33
Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1 , Limor Lahiani 1 , Moti Yung 2 Department of Computer Science 1 Ben-Gurion University , Israel 2 Columbia University, NYC

Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

Embed Size (px)

Citation preview

Page 1: Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

Secret Swarm Unit Reactive k-Secret Sharing

INDOCRYPT 2007Shlomi Dolev1, Limor Lahiani1, Moti

Yung2

Department of Computer Science 1 Ben-Gurion University , Israel

2 Columbia University, NYC

Page 2: Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

Talk Outline• Introduction & motivation

• The problem

• Swarm settings

• Reactive k-secret sharing solutions• Polynomial based solution

• Chinese remaindering based solution

• Virtual I/O automaton

• Conclusions

Page 3: Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

Intro: What is a SwarmA collection of processorscollaborating on a mission

UAVsMobile sensors

Processors / RFIDs

Page 4: Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

Intro: Swarm Motivation

• Robustness

• Fault tolerance

• Security

Page 5: Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

Talk Outline• Introduction & motivation

• The problem

• Swarm settings

• Reactive k-secret sharing solutions• Polynomial based solution

• Chinese remaindering based solution

• Virtual I/O automaton

• Conclusions

Page 6: Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

Swarm’s Global Secret

Distributed secret shares

Page 7: Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

Swarm’s Global Secret

Distributed secret shares

p

Page 8: Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

The Problem

Can members modify the global secret without knowing the secret before and after the change

and with no internal communication?

THINK AGAIN!

Page 9: Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

Talk Outline• Introduction & motivation

• The problem

• Swarm settings

• Reactive k-secret sharing solutions• Polynomial based solution

• Chinese remaindering based solution

• Virtual I/O automaton

• Conclusions

Page 10: Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

Swarm Settings (1)• n swarm members • Distributed secret shares

• Any less thank k cannot reveal• At least k to reveal (p)

• Compromising adversary• Listening (no sending)• Compromise at most f < k

• Corruptive adversary• Listening (no sending) • Corrupt at most f < k

Page 11: Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

Swarm Settings (2)

• No internal communication• Avoided/safe area

• Simultaneous external input• Controller• Event observed/sensed

X X

X

X

Page 12: Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

Swarm Settings (3)Swarm input actions

set()

step()

regainConsistencyRequest()

joinRequest()

joinReply()

regainConsistencyReply()

Page 13: Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

Talk Outline• Introduction & motivation

• The problem

• Swarm settings

• Reactive k-secret sharing solutions• Polynomial based solution

• Chinese remaindering based solution

• Virtual I/O automaton

• Conclusions

Page 14: Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

Talk Outline• Introduction & motivation

• The problem

• Swarm settings

• Reactive k-secret sharing solutions• Polynomial based solution

• Chinese remaindering based solution

• Virtual I/O automaton

• Conclusions

Page 15: Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

Our Polynomial Based Solution Shamir’s (k,n)-threshold scheme

• Secret: Globl counter GC• p(x) = a0+a1x+a2x2+…+akxk

• a1..ak are random

• Secret: a0 = GC

• Secret distribution• n distinct points: (xi,p(xi)), xi 0

• GC = p(0)• Any k points reveals the secret • No less than k reveals it

Page 16: Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

Our Polynomial Based counter

Increment counter: GC GC+δ• p(x) = GC+a1x+a2x2+…+akxk

• q(x) = p(x) + δ • q(x) is defined by xi,p(xi)+δ

Multiply : Gc GC·μ• p(x) = GC+a1x+a2x2+…+ akxk

• q(x) = p(x)·μ • q(x) is defined by xi,p(xi)·μ

Page 17: Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

Our Polynomial based solution

Swarm input: setset(xi,p(xi))

Page 18: Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

Our Polynomial based solution

Swarm input: stepstep()

xi, p(xi) xi, p(xi)+

And the same for multiplication by μ

Page 19: Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

Our Polynomial based solutioninput: regain consistency request

regainConsistencyReq()

leader

xi, p(xi)

Page 20: Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

Our Polynomial based solutioninput: regain consistency request

leader

Page 21: Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

Our Polynomial based solutioninput: regain consistency reply

leader

xi, p(xi)

Page 22: Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

Our Polynomial based solutioninput: join request & reply

joinReq()

joinReply()

Page 23: Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

Our Polynomial Based Solution(Corruptive Adversary)

• Berlekamp-Welch• Polynomial p(x) of degree k• k+r points• e errors• Decode p(x) if e r/2

• Polynomial based solution• Decode p(x) if f (n–k–lp)/2 • Where lp = num of leaving processes

between two regainConsistency ops.

Page 24: Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

Talk Outline• Introduction & motivation

• The Problem

• Swarm settings

• Reactive k-secret sharing solutions• Polynomial based solution

• Chinese remaindering based solution

• Virtual I/O automaton

• Conclusions

Page 25: Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

Our Chinese Remainder Based Solution

• Swarm secret: global counter GC• p1 < p2 < … < pk relatively primes

•Mk = p1p2… pk

• 0 GC Mk • GC r1,p1, r2,p2,…, rl ,pk [CRT]• ri = GC mod pi • GC r1, r2,…,rk

• Secret share ri, pi, ri = GC mod pi

Page 26: Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

Swarm Input

pixi , ri p(xi)

set()

step()

regainConsistencyRequest()

joinRequest()

joinReply()

regainConsistencyReply()

Page 27: Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

Our Chinese RemainderBased Solution

(Corruptive adversary)• Mandelbaum

• p1 < p2 <…< pk <…< pk+r , relatively primes

• Mk = p1p2… pk

• 0 GC Mk

• e errors• Detect: e r• Correct: e r/2

• Chinese remainder based solution• Detect: f n-k-lp • Correct: f (n-k-lp)/2

Page 28: Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

Talk Outline• Introduction & motivation

• The problem

• Swarm settings

• Reactive k-secret sharing solutions• Polynomial based solution

• Chinese remaindering based solution

• Virtual I/O automaton

• Conclusions

Page 29: Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

Virtual I/O Automaton• I/O Automaton A

• Implemented by the swarm• Global state (Global secret)

• Current state of A• Replicated at least T n times• Regain consistency ensures:

• At least T+lp+f replicas of the global state• At most T-f-1 replicas of any other state

• Global output• Output with at least T n replicas • Threshold device

Page 30: Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

Virtual I/O Automaton

• Secret share• Tuple si1,si2,…,sim of candidates• At most 1 state is the global state

• Step()• transition step on si1,si2,…,sim and • New tuple of candidates: s’i1,s’i2,…,s’im• Output actions oi1,oi2,…,oim• At least T replicas of the global output

Page 31: Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

Talk Outline• Introduction & motivation

• The problem

• Swarm Settings

• Reactive k-secret sharing solutions• Polynomial based solution

• Chinese remaindering based solution

• Virtual I/O automaton

• Conclusions

Page 32: Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

Conclusions• polynomial based solution

• Addition & multiplication

• Error correcting [Berlekamp-Welch]

• Chinese remaindering based solution• Addition

• Error correcting [Mandelbaum]

• Virtual I/O automaton• Mask the global state

• Further results: Vandermonde matrix• Support XOR operations

Page 33: Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,

Thank You!