‘ฅ3

๐‘ฅ4

๐‘ฅ5

๐‘ฅ6

๐น(๐‘ฅ1, โ€ฆ , ๐‘ฅ5)

Passive adversaries

โ€ข Privacy

Active adversaries

โ€ข Correctness & Privacy

General Functions

Page 44: Information Theoretic Cryptography Introduction

General Secure Computation (Yuvalโ€™s talk)Compute joint function of the parties inputs

๐‘ฅ1

๐‘ฅ2 ๐‘ฅ3

๐‘ฅ4

๐‘ฅ5

๐‘ฅ6

๐‘ฅ1 +โ‹ฏ+ ๐‘ฅ5

Challenge:

Design 1-private protocol for sum over G

Page 45: Information Theoretic Cryptography Introduction

Proofs in Non-Interactive Setting (Nivโ€™s Talk)

๐‘ฅ1

๐‘ฅ2 ๐‘ฅ3

๐‘ฅ4

๐‘ฅ5

๐‘ฅ6

๐น(๐‘ฅ1, โ€ฆ , ๐‘ฅ5)=1

prover

verifiers

Page 46: Information Theoretic Cryptography Introduction

๐‘ฅ1

๐‘ฅ2 ๐‘ฅ3

๐‘ฅ4

๐‘ฅ5

๐‘ฅ6

๐น(๐‘ฅ1, โ€ฆ , ๐‘ฅ5)

receiver

senders

Randomized Encoding & Constant-Round MPC (Bennyโ€™s Talk)

Page 47: Information Theoretic Cryptography Introduction

Summary: Information Theoretic Cryptography

โ€ข Cool questions

โ€ข Exciting connections withโ€ข Coding, Information-theory, Communication Complexity,

Computational complexity, Theory of Computation

โ€ข Relevant to computational crypto as well

โ€ข Many open problems

โ€ข New conference: ITC 2020, June 17-19, 2020 in Bostonโ€ข PC: Daniel Wichs, General Chairs: Adam Smith & Yael Kalai

Have a Good Time!


Recommended