Session 8 PODC’17, July 25-27, 2017, Washington, DC, USA Brief Announcement: Secure Self-Stabilizing Computation Shlomi Dolev Karim Eldefrawy Juan Garay Department of Computer Science, SRI International Yahoo Research Ben-Gurion University of the Negev Menlo Park Sunnyvale Beersheva, Israel 84105 California, USA California, USA [email protected] [email protected] [email protected] Muni Venkateswarlu Rafail Ostrovsky Moti Yung Kumaramangalam Department of Computer Science and Snap & Columbia University Department of Computer Science, Department of Mathematics, New York, USA Ben-Gurion University of the Negev University of California [email protected] Beersheva, Israel 84105 Los Angeles, USA [email protected] [email protected] ABSTRACT currently unclear if a system and its state can be designed to always Self-stabilization refers to the ability of systems to recover after fully recover following such individual asynchronous recoveries. temporal violations of conditions required for their correct opera- This paper introduces Secure Self-stabilizing Computation which tion. Such violations may lead the system to an arbitrary state from answers this question in the affirmative. Secure self-stabilizing com- which it should automatically recover. Today, beyond recovering putation design ensures that secrecy of inputs and outputs, and functionality, there is a need to recover security and confidential- correctness of the computation are automatically regained, even if ity guarantees as well. To the best of our knowledge, there are at some point the entire system is compromised. We consider the dis- currently no self-stabilizing protocols that also ensure recovering tributed computation task as the implementation of virtual global confidentiality, authenticity, and integrity properties. Specifically, finite satiate machine (FSM) to present commonly realized com- self-stabilizing systems are designed to regain functionality which putation. The FSM is designed to regain consistency and security is, roughly speaking, desired input output relation, ignoring the se- in the presence of a minority of Byzantine participants, e.g., one curity and confidentiality of computation and its state. Distributed third of the parties, and following a temporary corruption of the (cryptographic) protocols for generic secure and privacy-preserving entire system. We use this task and settings to demonstrate the computation, e.g., secure Multi-Party Computation (MPC), usually definition of secure self-stabilizing computation. We show how our ensure secrecy of inputs and outputs, and correctness of computa- algorithms and system autonomously restore security and confiden- tion when the adversary is limited to compromise only a fraction of tiality of the computation of the FSM once the required corruption the components in the system, e.g., the computation is secure only in thresholds are again respected. the presence of an honest majority of involved parties. While there are MPC protocols that are secure against a dishonest majority, in CCS CONCEPTS reality, the adversary may compromise all components of the system • Security and privacy → Privacy-preserving protocols; Pub- for a while; some of the corrupted components may then recover, lic key encryption; Security requirements; e.g., due to security patches and software updates, or periodical code refresh and local state consistency check and enforcement KEYWORDS based on self-stabilizing hardware and software techniques. It is Self-stabilization; Secure multi-party computation; Security and privacy; The first author is partially Supported by the Rita Altura Trust Chair in Computer Sciences, by Lynne and William Frankel Center for Computer Sciences, by a grant of ACM Reference format: the Ministry of Science, Technology and Space, Israel and the National Science Council Shlomi Dolev, Karim Eldefrawy, Juan Garay, Muni Venkateswarlu Kumara- (NSC) of Taiwan, and by a grant of the Ministry of Science, Technology and Space, Israel, and the Ministry of Foreign Affairs, Italy. mangalam, Rafail Ostrovsky, and Moti Yung. 2017. Brief Announcement: The fifth author’s research is supported in part by NSF grant 1619348, US-Israel Secure Self-Stabilizing Computation. In Proceedings of PODC ’17, Washing- BSF grant 2012366, by DARPA Safeware program, OKAWA Foundation Research ton, DC, USA, July 25-27, 2017, 3 pages. Award, IBM Faculty Research Award, Xerox Faculty Research Award, B. John Garrick https://doi.org/http://dx.doi.org/10.1145/3087801.3087864 Foundation Award, Teradata Research Award, and Lockheed-Martin Corporation Research Award. The views expressed are those of the authors and do not reflect position of the Department of Defense or the U.S. Government. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed 1 PRELIMINARIES for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. System and Network Model. We consider a system of n parties For all other uses, contact the owner/author(s). p1;:::;pn with a completely connected semi synchronous network, PODC ’17, July 25-27, 2017, Washington, DC, USA that interactively and continuously computes a function f ¹:º over a © 2017 Copyright held by the owner/author(s). ACM ISBN 978-1-4503-4992-5/17/07. finite field F (below we use a Mealy FSM as an example of f ¹:º). Each https://doi.org/http://dx.doi.org/10.1145/3087801.3087864 party has a True Random Number Generator (TRNG). To simplify 415 Session 8 PODC’17, July 25-27, 2017, Washington, DC, USA the presentation we first assume that the system is set up by aCon- • Convergence: For any arbitrary inconsistent configurationcr , there figuration AuthorityCA ( ) that initializes each party pi with a pair exists a safe (legal, arbitrary but consistent) configuration cf after of public- and private-key, PKpi and SKpi respectively; each party a finite number of rounds, i.e., starting from any arbitrary configu- is also initialized with public-keys of other parties in the system. ration, the system is guaranteed to eventually reach a stable legal Each party’s private-key, and the CA’s public-key, PKCA are stored configuration from which the execution is legal, fulfilling thetask in a secure hardware module that only allows the party to decrypt requirement. or to sign messages with its private-key, or to verify signatures • Closure: Once a system reaches a stable state, the system is guaran- by the CA using its public-key. Each pair of parties shares private teed to stay in the stable state provided that no further unexpected secure authenticated communication channels that can be estab- fault happens. lished based on the initial setup. In fact, the use of TRNG suffices to Secure Computation. Secure Multi-Party Computation (MPC) establish the required keys. Parties can repeatedly establish fresh enables n parties to jointly and securely compute a function f ¹:º of public and private keys (unknown to the non-present adversary), their private inputs, even in the presence of adversarial behavior and agree on the keys (by using Byzantine agreement over each (typically modeled as a fraction of t parties that can be passively or declared public key), and then establish genuine symmetric keys for actively corrupted). MPC ensures that while computing f ¹:º and each pair of the participants and secure broadcast channels from when corruption is less than t, parties inputs’ remain private, except scratch. Alternatively, parties may receive the symmetric keys as a what is revealed by the output of the computation (privacy). MPC part of the inputs. also guarantees the correctness of the output of the computation The parties periodically receive some global input in secret (correctness) [10]. shared format from an external client (or the environment in gen- Secure Self-Stabilizing Computation. Existing secure MPC pro- eral), and use that input in the computation of f ¹:º. The parties tocols [5, 10, 11] guarantee privacy (computation state, inputs and are not aware of their state history i.e., they do not know whether outputs) and correctness of computation only when there are a lim- they are corrupted or not. The parties exchange messages in se- ited number of corrupted parties. However, in reality, a powerful quence of rounds to communicate and compute the function f ¹:º. In adversary may even compromise all the parties of a system. The each round, every party in the system receives messages, performs aim of introducing Secure Self-stabilizing Computation is to specify local computation and sends messages. We consider both synchro- the requirements for automatically recovering secrecy of compu- nous and semi-synchronous network settings during the system tation state, inputs and outputs, and correctness of a computation implementation. In a synchronous system, all the n parties are syn- even if an entire system is compromised for a finite time. Consider chronized via a global clock and perform a given event on a common a self-stabilizing system of n parties that perform a computation clock pulse that occurs periodically. Whereas in a semi-synchronous in a distributed fashion while maintaining the input secrecy and system, time-bounded events happen in real-time. An event needs correctness of the output. We assume that the system does not to be completed before its time elapses. A self-stabilizing Byzantine necessarily have an initial state to start with, i.e., it may begin its clock synchronization [7] can facilitate a (logical) global clock pulse execution from any arbitrary configuration c and does not nec- when the system has only semi-synchronous promise. Moreover, r essarily stop. An external client or environment, e.g., sensors or a it can be used to announce a common round number, that in-turn physical process, etc., supplies inputs to the system and reconstructs can be used to start establishing the keys and repeatedly perform output(s) from the individual outputs of the parties.
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages3 Page
-
File Size-