Oblivious Transfer and Secure Multiparty Computation

Total Page:16

File Type:pdf, Size:1020Kb

Oblivious Transfer and Secure Multiparty Computation Oblivious Transfer and Secure Multiparty Computation Brett Hemenway September 11th 2013 Introduction Oblivious Transfer Circuit Garbling Secure Computation from Secret Sharing Applications of MPC The Satellite Problem Conjunction Analysis: Overview Specific Calculations Integration Doing The Computation Securely Extras Cryptographic Assumptions Constructing Oblivious Transfer The Millionaire's Problem An example of secure two-party computation I Two Millionaires want to determine who is richer, without revealing their wealth [Yao82] I They want a secure computation of a comparison (<) gate I More generally, how can two (or more) parties compute a function while keeping their inputs private? Solving the Millionaire's Problem I If there is a family of one-way trapdoor permutations, F, f : X ! Y for f 2 F e.g. f (x) = xe mod N (the RSA function) I and a hash function H : X ! Z I Then there is a simple solution to the Millionaire's Problem I We assume Alice's wealth is a, Bob's is b, and there is an a priori upper bound m > max(a; b). BobAlice fr gm−1 $ i fi=0 −1 x X y a xi = f (y + i) for i = 0;:::; m − 1 b y = f (x) − b x0 ::: xb ::: xm−1 if H(x) = rb then a > b $ −1 x X−1 xb = f (y + b) = f ((f (x) − b) + b) = x if H(xy)=6=fr(bxthen) − ba ≤ b H(xi + 1) for i = 0;:::; a ri = H(xi ) for i = a + 1;:::; m − 1 m−1 y fri gi=0 r0 ::: rb ::: rm−1 a > b ) rb = H(x) Solving the Millionaire's Problem Alice a f ; f −1 $ F f AliceBob fr gm−1 $ i i=0 −1 x X y a xi = f (y + i) for i = 0;:::; m − 1 b y = f (x) − b x0 ::: xb ::: xm−1 if H(x) = rb then a > b −1 −−11 $ xb = f (y + b)f =; ff ((fF(x) − b) + b) = x if H(x) 6= rb then a ≤ b H(xi + 1) for i = 0;:::; a ri = H(xi ) for i = a + 1;:::; m − 1 m−1 fri gfi=0 r0 ::: rb ::: rm−1 a > b ) rb = H(x) Solving the Millionaire's Problem Bob f b x $ X y = f (x) − b y AliceBob m−1 $ fri gfi=0 a x X b y = f (x) − b if H(x) = rb then a > b $ −1 x −X−11 $ xb = f (y + b)f =; ff ((fF(x) − b) + b) = x if H(xy)=6=fr(bxthen) − ba ≤ b H(xi + 1) for i = 0;:::; a ri = H(xi ) for i = a + 1;:::; m − 1 m−1 y fri gfi=0 r0 ::: rb ::: rm−1 a > b ) rb = H(x) Solving the Millionaire's Problem Alice −1 y a xi = f (y + i) for i = 0;:::; m − 1 x0 ::: xb ::: xm−1 AliceBob m−1 $ fri gfi=0 a x X b y = f (x) − b if H(x) = rb then a > b $ xf ; f −X1 $ F if H(xy)=6=fr(bxthen) − ba ≤ b H(xi + 1) for i = 0;:::; a ri = H(xi ) for i = a + 1;:::; m − 1 m−1 y fri gfi=0 r0 ::: rb ::: rm−1 a > b ) rb = H(x) Solving the Millionaire's Problem Alice −1 y a xi = f (y + i) for i = 0;:::; m − 1 x0 ::: xb ::: xm−1 −1 −1 xb = f (y + b) = f ((f (x) − b) + b) = x AliceBob m−1 $ fri gfi=0 a x X b y = f (x) − b if H(x) = rb then a > b $ −1 x −X−11 $ xb = f (y + b)f =; ff ((fF(x) − b) + b) = x if H(xy)=6=fr(bxthen) − ba ≤ b m−1 y fri gfi=0 Solving the Millionaire's Problem Alice −1 y a xi = f (y + i) for i = 0;:::; m − 1 x0 ::: xb ::: xm−1 H(xi + 1) for i = 0;:::; a ri = H(xi ) for i = a + 1;:::; m − 1 r0 ::: rb ::: rm−1 a > b ) rb = H(x) AliceBob m−1 $ fri gfi=0 a x X b y = f (x) − b if H(x) = rb then a > b $ −1 x −X−11 $ xb = f (y + b)f =; ff ((fF(x) − b) + b) = x if H(xy)=6=fr(bxthen) − ba ≤ b y f a > b ) rb = H(x) Solving the Millionaire's Problem Alice −1 y a xi = f (y + i) for i = 0;:::; m − 1 x0 ::: xb ::: xm−1 H(xi + 1) for i = 0;:::; a ri = H(xi ) for i = a + 1;:::; m − 1 m−1 fri gi=0 r0 ::: rb ::: rm−1 AliceBob f −1 y a xi = f (y + i) for i = 0;:::; m − 1 b x0 ::: xb ::: xm−1 $ −1 x −X−11 $ xb = f (y + b)f =; ff ((fF(x) − b) + b) = x y = f (x) − b H(xi + 1) for i = 0;:::; a ri = H(xi ) for i = a + 1;:::; m − 1 m−1 y fri gfi=0 r0 ::: rb ::: rm−1 a > b ) rb = H(x) Solving the Millionaire's Problem Bob m−1 fri g $ i=0 x X b y = f (x) − b if H(x) = rb then a > b if H(x) 6= rb then a ≤ b Secure Multiparty Computation I Cryptographic tools exist that allow a group of participants to securely calculate any function of their joint inputs. I Cryptography removes the need for a trusted third party Privacy is defined in a simulation paradigm I A protocol is secure if there is a simulator that, when given only the output of the protocol can simulate an execution of the protocol that is indistinguishable from the real protocol. I This ensures that nothing beyond the output of the protocol is learned I In the Millionaire's Problem revealing whose salary is higher leaks information. A secure protocol should leak nothing more. Standard technique: first build protocols in the Semi-Honest model. Then use standard tools (e.g. Zero-Knowledge proofs) to force participants to follow the protocol Security Models Definition (Semi-Honest Adversaries) Semi-Honest (Honest-But-Curious) adversaries I always follow whatever protocol they are asked to perform I always send well-formed messages I try to learn other participants' secrets by looking at their own transcript in the protocol Definition (Malicious Adversaries) Malicious adversaries are: I allowed to deviate from the protocol I allowed to send mal-formed messages I allowed to behave in any way Security Models Definition (Semi-Honest Adversaries) Semi-Honest (Honest-But-Curious) adversaries I always follow whatever protocol they are asked to perform I always send well-formed messages I try to learn other participants' secrets by looking at their own transcript in the protocol Definition (Malicious Adversaries) Malicious adversaries are: I allowed to deviate from the protocol I allowed to send mal-formed messages I allowed to behave in any way Standard technique: first build protocols in the Semi-Honest model. Then use standard tools (e.g. Zero-Knowledge proofs) to force participants to follow the protocol Methods of Secure MPC Protocol Assumption Players Reference Yao's Garbled Circuit OT 2 [Yao82, Yao86] GMW OT 2+ [GMW87] BGW/CCD Honest Majority 3+ [BOGW88, CCD88] FHE Lattice Problems 2+ [Gen09] Methods of Secure MPC Protocol Assumption Players Reference Yao's Garbled Circuit OT 2 [Yao82, Yao86] GMW OT 2+ [GMW87] BGW/CCD Honest Majority 3+ [BOGW88, CCD88] FHE Lattice Problems 2+ [Gen09] Introduction Oblivious Transfer Circuit Garbling Secure Computation from Secret Sharing Applications of MPC The Satellite Problem Conjunction Analysis: Overview Specific Calculations Integration Doing The Computation Securely Extras Cryptographic Assumptions Constructing Oblivious Transfer I S learns nothing about b I R learns nothing about X1−b Oblivious Transfer Sender Receiver x0 b OT x1 xb Oblivious Transfer Sender Receiver x0 b OT x1 xb I S learns nothing about b I R learns nothing about X1−b Facts About OT I Introduced by Rabin [Rab81], Even, Goldreich and Lempel [EGL85] I OT is equivalent to random OT [Cr´e88] I OT is symmetric [WW06] I OT is \complete" for secure multiparty computation [Kil88, IPS08] I Black-box construction of OT from one-way permutations implies P 6= NP [IR89] I Perfect OT cannot be constructed using quantum mechanics [Lo97] I OTs can be extended under computational assumptions[IKNP03] I OTs cannot be extended using quantum mechanics [SSS09, WW10] + I OT impies PKE, but not vice-versa [GKM 00] I Constructions: I PIR [CMO00] I DDH [NP01] I Projective hash proofs[Kal05, HK07] I Blind signatures (requires RO) [CNS07] I Bilinear assumptions [GH07] I Dual-mode encryption [PVW08] + I Noisy Channels [IKO 11] 8 w $ [j j] > G (β0; β1) < w βb = g $ 9 > k0; k1 [jGj] : β1−b = r > k0 > α0 = g > > k1 = ((α0; γ0); (α1; γ1)) α1 = g k0 x0 > γ0 = h0 g > > k1 x1 > γ1 = h g ; 1 −w xb = 1 iff γb · αb = g OT From The DDH Assumption Blind Generation of El-Gamal Public-keys a b ab a b c (g; g ; g ; g ) ≈c (g; g ; g ; g ) x0; x1 b Sender Receiver $ 9 k0; k1 [jGj] > k0 > α0 = g > > k1 = ((α0; γ0); (α1; γ1)) α1 = g k0 x0 > γ0 = h0 g > > k1 x1 > γ1 = h g ; 1 −w xb = 1 iff γb · αb = g OT From The DDH Assumption Blind Generation of El-Gamal Public-keys a b ab a b c (g; g ; g ; g ) ≈c (g; g ; g ; g ) x0; x1 b Sender Receiver 8 w $ [j j] > G (β0; β1) < w βb = g > : β1−b = r −w xb = 1 iff γb · αb = g OT From The DDH Assumption Blind Generation of El-Gamal Public-keys a b ab a b c (g; g ; g ; g ) ≈c (g; g ; g ; g ) x0; x1 b Sender Receiver 8 w $ [j j] > G (β0; β1) < w βb = g $ 9 > k0; k1 [jGj] : β1−b = r > k0 > α0 = g > > k1 = ((α0; γ0); (α1; γ1)) α1 = g k0 x0 > γ0 = h0 g > > k1 x1 ;> γ1 = h1 g OT From The DDH Assumption Blind Generation of El-Gamal Public-keys a b ab a b c (g; g ; g ; g ) ≈c (g; g ; g ; g ) x0; x1 b Sender Receiver 8 w $ [j j] > G (β0; β1) < w βb = g $ 9 > k0; k1 [jGj] : β1−b = r > k0 > α0 = g > > k1 = ((α0; γ0); (α1; γ1)) α1 = g k0 x0 > γ0 = h0 g > > k1 x1 > γ1 = h g ; 1 −w xb = 1 iff γb · αb = g Oblivious Transfer Sender Receiver x0 b OT x1 xb I S learns nothing about b I R learns nothing about X1−b Random Oblivious Transfer Sender Receiver x0 b OT x1 xb I S learns nothing about b I R learns nothing about X1−b Sender Receiver y0 c ROT y1 yc d b ⊕ c Idea: use Random OT on z0 = x0 ⊕ yrandomd values(z0; z as1) a one-time z1 = x1 ⊕ y1−dpad to blind real OT zb ⊕ yc y0; y1 generated at random if b = 0 then d = c, so receiver knows yd if b = 1 then d = 1 − c, so receiver knows y1−d Random OT + 3 Bits Communication = OT Precomputing OT Sender Receiver b x0 x1 OT xb Sender Receiver y0 c ROT y1 yc d b ⊕ c z0 = x0 ⊕ yd (z0; z1) z1 = x1 ⊕ y1−d zb ⊕ yc y0; y1 generated at random if b = 0 then d = c, so receiver knows yd if b = 1 then d = 1 − c, so receiver knows y1−d Random OT + 3 Bits Communication = OT Precomputing OT Sender Receiver b x0 x1 OT Idea: use Random OT on random values as a one-time pad to blind real OT xb OT d b ⊕ c Idea: use Random OT on z0 = x0 ⊕ yrandomd values(z0; z as1) a one-time z1 = x1 ⊕ y1−dpad to blind
Recommended publications
  • Anna Lysyanskaya Curriculum Vitae
    Anna Lysyanskaya Curriculum Vitae Computer Science Department, Box 1910 Brown University Providence, RI 02912 (401) 863-7605 email: [email protected] http://www.cs.brown.edu/~anna Research Interests Cryptography, privacy, computer security, theory of computation. Education Massachusetts Institute of Technology Cambridge, MA Ph.D. in Computer Science, September 2002 Advisor: Ronald L. Rivest, Viterbi Professor of EECS Thesis title: \Signature Schemes and Applications to Cryptographic Protocol Design" Massachusetts Institute of Technology Cambridge, MA S.M. in Computer Science, June 1999 Smith College Northampton, MA A.B. magna cum laude, Highest Honors, Phi Beta Kappa, May 1997 Appointments Brown University, Providence, RI Fall 2013 - Present Professor of Computer Science Brown University, Providence, RI Fall 2008 - Spring 2013 Associate Professor of Computer Science Brown University, Providence, RI Fall 2002 - Spring 2008 Assistant Professor of Computer Science UCLA, Los Angeles, CA Fall 2006 Visiting Scientist at the Institute for Pure and Applied Mathematics (IPAM) Weizmann Institute, Rehovot, Israel Spring 2006 Visiting Scientist Massachusetts Institute of Technology, Cambridge, MA 1997 { 2002 Graduate student IBM T. J. Watson Research Laboratory, Hawthorne, NY Summer 2001 Summer Researcher IBM Z¨urich Research Laboratory, R¨uschlikon, Switzerland Summers 1999, 2000 Summer Researcher 1 Teaching Brown University, Providence, RI Spring 2008, 2011, 2015, 2017, 2019; Fall 2012 Instructor for \CS 259: Advanced Topics in Cryptography," a seminar course for graduate students. Brown University, Providence, RI Spring 2012 Instructor for \CS 256: Advanced Complexity Theory," a graduate-level complexity theory course. Brown University, Providence, RI Fall 2003,2004,2005,2010,2011 Spring 2007, 2009,2013,2014,2016,2018 Instructor for \CS151: Introduction to Cryptography and Computer Security." Brown University, Providence, RI Fall 2016, 2018 Instructor for \CS 101: Theory of Computation," a core course for CS concentrators.
    [Show full text]
  • Arxiv:2102.09041V3 [Cs.DC] 4 Jun 2021
    Reaching Consensus for Asynchronous Distributed Key Generation ITTAI ABRAHAM, VMware Research, Israel PHILIPP JOVANOVIC, University College London, United Kingdom MARY MALLER, Ethereum Foundation, United Kingdom SARAH MEIKLEJOHN, University College London, United Kingdom and Google, United Kingdom GILAD STERN, The Hebrew University in Jerusalem, Israel ALIN TOMESCU, VMware Research, USA < = We give a protocol for Asynchronous Distributed Key Generation (A-DKG) that is optimally resilient (can withstand 5 3 faulty parties), has a constant expected number of rounds, has $˜ (=3) expected communication complexity, and assumes only the existence of a PKI. Prior to our work, the best A-DKG protocols required Ω(=) expected number of rounds, and Ω(=4) expected communication. Our A-DKG protocol relies on several building blocks that are of independent interest. We define and design a Proposal Election (PE) protocol that allows parties to retrospectively agree on a valid proposal after enough proposals have been sent from different parties. With constant probability the elected proposal was proposed by a nonfaulty party. In building our PE protocol, we design a Verifiable Gather protocol which allows parties to communicate which proposals they have and have not seen in a verifiable manner. The final building block to our A-DKG is a Validated Asynchronous Byzantine Agreement (VABA) protocol. We use our PE protocol to construct a VABA protocol that does not require leaders or an asynchronous DKG setup. Our VABA protocol can be used more generally when it is not possible to use threshold signatures. 1 INTRODUCTION In this work we study Decentralized Key Generation in the Asynchronous setting (A-DKG).
    [Show full text]
  • Cryptography Abstracts
    Cryptography Abstracts Saturday 10:15 – 12:15 Shafi Goldwasser, MIT Anna Lysyanskaya, Brown University Alice Silverberg, University of California, Irvine Nadia Heninger, UCSD Sunday 8:30 – 10:30 Tal Rabin, IBM Research Tal Malkin, Columbia University Allison Bishop Lewko, University of Texas, Austin Yael Tauman-Kalai, Microsoft Research – New England Saturday 10:15 – 12:15 On Probabilistic Proofs Shafi Goldwasser, MIT ABSTRACT Flavors and applications of verifiable random functions Anna Lysyanskaya, Brown University A random Boolean function is a function where for every input x, the value f(x) is truly random. A pseudorandom function is one where, even though f(x) can be deterministically computed from a small random "seed" s, no efficient algorithm can distinguish f from a random function upon querying it on inputs x1,...,xn of its choice. A verifiable random function (VRF) is a pseudorandom function that can be verified. That is to say, a VRF consists of four algorithms: Generate, Evaluate, Prove, Verify. Alice chooses uses Generate to pick her function f, Evaluate to evaluate it and compute y=f(x), Prove in order to compute a proof p(x) that y is indeed f(x). Bob can then use Verify in order to ascertain that it is indeed the case that y=f(x). At the same time, whenever Bob is not given a proof p(x) for a particular x, no efficient algorithm allows him to determine whether y=f(x) or is random. In this talk I will give a survey of verifiable random functions and their constructions and applications. Elliptic Curve Primality Tests for Numbers in Special Forms Alice Silverberg, University of California, Irvine In joint work with Alex Abatzoglou and Angela Wong, we use elliptic curves with complex multiplication to give primality proofs for integers of certain forms, generalizing earlier work of B.
    [Show full text]
  • Speeding-Up Verification of Digital Signatures Abdul Rahman Taleb, Damien Vergnaud
    Speeding-Up Verification of Digital Signatures Abdul Rahman Taleb, Damien Vergnaud To cite this version: Abdul Rahman Taleb, Damien Vergnaud. Speeding-Up Verification of Digital Signatures. Journal of Computer and System Sciences, Elsevier, 2021, 116, pp.22-39. 10.1016/j.jcss.2020.08.005. hal- 02934136 HAL Id: hal-02934136 https://hal.archives-ouvertes.fr/hal-02934136 Submitted on 27 Sep 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Speeding-Up Verification of Digital Signatures Abdul Rahman Taleb1, Damien Vergnaud2, Abstract In 2003, Fischlin introduced the concept of progressive verification in cryptog- raphy to relate the error probability of a cryptographic verification procedure to its running time. It ensures that the verifier confidence in the validity of a verification procedure grows with the work it invests in the computation. Le, Kelkar and Kate recently revisited this approach for digital signatures and pro- posed a similar framework under the name of flexible signatures. We propose efficient probabilistic verification procedures for popular signature schemes in which the error probability of a verifier decreases exponentially with the ver- ifier running time. We propose theoretical schemes for the RSA and ECDSA signatures based on some elegant idea proposed by Bernstein in 2000 and some additional tricks.
    [Show full text]
  • September 21-23, 2021 Women in Security and Cryptography Workshop
    September 21-23, 2021 Women in Security and Cryptography Workshop Our WISC- Speakers Our WISC-Speakers Adrienne Porter Felt, Google BIO. Adrienne is a Director of Engineering at Google, where she leads Chrome’s Data Science, content ecosystem, and iOS teams. Previously, Adrienne founded and led Chrome’s usable security team. She is best known externally for her work on moving the web to HTTPS, earning her recognition as one of MIT Technology Review’s Innovators Under 35. Adrienne holds a PhD from UC Berkeley, and most of her academic publications are on usable security for browsers and mobile operating systems. Copyright: Adrienne Porter Felt Carmela Troncoso, École polytechnique fédérale de Lausanne BIO. Carmela Troncoso is an assistant professor at EPFL, Switzerland, where she heads the SPRING Lab. Her work focuses on analyzing, building, and deploying secure and privacy-preserving systems. Carmela holds a PhD in Engineering from KULeuven. Her thesis, Design and Analysis Methods for Privacy Technologies, received the European Research Consortium for Informatics and Mathematics Security and Trust Management Best PhD Thesis Award, and her work on Privacy Engineering received the CNIL-INRIA Privacy Protection Award in 2017. She has been named 40 under 40 in technology by Fortune in 2020. Copyright: Carmela Troncoso Elette Boyle, IDC Herzliya BIO. Elette Boyle is an Associate Professor, and Director of the FACT (Foundations & Applications of Cryptographic Theory) Research Center, at IDC Herzliya, Israel. She received her PhD from MIT, and served as a postdoctoral researcher at Cornell University and at the Technion Israel. Elette's research focuses on secure multi- party computation, secret sharing, and distributed algorithm design.
    [Show full text]
  • Program of the NIST Workshop on Multi-Party Threshold Schemes MPTS 2020 — Virtual Event (November 4–6, 2020)
    MPTS 2020 program (updated November 20, 2020) Program of the NIST Workshop on Multi-Party Threshold Schemes MPTS 2020 — Virtual event (November 4–6, 2020) https://csrc.nist.gov/events/2020/mpts2020 # Hour Speaker(s) Topic (not the title) — 09:15–09:35 — Virtual arrival 1a1 09:35–10:00 Luís Brandão Workshop introduction 1a2 10:00–10:25 Berry Schoenmakers Publicly verifiable secret sharing Talks 1a3 10:25–10:50 Ivan Damgård Active security with honest majority — 10:50–11:05 — Break 1b1 11:05–11:30 Tal Rabin MPC in the YOSO model 1b2 11:30–11:55 Nigel Smart Threshold HashEdDSA (deterministic) Talks 1b3 11:55–12:20 Chelsea Komlo Threshold Schnorr (probabilistic) November 4 — 12:20–12:30 — Break 1c1 12:30–12:36 Yashvanth Kondi Threshold Schnorr (deterministic) 1c2 12:36–12:42 Akira Takahashi PQ Threshold signatures 1c3 12:42–12:48 Jan Willemson PQ Threshold schemes Briefs 1c4 12:48–12:54 Saikrishna Badrinarayanan Threshold bio-authentication — 12:54–13:00+ — Day closing — 09:15–09:35 — Virtual arrival 2a1 09:35–10:00 Yehuda Lindell Diverse multiparty settings 2a2 10:00–10:25 Ran Canetti General principles (composability, ...) Talks 2a3 10:25–10:50 Yuval Ishai Pseudorandom correlation generators — 10:50–11:05 — Break 2b1 11:05–11:30 Emmanuela Orsini & Peter Scholl Oblivious transfer extension 2b2 11:30–11:55 Vladimir Kolesnikov Garbled circuits Talks 2b3 11:55–12:20 Xiao Wang Global scale threshold AES — 12:20–12:30 — Break November 5 2c1 12:30–12:36 Xiao Wang Garbled circuits 2c2 12:36–12:42 Jakob Pagter MPC-based Key-management 2c3 12:42–12:48
    [Show full text]
  • Further Simplifications in Proactive RSA Signatures
    Further Simplifications in Proactive RSA Signatures Stanislaw Jarecki and Nitesh Saxena School of Information and Computer Science, UC Irvine, Irvine, CA 92697, USA {stasio, nitesh}@ics.uci.edu Abstract. We present a new robust proactive (and threshold) RSA sig- nature scheme secure with the optimal threshold of t<n/2 corruptions. The new scheme offers a simpler alternative to the best previously known (static) proactive RSA scheme given by Tal Rabin [36], itself a simpli- fication over the previous schemes given by Frankel et al. [18, 17]. The new scheme is conceptually simple because all the sharing and proac- tive re-sharing of the RSA secret key is done modulo a prime, while the reconstruction of the RSA signature employs an observation that the secret can be recovered from such sharing using a simple equation over the integers. This equation was first observed and utilized by Luo and Lu in a design of a simple and efficient proactive RSA scheme [31] which was not proven secure and which, alas, turned out to be completely in- secure [29] due to the fact that the aforementioned equation leaks some partial information about the shared secret. Interestingly, this partial information leakage can be proven harmless once the polynomial sharing used by [31] is replaced by top-level additive sharing with second-level polynomial sharing for back-up. Apart of conceptual simplicity and of new techniques of independent interests, efficiency-wise the new scheme gives a factor of 2 improvement in speed and share size in the general case, and almost a factor of 4 im- provement for the common RSA public exponents 3, 17, or 65537, over the scheme of [36] as analyzed in [36].
    [Show full text]
  • LEONID REYZIN Boston University, Department of Computer Science, Boston, MA 02215 (617) 353-3283 [email protected] Updated February 15, 2014
    LEONID REYZIN Boston University, Department of Computer Science, Boston, MA 02215 (617) 353-3283 [email protected] http://www.cs.bu.edu/~reyzin Updated February 15, 2014 EDUCATION A. B. Summa cum Laude in Computer Science, Harvard University 1992-1996 Honors Senior Thesis on the relation between PCP and NP: “Verifying Membership in NP-languages, or How to Avoid Reading Long Proofs” Thesis Advisor: Michael O. Rabin M.S. in Computer Science, MIT 1997-1999 M.S. Thesis: “Improving the Exact Security of Digital Signature Schemes” Thesis Advisor: Silvio Micali Ph. D. in Computer Science, MIT 1999-2001 Ph. D. Thesis: “Zero-Knowledge with Public Keys” Thesis Advisor: Silvio Micali POSITIONS HELD Associate Professor, Department of Computer Science, Boston University 2007-present Consultant at Microsoft Corp. 2011 Visiting Scholar, Computer Science and Artificial Intelligence Laboratory, MIT 2008 Assistant Professor, Department of Computer Science, Boston University 2001-2007 Fellow, Institute for Pure and Applied Mathematics (IPAM), UCLA 2006 Consultant at CoreStreet, Ltd. (part-time) 2001-2009 Consultant at Peppercoin, Inc. (part-time) 2004 Consultant at RSA Laboratories (part-time) 1998-2000 Research Staff at RSA Laboratories 1996-1997 PUBLICATIONS Note: most are available from http://www.cs.bu.edu/fac/reyzin/research.html Refereed Journal Articles “Improving the Exact Security of Digital Signature Schemes,” by S. Micali and L. Reyzin, appears in Journal of Cryptology, 15(1), pp. 1-18, 2002. Conference versions in SCN 99 and CQRE ’99. “Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data,” by Y. Dodis, R. Ostrovsky, L. Reyzin and A.
    [Show full text]
  • Verifiable Random Functions
    Verifiable Random Functions y z Silvio Micali Michael Rabin Salil Vadhan Abstract random string of the proper length. The possibility thus ex- ists that, if it so suits him, the party knowing the seed s may We efficiently combine unpredictability and verifiability by declare that the value of his pseudorandom oracle at some x f x extending the Goldreich–Goldwasser–Micali construction point is other than s without fear of being detected. It f s of pseudorandom functions s from a secret seed , so that is for this reason that we refer to these objects as “pseudo- s f knowledge of not only enables one to evaluate s at any random oracles” rather than using the standard terminology f x x NP point , but also to provide an -proof that the value “pseudorandom functions” — the values s come “out f x s is indeed correct without compromising the unpre- of the blue,” as if from an oracle, and the receiver must sim- s f dictability of s at any other point for which no such a proof ply trust that they are computed correctly from the seed . was provided. Therefore, though quite large, the applicability of pseu- dorandom oracles is limited: for instance, to settings in which (1) the “seed owner”, and thus the one evaluating 1Introduction the pseudorandom oracle, is totally trusted; or (2) it is to the seed-owner’s advantage to evaluate his pseudorandom oracle correctly; or (3) there is absolutely nothing for the PSEUDORANDOM ORACLES. Goldreich, Goldwasser, and seed-owner to gain from being dishonest. Micali [GGM86] show how to simulate a random ora- f x One efficient way of enabling anyone to verify that s b cle from a-bit strings to -bit strings by means of a con- f x really is the value of pseudorandom oracle s at point struction using a seed, that is, a secret and short random clearly consists of publicizing the seed s.However,this string.
    [Show full text]
  • Mathematical Foundations for Distributed Differential Privacy Ian Masters a THESIS in Mathematics Presented to the Faculties Of
    Mathematical Foundations for Distributed Differential Privacy Ian Masters A THESIS in Mathematics Presented to the Faculties of the University of Pennsylvania in Partial Fulfillment of the Requirements for the Degree of Master of Arts 2018 Supervisor of Thesis Graduate Group Chairman 2 1 Acknowledgment First I would like to thank my advisors on this project, Andreas Haeberlen and Benjamin C. Pierce, for their guidance and generosity with their time. I want to thank the entire Mathematics department at Penn for making my time here an interesting and mind expanding experience. Especially I would like to thank Herman Gluck, whose instruction in my first ever proof based course turned my curiosity about mathematics into a love for the subject. Additionally I would like to thank Wolfgang Ziller and Reshma Tanna for their support and patience with me throughout this process. I need to thank my friends and classmates who inspired me every day to work harder. I would especially like to thank my close friends and frequent collaborators Anthony Rodriguez and Drew Stone for their many suggestions. Of course I need to thank my family, who have made all of this possible. 3 Contents 1 Acknowledgment 2 2 Abstract 5 3 Introduction 6 4 Theoretical Foundations of Differential Privacy 8 4.1 Basic Definition . .8 4.2 Post Processing . .9 4.3 Laplace Mechanism . 11 5 Distributed Differential Privacy 14 5.1 Background . 14 5.2 Piro . 15 5.2.1 SNIPs . 16 5.3 RAPPOR . 20 5.3.1 System Overview . 20 5.3.2 Privacy Guarantees . 22 5.4 Time Series Aggregation .
    [Show full text]
  • Lecture Notes in Computer Science 4833 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan Van Leeuwen
    Lecture Notes in Computer Science 4833 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Massachusetts Institute of Technology, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Moshe Y. Vardi Rice University, Houston, TX, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany Kaoru Kurosawa (Ed.) Advances in Cryptology – ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security Kuching, Malaysia, December 2-6, 2007 Proceedings 13 Volume Editor Kaoru Kurosawa Ibaraki University Department of Computer and Information Sciences 4-12-1 Nakanarusawa Hitachi, Ibaraki 316-8511, Japan E-mail: [email protected] Library of Congress Control Number: 2007939450 CR Subject Classification (1998): E.3, D.4.6, F.2.1-2, K.6.5, C.2, J.1, G.2 LNCS Sublibrary: SL 4 – Security and Cryptology ISSN 0302-9743 ISBN-10 3-540-76899-8 Springer Berlin Heidelberg New York ISBN-13 978-3-540-76899-9 Springer Berlin Heidelberg New York This work is subject to copyright.
    [Show full text]
  • Lecture Notes in Computer Science 6223 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan Van Leeuwen
    Lecture Notes in Computer Science 6223 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Germany Madhu Sudan Microsoft Research, Cambridge, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany Tal Rabin (Ed.) Advances in Cryptology – CRYPTO 2010 30th Annual Cryptology Conference Santa Barbara, CA, USA, August 15-19, 2010 Proceedings 13 Volume Editor Tal Rabin IBM T.J.Watson Research Center Hawthorne, NY, USA E-mail: [email protected] Library of Congress Control Number: 2010931385 CR Subject Classification (1998): E.3, G.2.1, F.2.1-2, D.4.6, K.6.5, C.2, J.1 LNCS Sublibrary: SL 4 – Security and Cryptology ISSN 0302-9743 ISBN-10 3-642-14622-8 Springer Berlin Heidelberg New York ISBN-13 978-3-642-14622-0 Springer Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks.
    [Show full text]