secure one-way interactive communication€¦ · schulman’ 96 tolerates noise rate with constant...

37
SECURE ONE-WAY INTERACTIVE COMMUNICATION Abhinav Aggarwal Varsha Dani, Thomas Hayes, Jared Saia

Upload: others

Post on 26-Sep-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

SECURE ONE-WAY INTERACTIVE COMMUNICATION

Abhinav Aggarwal Varsha Dani, Thomas Hayes, Jared Saia

Page 2: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

PROBLEM STATEMENT

Alice Bob

Adversary

➤ Alice has a message of length L for Bob

➤ Adversary can flip T bits

➤ Adversary is oblivious

➤ Error tolerance 0 < ✏ < 1

Can the message be sent to Bob with :

➤ Probability of success , and

➤ small number of bits exchanged?

� 1� ✏

Page 3: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

OUR ASSUMPTIONS

➤ Both Alice and Bob know L and

➤ T is unknown

➤ Private channel

➤ Individual computation is instantaneous

Page 4: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

OUR MAIN RESULT

Expected number of bits exchanged between Alice and Bob :

Probability that Bob has the correct guess of Alice’s message upon termination � 1� ✏

L+O (T +min{(T + 1), L/ logL} log(L/✏))

Much better then ECC for small T!!

For constant ε

L+

(O(logL) for fixed T

⇥(T ) otherwise

Page 5: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

REED-SOLOMON CODES [RS]

➤ Degree d = ⌈ L / log L⌉ polynomial used to represent the message

➤ Bob needs at least (d+1) evaluations of this polynomial for reconstruction

➤ Polynomial constructed over field of size

(1/3)-ERROR CORRECTING CODES

➤ Corrects at most a third of total bits

➤ Multiplicative blowup of at most 2

➤ Forces the adversary to pay Θ(length of the message)

2dlogLe

Page 6: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

ALGORITHM

Alice Bob

Message polynomial

Page 7: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

ALGORITHM

Alice Bob

Message polynomial

ECC and AMD encoded fingerprint

Page 8: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

ALGORITHM

Alice Bob

Message polynomial

ECC and AMD encoded fingerprint

Echo of the fingerprint

Page 9: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

ALGORITHM

Alice Bob

Message polynomial

ECC and AMD encoded fingerprint

Terminate

Echo of the fingerprint

Page 10: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

ALGORITHM

Alice Bob

Message polynomial

ECC and AMD encoded fingerprint

Terminate

Echo of the fingerprint

Terminate

Page 11: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

ALGORITHM

Alice Bob

Message polynomial

ECC and AMD encoded fingerprint

Successful round…

Terminate

Echo of the fingerprint

Terminate

Page 12: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

FINGERPRINTING [NAOR]➤ Let r = random binary string, m = message of length ℓ

➤ Produces randomized fingerprints (r,F(r,m))

➤ Given probability of collision p, produces hash of length Θ(ℓ/p)

Page 13: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

ALGORITHM

Alice Bob

Message polynomial in plaintext

Page 14: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

ALGORITHM

Alice Bob

Message polynomial in plaintext

ECC and AMD encoded fingerprint

Page 15: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

ALGORITHM

Alice Bob

String of all zeros

Fingerprint mismatch

Message polynomial in plaintext

ECC and AMD encoded fingerprint

Page 16: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

ALGORITHM

Alice Bob

Noise

String of all zeros

Fingerprint mismatch

Message polynomial in plaintext

ECC and AMD encoded fingerprint

Page 17: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

ALGORITHM

Alice Bob

Noise

String of all zeros

Fingerprint mismatch

Message polynomial in plaintext

ECC and AMD encoded fingerprint

ECC encoded evaluation

ECC encoded evaluation

Page 18: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

ALGORITHM

Alice Bob

NoiseRe

peat

String of all zeros

Fingerprint mismatch

Message polynomial in plaintext

ECC and AMD encoded fingerprint

ECC encoded evaluation

ECC encoded evaluation

Page 19: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

ALGEBRAIC MANIPULATION DETECTION CODES [AMD]

➤ Enable detection of bit corruption

➤ Work only for private channels

➤ Encode a message m into a value m’

➤ Any bit flipping of m is detected with probability ≥ 1-δ

➤ Produces codewords of length |m’| = |m| + O(1/δ)

Page 20: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

ALGORITHM

Alice Bob

Message polynomial

Page 21: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

ALGORITHM

Alice Bob

Message polynomial

ECC and AMD encoded fingerprint

Page 22: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

ALGORITHM

Alice Bob

Message polynomial

Echo of the fingerprint

ECC and AMD encoded fingerprint

Page 23: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

ALGORITHM

Alice Bob

Message polynomial

Noise

Echo mismatch

Echo of the fingerprint

ECC and AMD encoded fingerprint

Page 24: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

ALGORITHM

Alice Bob

Message polynomial

ECC encoded evaluation

ECC encoded evaluation

Noise

Echo mismatch

Echo of the fingerprint

ECC and AMD encoded fingerprint

Page 25: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

ALGORITHM

Alice Bob

Message polynomial

ECC encoded evaluation

ECC encoded evaluation

Repe

atNoise

Echo mismatch

Echo of the fingerprint

ECC and AMD encoded fingerprint

Page 26: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

ALGORITHM (WORST CASE)

Alice Bob

Message polynomial

ECC and AMD encoded fingerprint

Echo of the fingerprint

Terminate

Page 27: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

ALGORITHM (WORST CASE)

Alice Bob

Message polynomial

ECC and AMD encoded fingerprint

Echo of the fingerprint

TerminateChannel not silent

Page 28: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

ALGORITHM (WORST CASE)

Alice Bob

Message polynomial

ECC and AMD encoded fingerprint

ECC encoded evaluation

ECC encoded evaluation

Echo of the fingerprint

Terminate

Channel not silent

Page 29: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

ALGORITHM (WORST CASE)

Alice Bob

Message polynomial

ECC and AMD encoded fingerprint

ECC encoded evaluation

ECC encoded evaluation

Echo of the fingerprint

Terminate

Channel not silent

String of all zeros

Page 30: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

ALGORITHM (WORST CASE)

Alice Bob

Message polynomial

ECC and AMD encoded fingerprint

ECC encoded evaluation

ECC encoded evaluation

Repe

at

Echo of the fingerprint

Terminate

Channel not silent

String of all zeros

Page 31: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

OUR NEW IDEAS➤ Handle unknown T

➤ Ensure high cost to adversary to delay termination

➤ Synchronization achieved implicitly

➤ Tradeoff between probability of failure and number of bits sent

➤ Distinguishing between “silence”, “noise” and codewords on the channel

➤ Ensuring a constant ratio of algorithmic cost vs. adversary’s cost for large T

CHALLENGES FACED

Page 32: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

FUTURE WORK➤ Remove assumption of knowledge of L by Bob

➤ Extend results to multi-party case

➤ Establish lower bounds

32

Page 33: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

OUR TEAM

Varsha Dani

Tom Hayes

Jared Saia

Page 34: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

QUESTIONS??

Page 35: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

RELATED WORK

SCHULMAN’ 96Tolerates noise rate with constant blowup in cost using non-constructive tree codes� <

1

240

BRAKERSKI AND KALAI, FOCS’12Made the upper bounds constructive for noise rate � <

1

32

KOL AND RAZ, FOCS’13Expected cost overhead of bits for stochastic noise rate � <<

1

2O⇣p

� log(1/�) L⌘

HAEUPLER’14O⇣p

� log log(1/�) L⌘

Expected cost overhead of bits for known and sufficiently small

adversarial noise rate �

ICALP'15O⇣T +

pLT + L

⌘Expected cost overhead of bits for unknown noise rate, private channels

and probability of success � 1� 1

L logL

Page 36: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

ALICE’S ALGORITHM

Page 37: SECURE ONE-WAY INTERACTIVE COMMUNICATION€¦ · SCHULMAN’ 96 Tolerates noise rate with constant blowup in cost using non-constructive tree codes < 1 240 BRAKERSKI AND KALAI, FOCS’12

BOB’S ALGORITHM