Provable Security II - Yu Yuyuyu.hk/files/slide2.pdf · Security definition via...

22
Provable Security II

Transcript of Provable Security II - Yu Yuyuyu.hk/files/slide2.pdf · Security definition via...

Page 1: Provable Security II - Yu Yuyuyu.hk/files/slide2.pdf · Security definition via indistinguishability experiment •Encryption scheme: Π=(Gen,Enc,Dec) •The adversarial indistinguishability

Provable Security II

Page 2: Provable Security II - Yu Yuyuyu.hk/files/slide2.pdf · Security definition via indistinguishability experiment •Encryption scheme: Π=(Gen,Enc,Dec) •The adversarial indistinguishability

Security definition via indistinguishability experiment

• Encryption scheme: Π=(Gen,Enc,Dec)

• The adversarial indistinguishability experiment: PrivKeav

• Security game between adversary A=(A1,D) and challenger C

• Adversary’s advantage:

Page 3: Provable Security II - Yu Yuyuyu.hk/files/slide2.pdf · Security definition via indistinguishability experiment •Encryption scheme: Π=(Gen,Enc,Dec) •The adversarial indistinguishability

Statistical Security

Page 4: Provable Security II - Yu Yuyuyu.hk/files/slide2.pdf · Security definition via indistinguishability experiment •Encryption scheme: Π=(Gen,Enc,Dec) •The adversarial indistinguishability

The two definitions about statistical security

• (1) for every A:

• (2) for every D:

Page 5: Provable Security II - Yu Yuyuyu.hk/files/slide2.pdf · Security definition via indistinguishability experiment •Encryption scheme: Π=(Gen,Enc,Dec) •The adversarial indistinguishability

The one-time pad (OTP) is perfectly secure

Page 6: Provable Security II - Yu Yuyuyu.hk/files/slide2.pdf · Security definition via indistinguishability experiment •Encryption scheme: Π=(Gen,Enc,Dec) •The adversarial indistinguishability

Statistical Distance

Page 7: Provable Security II - Yu Yuyuyu.hk/files/slide2.pdf · Security definition via indistinguishability experiment •Encryption scheme: Π=(Gen,Enc,Dec) •The adversarial indistinguishability

Statistical distance: the upper bound of distinguishing advantage

Page 8: Provable Security II - Yu Yuyuyu.hk/files/slide2.pdf · Security definition via indistinguishability experiment •Encryption scheme: Π=(Gen,Enc,Dec) •The adversarial indistinguishability

More about statistical distance

Page 9: Provable Security II - Yu Yuyuyu.hk/files/slide2.pdf · Security definition via indistinguishability experiment •Encryption scheme: Π=(Gen,Enc,Dec) •The adversarial indistinguishability

Statistical security for one-time pad

Page 10: Provable Security II - Yu Yuyuyu.hk/files/slide2.pdf · Security definition via indistinguishability experiment •Encryption scheme: Π=(Gen,Enc,Dec) •The adversarial indistinguishability

Unpredictability and min-entropy

Page 11: Provable Security II - Yu Yuyuyu.hk/files/slide2.pdf · Security definition via indistinguishability experiment •Encryption scheme: Π=(Gen,Enc,Dec) •The adversarial indistinguishability

(Conditional) unpredictability and min-entropy

Page 12: Provable Security II - Yu Yuyuyu.hk/files/slide2.pdf · Security definition via indistinguishability experiment •Encryption scheme: Π=(Gen,Enc,Dec) •The adversarial indistinguishability

High min-entropy ≠ (Any form of) Security

• Then what?

Using randomness extractor Ext s.t. Ext(K) is statistical random!

Page 13: Provable Security II - Yu Yuyuyu.hk/files/slide2.pdf · Security definition via indistinguishability experiment •Encryption scheme: Π=(Gen,Enc,Dec) •The adversarial indistinguishability

Randomness extractors

• First attempt: an (𝑛, 𝑘,𝑚, 𝜀)-randomness extractor is a function Ext: {0,1}𝑛→ {0,1}𝑚 that for every r.v. of length n and min-entropy at least k we have SD(Ext(X),𝑈𝑚)≤ 𝜀

• Unfortunately, deterministic is impossible even for k=n-1, m=1

• Definition: an (𝑛, 𝑘,𝑚, 𝑑, 𝜀)-randomness extractor is a function Ext: {0,1}𝑛× {0,1}𝑑→ {0,1}𝑚 that for every r.v. of length n and min-entropy at least k we have SD( Ext(X,𝑈𝑑), 𝑈𝑑 , 𝑈𝑚+𝑑 )≤ 𝜀

ExtX Almost uniform randomness

X Almost uniform randomnessExt

𝑈𝑑 𝑈𝑑

Seed length: dEntropy loss: k-m

Page 14: Provable Security II - Yu Yuyuyu.hk/files/slide2.pdf · Security definition via indistinguishability experiment •Encryption scheme: Π=(Gen,Enc,Dec) •The adversarial indistinguishability

Universal Hash Functions and Leftover Hash Lemma

Page 15: Provable Security II - Yu Yuyuyu.hk/files/slide2.pdf · Security definition via indistinguishability experiment •Encryption scheme: Π=(Gen,Enc,Dec) •The adversarial indistinguishability

Universal Hash Functions and Leftover Hash Lemma

Page 16: Provable Security II - Yu Yuyuyu.hk/files/slide2.pdf · Security definition via indistinguishability experiment •Encryption scheme: Π=(Gen,Enc,Dec) •The adversarial indistinguishability

Universal Hash Functions and Leftover Hash Lemma (cont’d)

• Informally, universal hash H is an 𝑙, 𝑘, 𝑘 − 𝑑, log 𝐻 , 2−𝑑

2−1 -extractor

Page 17: Provable Security II - Yu Yuyuyu.hk/files/slide2.pdf · Security definition via indistinguishability experiment •Encryption scheme: Π=(Gen,Enc,Dec) •The adversarial indistinguishability
Page 18: Provable Security II - Yu Yuyuyu.hk/files/slide2.pdf · Security definition via indistinguishability experiment •Encryption scheme: Π=(Gen,Enc,Dec) •The adversarial indistinguishability

Extending the LHL to the conditional case

Page 19: Provable Security II - Yu Yuyuyu.hk/files/slide2.pdf · Security definition via indistinguishability experiment •Encryption scheme: Π=(Gen,Enc,Dec) •The adversarial indistinguishability

Privacy Amplification: an application of LHL

Page 20: Provable Security II - Yu Yuyuyu.hk/files/slide2.pdf · Security definition via indistinguishability experiment •Encryption scheme: Π=(Gen,Enc,Dec) •The adversarial indistinguishability

Some exercises

Page 21: Provable Security II - Yu Yuyuyu.hk/files/slide2.pdf · Security definition via indistinguishability experiment •Encryption scheme: Π=(Gen,Enc,Dec) •The adversarial indistinguishability

more exercises

Page 22: Provable Security II - Yu Yuyuyu.hk/files/slide2.pdf · Security definition via indistinguishability experiment •Encryption scheme: Π=(Gen,Enc,Dec) •The adversarial indistinguishability

Advanced readings

• Non-malleable extractors

• Leftover hash lemma, revisited.