A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme...

18
A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme Dana Dachman-Soled University of Maryland

Transcript of A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme...

Page 1: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme Dana Dachman-Soled University of Maryland.

A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1)

Encryption Scheme

Dana Dachman-SoledUniversity of Maryland

Page 2: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme Dana Dachman-Soled University of Maryland.

CPA, CCA1 and CCA2

Page 3: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme Dana Dachman-Soled University of Maryland.

CPA, CCA1 and CCA2

๐‘๐‘˜ ,๐ธ๐‘›๐‘๐‘๐‘˜(๐‘š0) ๐‘๐‘˜ ,๐ธ๐‘›๐‘๐‘๐‘˜(๐‘š1)

โ‰ˆ

CPA-secure Public Key Encryption

Page 4: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme Dana Dachman-Soled University of Maryland.

CPA, CCA1 and CCA2

โ‰ˆ

CCA1-secure Public Key Encryption

๐‘๐‘˜ ๐‘๐‘˜

๐‘ ๐‘˜ ๐‘ ๐‘˜

๐‘๐‘˜ ,๐ธ๐‘›๐‘๐‘๐‘˜(๐‘š0) ๐‘๐‘˜ ,๐ธ๐‘›๐‘๐‘๐‘˜(๐‘š1)

Page 5: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme Dana Dachman-Soled University of Maryland.

CPA, CCA1 and CCA2

โ‰ˆ

CCA2-secure Public Key Encryption

๐‘๐‘˜ ๐‘๐‘˜

๐‘ ๐‘˜ ๐‘ ๐‘˜๐‘โ‰ ๐‘โˆ— ๐‘โ‰ ๐‘โˆ—

๐‘๐‘˜ ,๐ธ๐‘›๐‘๐‘๐‘˜(๐‘š1)๐‘๐‘˜ ,๐ธ๐‘›๐‘๐‘๐‘˜(๐‘š0)

Page 6: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme Dana Dachman-Soled University of Maryland.

Does CPA Security Imply CCA Security?

โ€ข [Naor, Yung 90], [Dolev, Dwork, Naor, 00]โ€“ CPA + NIZK -> CCA1 and CCA2

โ€ข Partial black-box separationโ€“ [Gertner, Malkin, Myers, 07] no โ€œshieldingโ€ construction of CCA1

from CPA.โ€ข Question remains open!โ€“ Even whether CCA1 -> CCA2 is not known.โ€“ Long line of work showing black-box constructions of CCA2

encryption from lower level primitives.โ€ข [Peikert, Waters 11], [Rosen, Segev, 10], [Kiltz, Mohassel, Oโ€™Neill, 10]. . .

โ€“ Our work continues this line of research.

Page 7: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme Dana Dachman-Soled University of Maryland.

Our Results

โ€ข Note: Construction is black-box, but reduction makes non-black-box use of the CCA2 adversary.

โ€ข [Myers, Sergi, shelat, 12]: Black-box construction of cNM-CCA1-secure encryption from the same assumptions.

โ€ข Our contribution: Extend to full CCA2 setting.โ€ข Construction of a CCA2 scheme from encryption schemes

with โ€œweakerโ€ security and no additional assumptions.

Theorem: There is a black-box construction of CCA2-secure encryption from plaintext aware (sPA1) and weakly

simulatable public key encryption.

Page 8: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme Dana Dachman-Soled University of Maryland.

Our Assumptionsโ€”Plaintext Awareness = ciphertext creator, = extractor

Experiment โ€ข pairs of public + secret keys are generatedโ€ข get random coins and public keys as inputโ€ข gets oracle access to decrypts for โ€ข Let be the set of queries asked by โ€ข Experiment outputs 1 if decrypted all queries in

โ€œcorrectly.โ€

Encryption scheme is -secure if for every ppt , there exists an extractor s.t. experiment outputs 0 with negligible

probability.

I โ€œknowsโ€ the underlying plaintext.Note: uses in a non-

black-box manner

Note: No auxiliary input

Page 9: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme Dana Dachman-Soled University of Maryland.

Our Assumptionsโ€”Weak Simulatability

โ€ข samples โ€œciphertextsโ€ without knowing the plaintext.โ€ข on input and valid ciphertext outputs coins for โ€ข Correctness:

Candidate constructions satisfying both assumptions ([MSs12]):โ€ข Damgard Elgamal Encryption scheme (DEG)โ€ข Cramer-Shoup lite (CS-lite)

( ๐‘“ โˆ’1 (๐‘๐‘˜ ,๐‘=๐ธ๐‘›๐‘๐‘๐‘˜ (๐‘š ) ) ,๐‘ ) (๐‘Ÿ , ๐‘“ (๐‘๐‘˜ ,๐‘Ÿ ) )โ‰ˆ

Page 10: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme Dana Dachman-Soled University of Maryland.

Overview: CCA Proof StrategiesHyrid Public Key Challenge Ciphertext Decryption Oracle

Simulated Simulated Simulated

.

.

.PPT adversary cannot

distinguish consecutive hybrids.

To reduce to security of underlying encryption scheme,

must simulate decryption oracle without knowing secret key.

Main Challenge: Constructing the

simulated decryption oracle

Page 11: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme Dana Dachman-Soled University of Maryland.

CCA1 from Plaintext Awareness?

โ€ข Trivial: Plaintext Aware scheme is itself CCA1-secure!โ€“ To simulate the decryption oracle without

knowing the secret key, use the Extractor.

Page 12: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme Dana Dachman-Soled University of Maryland.

CCA2 from Plaintext Awareness?โ€ข Is the plaintext aware scheme itself also CCA2-secure?โ€ข An attempt: As before, simulate decryption oracle using

Extractor.โ€ข Problem: Extractor is no longer guaranteed to work in the

second phase!โ€“ Once adversary receives challenge ciphertext , Extractor can fail.โ€“ E.g. adversary can re-randomize and submit to oracle. โ€“ Note that our candidate Plaintext-Aware schemes are

homomorphic! So these attacks are possible.โ€ข Extractor seems to be useless.

โ€“ At first glance, seems as hard as proving that CCA1 -> CCA2.โ€“ No: Having a faulty extractor algorithm is better than no

extractor.

Page 13: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme Dana Dachman-Soled University of Maryland.

Our ConstructionCombines techniques from [Hohenberger, Lewko, Waters 12] and [Myers, Sergi, shelat 12]

๐ถ๐‘‡ ๐‘– ๐‘›0=๐ธ๐‘›๐‘๐‘ ๐‘˜๐‘– ๐‘›0

(๐‘ 0) 2. Inner ciphertexts: ๐ถ๐‘‡ ๐‘– ๐‘›1

=๐ธ๐‘›๐‘๐‘๐‘˜๐‘– ๐‘›1(๐‘ 1)

๐‘ 0โŠ•๐‘ 1=(๐‘šโˆจยฟ๐‘Ÿ )

๐ถ๐‘‡1 ๐ถ๐‘‡ 2 ๐ถ๐‘‡ 3

๐‘Ÿ1 ,โ€ฆ๐‘Ÿ๐‘˜=๐‘๐‘Ÿ๐‘”(๐‘Ÿ )

3. Outer ciphertexts:

encryptions of under and randomness

. . . ๐ถ๐‘‡ ๐‘˜

Public keys are chosen based

on

1. Generate for one-time signature scheme

4. Compute

5. Output:

Page 14: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme Dana Dachman-Soled University of Maryland.

Proof Intuition

โ€ข Idea: Use extractor to simulate oracle even in the CCA2 case.

โ€ข Now the extractor may answer incorrectly after the adversary receives the challenge ciphertext.

โ€ข Call this event BadExtEvent

Page 15: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme Dana Dachman-Soled University of Maryland.

Proof Intuition

โ€ข Sequence of hybrids: Show that BadExtEvent occurs with negligible probability in final hybrid.

โ€ข For each hybrid, show that probability BadExtEvent occurs differs by a negligible amount.

โ€ข In order to prove this, reduction must always be able to detect a bad extraction event by comparing the output of the Extractor with the output of .

Page 16: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme Dana Dachman-Soled University of Maryland.

Hard Case:Detecting BadExtEvent in CPA hybrid

Reduction to CPA security of inner ciphertexts

โ€ข Idea for how to detect BadExtEvent: โ€“ Randomly choose โ€“ Show that the first BadExtEvent occurs on decryption of with

probability .โ€“ Say . CPA adv. knows secret key for but not

โ€ข Can detect first BadExtEvent on . โ€ข Places challenge ciphertext in position.

โ€“ Note that in both hybrids, is individually uniformly distributed.โ€“ Simulated oracle answers correctly until the first BadExtEvent.

๐‘ 0=๐‘Ÿ๐‘Ž๐‘›๐‘‘ ๐‘ 1=๐‘Ÿ๐‘Ž๐‘›๐‘‘ ๐‘ 0=๐‘Ÿ๐‘Ž๐‘›๐‘‘ ๐‘ 1=๐‘ 0โŠ•(๐‘šโˆจยฟ๐‘Ÿ )โ‰ˆ๐ถ๐‘‡ ๐‘– ๐‘›0

โ‘ โˆ— ๐ถ๐‘‡ ๐‘– ๐‘›1โ‘ โˆ— ๐ถ๐‘‡ ๐‘– ๐‘›0

โ‘ โˆ— ๐ถ๐‘‡ ๐‘– ๐‘›1โ‘ โˆ—

XOR to random XOR to

๐‘ 0=๐‘Ÿ๐‘Ž๐‘›๐‘‘ ๐‘ 0=๐‘Ÿ๐‘Ž๐‘›๐‘‘

Page 17: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme Dana Dachman-Soled University of Maryland.

Future Directions

โ€ข Can high-level proof techniques be useful for constructing CCA2 from CCA1?โ€“ Non-black-box use of the adversary.โ€“ Detecting a โ€œbad eventโ€ without fully simulating

the decryption oracle.โ€ข Can we reduce the underlying assumptions of

our construction?

Page 18: A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme Dana Dachman-Soled University of Maryland.

Thank you!