55
Extractable Functions Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen

Extractable Functions

  • Upload
    yvon

  • View
    88

  • Download
    0

Embed Size (px)

DESCRIPTION

Extractable Functions. Nir Bitansky , Ran Canetti, Omer Paneth , Alon Rosen. Largest Known Prime. 2 57,885,161  − 1. Electronic Frontier Foundation offers $250,000 prize for a prime with at least a billion digits. - PowerPoint PPT Presentation

Citation preview

Page 1: Extractable Functions

Extractable Functions

Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen

Page 2: Extractable Functions

Largest Known Prime

257,885,161 − 1

Electronic Frontier Foundation offers $250,000 prize for a prime with at least a billion

digits“The first number larger then that is not divisible

by any number other than 1 and itself”

Page 3: Extractable Functions

Knowledge

Algorithm

Knowledge

Polynomial TimeExtraction Procedure

Page 4: Extractable Functions

Proofs of Knowledge

𝑃 𝑉𝑥∈ℒ

Witness Extraction Hide the Witness

Secrecy : Zero-Knowledge \ Witness indistinguishability

Goal: Extract knowledge that is not publicly available

Page 5: Extractable Functions

CCA Encryption

𝐴𝑃𝐾𝐸𝑛𝑐 (𝑏)

𝑏

𝐷𝑒𝑐𝐸𝑛𝑐 (𝑥)

𝑥

ReductionTo CPA

Extraction𝑥

Page 6: Extractable Functions

More Knowledge

Zero-knowledge Proofs, Signatures, Non-malleable Commitments, Multi-party Computation, Obfuscation,…

𝐴Reduction

Extraction𝑥

Page 7: Extractable Functions

How to Extract?

Algorithm

Knowledge

Extraction?

Page 8: Extractable Functions

Extraction by Interaction

Or : Black-Box Extraction

Adversary Extraction

Public Parameters

Page 9: Extractable Functions

Out of Reach Applications

𝑃 𝑉𝑃 𝑉

3-MessageZero-Knowledge

2-MessageSuccinct Argument

(SNARG)

Page 10: Extractable Functions

Out of Reach Applications

𝑃 𝑉𝑃 𝑉

[Goldreich-Krawczyk][Gentry-Wichs]

Black-Box Security Proof is Impossible

Page 11: Extractable Functions

Knowledge of Exponent

Adversary𝑔 , h𝑔𝑥 , h𝑥

𝑥 Extraction

[Damgård 92]

Non-Black-Box

Extraction

Page 12: Extractable Functions

Applications of KEA

3-MessageZero-Knowledge

2-MessageSuccinct Argument

(SNARG)

Knowledge of Exponent Assumption* (KEA) *and

variants

[HT98,BP04,Mie08,G10,L12,BCCT13,GGPR13,BCIOP13]

Page 13: Extractable Functions

Extractable Functions

Adversary𝑘←$

𝑓 𝑘(𝑥)𝑥 Extraction

A family of function is extractable if:

[Canetti-Dakdouk 08]

Page 14: Extractable Functions

Remarks on EF

• KEA is an example for EF.• We want EF that are also one-

way.• The image of should be

sparse.Adversary

𝑘←$

𝑓 𝑘(𝑥)𝑥 Extraction

OWF, CRHF

Page 15: Extractable Functions

Applications of EF

3-MessageZero-Knowledge

2-MessageSuccinct Argument

(Privately Verifiable)

Knowledge of Exponent

Extractable One-Way Functions (EOWF)

Extractable Collision-Resistant Hash Functions (ECRH)

[BCCT12,GLR12,DFH12]

Page 16: Extractable Functions

What is missing?

• Clean assumptions • Candidates• Strong applications

Page 17: Extractable Functions

A Reduction Using EF

𝐴Reduction

𝐸𝑥

Assuming:

𝑘←$

𝑓 𝑘(𝑥)

Page 18: Extractable Functions

Do Extractable One-Way

Functions with an Explicit Extractor

Exist?

Page 19: Extractable Functions

It depends on the Auxiliary Input.

Page 20: Extractable Functions

Example: Zero-Knowledge

𝑃 𝑉𝑥∈ℒ𝑘𝑓 𝑘 (𝑡 )

𝑥

Auxiliary input

Page 21: Extractable Functions

Definition of EF with A.I.For every and auxiliary inputthere exist and auxiliary inputsuch that for every auxiliary input :

Page 22: Extractable Functions

Types of A.I.For every and auxiliary inputthere exist and auxiliary inputsuch that for every auxiliary input :

Individual \ CommonBounded \ Unbounded

Page 23: Extractable Functions

What type of A.I.

do we need?

Page 24: Extractable Functions

Example: Zero-KnowledgeZero-Knowledge:For every there exists a simulator such that for every , For need bounded A.I.For sequential composition need unbounded A.I. What you get from individual A.I.:For every and every there exists a simulator such that

Page 25: Extractable Functions

PossibleImpossible Open

EOWF* with bounded A.I.:EOWF with unbounded common A.I.:

Subexp-LWEIndistinguishability Obfuscation

Explicit ExtractorDelegation for P from Subexp-PIR[Kalai-Raz-Rothblum13]

Page 26: Extractable Functions

Generalized EOWF

EOWF* = Privately-Verifiable Generalized EOWF1. EOWF* suffices for applications of EOWF.2. The impossibility results holds also for EOWF* 3. Can remove * assuming publicly-verifiable delegation for P (P-certificates)

Page 27: Extractable Functions

Application

3-Message Zero-KnowledgeEOWF

3-Message Zero-Knowledge

For verifiers w. bounded A.I .

EOWF withbounded

A.I.

EOWF* withbounded

A.I.

⇒⇒

[BCCGLRT13]

Page 28: Extractable Functions

Construction

Survey

Impossibility

Page 29: Extractable Functions

Construction

EOWF* with Bounded A.I fromPrivately-Verifiable Delegation for P

EOWF with Bounded A.I fromPublicly-Verifiable Delegation for P

Page 30: Extractable Functions

First Attempt• OWF • Extraction from

(no restriction on space or running time)

• Single function - No key (impossible for unbounded A.I)

Page 31: Extractable Functions

First Attempt

𝑓 (𝑖 , 𝑠)=¿

𝑖 ,𝑠∈ {0 ,1 }𝑛 , PRG: {0 ,1 }𝑛→ {0 ,1 }𝑛

Page 32: Extractable Functions

First Attempt

𝑓 (𝑖 , 𝑠)={PRG (𝑠 )     if    𝑖≠0𝑛

𝑠 (1𝑛 ) if 𝑖=0𝑛

𝑖 ,𝑠∈ {0 ,1 }𝑛 , PRG: {0 ,1 }𝑛→ {0 ,1 }𝑛

Interpert as a program outputting bits

Page 33: Extractable Functions

Extraction

𝐴 (1𝑛)→ 𝑦

𝑓 (𝑖 , 𝑠)={PRG (𝑠 )     if    𝑖≠0𝑛

𝑠 (1𝑛 ) if 𝑖=0𝑛

𝐸 (1𝑛 )→0𝑛 , 𝐴

𝑓 (0𝑛 ,𝐴 )=𝐴 (1𝑛)=𝑦

()

Page 34: Extractable Functions

One-Wayness

𝑓 (𝑖 , 𝑠)={PRG (𝑠 )     if    𝑖≠0𝑛

𝑠 (1𝑛 ) if 𝑖=0𝑛

1. The image of is sparse

Page 35: Extractable Functions

Problem

is not poly-time computable!

𝑓 (𝑖 , 𝑠)={𝑃 𝑅𝐺𝑠 (𝑠 )     if    𝑖≠0𝑛

𝑠 (1𝑛) if 𝑖=0𝑛

Solution: Delegation for P(following the protocols of

[B01,BLV03])

Page 36: Extractable Functions

Delegation for P

𝑃 𝑉Gen ($ )→𝜎

poly (𝑇𝑀 ) polylog (𝑇𝑀 )<𝑛

𝜋 :𝑀 (1𝑛)→ 𝑦

Page 37: Extractable Functions

Final Construction 𝑓 (𝑖 , 𝑠 ,𝑟 , 𝑦∗ ,𝜎 ∗ ,𝜋∗)

𝑖=0𝑛𝑖≠0𝑛

Output:

If is a valid proof for under Output:

Page 38: Extractable Functions

Extraction

𝐴 (1𝑛)→(𝑦 ,𝜎 )

When is a proof that under 𝐸 (1𝑛 )→(0𝑛 ,𝐴 ,𝑟 , 𝑦 ,𝜎 ,𝜋∗)

𝑓

Page 39: Extractable Functions

One-Wayness

1. The image of is sparse2. Soundness of delegation

Page 40: Extractable Functions

Generalized EOWF𝑅 ( 𝑓 (𝑥 ) ,𝑥 ′ )Hardness: For a random it is hard to find Extraction:For every there exists such that

Privately-Verifiable GEOWF:Can efficiently test only given

Page 41: Extractable Functions

Impossibility

Assuming indistinguishability obfuscation,

there is not EOWF with unbounded common auxiliary input

Page 42: Extractable Functions

Intuition

Adversary 𝑘𝑓 𝑘 (𝑥 )𝑥 AdversaryNon-Black-

Box Extractor

Common A.I Universal ExtractorThere exists s.t. for every and :

Page 43: Extractable Functions

Plan

1. Assuming virtual black-box obfuscation [Goldreich, Hada-Tanaka]

2. Assuming indistinguishability obfuscation

Page 44: Extractable Functions

Common A.I.

𝐴𝑘 ,𝑧

𝑓 𝑘(𝑥)

𝑥𝐸

Page 45: Extractable Functions

Universal Extraction

𝑓 𝑘(𝑥)

𝑥Universa

l Extracto

r

𝑘 ,𝑧=¿𝐴

Universal Adversary𝐴𝑘

Page 46: Extractable Functions

Black-Box Extraction

𝑓 𝑘(𝑥)

𝑥Universa

l Extracto

r

𝑘 ,𝑧=¿𝐴

Universal Adversary𝑘 𝐴

Black-box obfuscation

Page 47: Extractable Functions

Black-Box Extraction

Black-Box Extractor

𝑘Adversary𝑥𝑘=𝑃𝑅𝐹 𝑠(𝑘) 𝑓 𝑘(𝑥𝑘)

𝑥𝑘 Adversary𝑥𝑘=𝑈𝑛

Page 48: Extractable Functions

Indistinguishability Obfuscation

𝐶1𝐶2 ≡

Compute the same function

Page 49: Extractable Functions

Indistinguishability Obfuscation

Extractor

𝑘Adversary𝑥𝑘=𝑃𝑅𝐹 𝑠(𝑘) 𝑓 𝑘(𝑥𝑘)

𝑥𝑘

Prove that the obfuscation hides

Page 50: Extractable Functions

Indistinguishability Obfuscation

Extractor

𝑘 𝑥𝑘=𝑃𝑅𝐹 𝑠(𝑘) 𝑓 𝑘(𝑥𝑘)𝑥𝑘

Extractor

𝑘 𝑓 𝑘(𝑥𝑘)𝑥𝑘

hides Alternative adversary

Page 51: Extractable Functions

Alternative Adversary Using the Sahai-Waters puncturing technique

𝑃𝑅𝐹 𝑠 𝑓 𝑘

𝑘 𝑓 𝑘(𝑥𝑘)

Page 52: Extractable Functions

Indistinguishability Obfuscation

Extractor

𝑘 𝑓 𝑘(𝑥𝑘)𝑥𝑘

hides

Page 53: Extractable Functions

Back to the Construction?

Page 54: Extractable Functions

PossibleImpossible Open

EOWF withunbounded individual A.I. Extractable CRHF\COM\1-to-1 OWF

Page 55: Extractable Functions

Thank You