780 research outputs found
A min-entropy uncertainty relation for finite size cryptography
Apart from their foundational significance, entropic uncertainty relations
play a central role in proving the security of quantum cryptographic protocols.
Of particular interest are thereby relations in terms of the smooth min-entropy
for BB84 and six-state encodings. Previously, strong uncertainty relations were
obtained which are valid in the limit of large block lengths. Here, we prove a
new uncertainty relation in terms of the smooth min-entropy that is only
marginally less strong, but has the crucial property that it can be applied to
rather small block lengths. This paves the way for a practical implementation
of many cryptographic protocols. As part of our proof we show tight uncertainty
relations for a family of Renyi entropies that may be of independent interest.Comment: 5+6 pages, 1 figure, revtex. new version changed author's name from
Huei Ying Nelly Ng to Nelly Huei Ying Ng, for consistency with other
publication
A transform of complementary aspects with applications to entropic uncertainty relations
Even though mutually unbiased bases and entropic uncertainty relations play
an important role in quantum cryptographic protocols they remain ill
understood. Here, we construct special sets of up to 2n+1 mutually unbiased
bases (MUBs) in dimension d=2^n which have particularly beautiful symmetry
properties derived from the Clifford algebra. More precisely, we show that
there exists a unitary transformation that cyclically permutes such bases. This
unitary can be understood as a generalization of the Fourier transform, which
exchanges two MUBs, to multiple complementary aspects. We proceed to prove a
lower bound for min-entropic entropic uncertainty relations for any set of
MUBs, and show that symmetry plays a central role in obtaining tight bounds.
For example, we obtain for the first time a tight bound for four MUBs in
dimension d=4, which is attained by an eigenstate of our complementarity
transform. Finally, we discuss the relation to other symmetries obtained by
transformations in discrete phase space, and note that the extrema of discrete
Wigner functions are directly related to min-entropic uncertainty relations for
MUBs.Comment: 16 pages, 2 figures, v2: published version, clarified ref [30
Communication Lower Bounds for Statistically Secure MPC, with or without Preprocessing
We prove a lower bound on the communication complexity of unconditionally secure multiparty computation, both in the standard model with parties of which are corrupted, and in the preprocessing model with . In both cases, we show
that for any there exists a Boolean circuit with gates, where any secure protocol implementing must communicate bits,
even if only passive and statistical security is required.
The results easily extends to constructing similar circuits over any fixed finite field.
This shows that for all sizes of circuits, the overhead of all known protocols when is maximal is inherent. It also shows that security comes at a price: the circuit we consider could namely be computed among parties with communication only bits if no security was required.
Our results extend to the case where the threshold is suboptimal. For the honest majority case, this shows that the known optimizations via packed secret-sharing can only be obtained
if one accepts that the threshold is for a constant .
For the honest majority case, we also show an upper bound that matches the lower bound up to a constant factor (existing upper bounds are a factor off for Boolean circuits)
Tests for Establishing Security Properties
Ensuring strong security properties in some cases requires participants to carry out tests during the execution of a protocol. A classical example is electronic voting: participants are required to verify the presence of their ballots on a bulletin board, and to verify the computation of the election outcome. The notion of certificate transparency is another example, in which participants in the protocol are required to perform tests to verify the integrity of a certificate log.
We present a framework for modelling systems with such `testable properties', using the applied pi calculus. We model the tests that are made by participants in order to obtain the security properties. Underlying our work is an attacker model called ``malicious but cautious'', which lies in between the Dolev-Yao model and the ``honest but curious'' model. The malicious-but-cautious model is appropriate for cloud computing providers that are potentially malicious but are assumed to be cautious about launching attacks that might cause user tests to fail
Implementation of two-party protocols in the noisy-storage model
The noisy-storage model allows the implementation of secure two-party
protocols under the sole assumption that no large-scale reliable quantum
storage is available to the cheating party. No quantum storage is thereby
required for the honest parties. Examples of such protocols include bit
commitment, oblivious transfer and secure identification. Here, we provide a
guideline for the practical implementation of such protocols. In particular, we
analyze security in a practical setting where the honest parties themselves are
unable to perform perfect operations and need to deal with practical problems
such as errors during transmission and detector inefficiencies. We provide
explicit security parameters for two different experimental setups using weak
coherent, and parametric down conversion sources. In addition, we analyze a
modification of the protocols based on decoy states.Comment: 41 pages, 33 figures, this is a companion paper to arXiv:0906.1030
considering practical aspects, v2: published version, title changed in
accordance with PRA guideline
Secure multiparty PageRank algorithm for collaborative fraud detection
Collaboration between financial institutions helps to improve detection of fraud. However, exchange of relevant data between these institutions is often not possible due to privacy constraints and data confidentiality. An important example of relevant data for fraud detection is given by a transaction graph, where the nodes represent bank accounts and the links consist of the transactions between these accounts. Previous works show that features derived from such graphs, like PageRank, can be used to improve fraud detection. However, each institution can only see a part of the whole transaction graph, corresponding to the accounts of its own customers. In this research a new method is described, making use of secure multiparty computation (MPC) techniques, allowing multiple parties to jointly compute the PageRank values of their combined transaction graphs securely, while guaranteeing that each party only learns the PageRank values of its own accounts and nothing about the other transaction graphs. In our experiments this method is applied to graphs containing up to tens of thousands of nodes. The execution time scales linearly with the number of nodes, and the method is highly parallelizable. Secure multiparty PageRank is feasible in a realistic setting with millions of nodes per party by extrapolating the results from our experiments
More is Less: Perfectly Secure Oblivious Algorithms in the Multi-Server Setting
The problem of Oblivious RAM (ORAM) has traditionally been studied in a
single-server setting, but more recently the multi-server setting has also been
considered. Yet it is still unclear whether the multi-server setting has any
inherent advantages, e.g., whether the multi-server setting can be used to
achieve stronger security goals or provably better efficiency than is possible
in the single-server case.
In this work, we construct a perfectly secure 3-server ORAM scheme that
outperforms the best known single-server scheme by a logarithmic factor. In the
process, we also show, for the first time, that there exist specific algorithms
for which multiple servers can overcome known lower bounds in the single-server
setting.Comment: 36 pages, Accepted in Asiacrypt 201
Turbospeedz: Double Your Online SPDZ! Improving SPDZ using Function Dependent Preprocessing
Secure multiparty computation allows a set of mutually distrusting parties to securely compute a function of their private inputs, revealing only the output, even if some of the parties are corrupt. Recent years have seen an enormous amount of work that drastically improved the concrete efficiency of secure multiparty computation protocols. Many secure multiparty protocols work in an ``offline-online model. In this model, the computation is split into two main phases: a relatively slow ``offline phase , which the parties execute before they know their input, and a fast ``online phase , which the parties execute after receiving their input.
One of the most popular and efficient protocols for secure multiparty computation working in this model is the SPDZ protocol (Damgaard et al., CRYPTO 2012). The SPDZ offline phase is function independent, i.e., does not requires knowledge of the computed function at the offline phase. Thus, a natural question is: can the efficiency of the SPDZ protocol be improved if the function is known at the offline phase?
In this work, we answer the above question affirmatively. We show that by using a function dependent preprocessing protocol, the online communication of the SPDZ protocol can be brought down significantly, almost by a factor of 2, and the online computation is often also significantly reduced. In scenarios where communication is the bottleneck, such as strong computers on low bandwidth networks, this could potentially almost double the online throughput of the SPDZ protocol, when securely computing the same circuit many times in parallel (on different inputs).
We present two versions of our protocol: Our first version uses the SPDZ offline phase protocol as a black-box, which achieves the improved online communication at the cost of slightly increasing the offline communication. Our second version works by modifying the state-of-the-art SPDZ preprocessing protocol, Overdrive (Keller et al., Eurocrypt 2018). This version improves the overall communication over the state-of-the-art SPDZ when the function is known at the offline phase
The Impossibility Of Secure Two-Party Classical Computation
We present attacks that show that unconditionally secure two-party classical
computation is impossible for many classes of function. Our analysis applies to
both quantum and relativistic protocols. We illustrate our results by showing
the impossibility of oblivious transfer.Comment: 10 page
Implementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering
If we assume that adversaries have unlimited computational capabilities, secure computation between mutually distrusting players can not be achieved using an error-free communication medium. However, secure multi-party computation becomes possible when a noisy channel is available to the parties. For instance, the Binary Symmetric Channel (BSC) has been used to implement Oblivious Transfer (OT), a fundamental primitive in secure multi-party computation. Current research is aimed at designing protocols based on real-world noise sources, in order to make the actual use of information-theoretically secure computation a more realistic prospect for the future. In this paper, we introduce a modified version of the recently proposed Binary Discrete-time Delaying Channel (BDDC), a noisy channel based on communication delays. We call our variant Reordering Channel (RC), and we show that it successfully models packet reordering, the common behavior of packet switching networks that results in the reordering of the packets in a stream during their transit over the network. We also show that the protocol implementing oblivious transfer on the BDDC can be adapted to the new channel by using a different sending strategy, and we provide a functioning implementation of this modified protocol. Finally, we present strong experimental evidence that reordering occurrences between two remote Internet hosts are enough for our construction to achieve statistical security against honest-but-curious adversaries
- …