Anonymous Permutation Routing Theory in Cryptography Conference

anonymous permutation routing l.w
1 / 43
Embed
Share

Join the TCC conference in Taipei, Taiwan on December 1, 2023, to explore the theory of anonymous permutation routing in cryptography. Discover innovative solutions, threat models, and applications in this cutting-edge field. Our results include a theorem statement and an overview of techniques used. Dive into the complexities of non-interactive anonymous routers and sender-receiver permutations for secure message transmission.

  • Cryptography
  • Routing Theory
  • TCC Conference
  • Permutation
  • Anonymous

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Anonymous Permutation Routing Theory of Cryptography Conference (TCC) PAUL BUNN PAUL BUNN December 1, 2023 Taipei, Taiwan EYAL KUSHILEVITZ RAFAIL OSTROVSKY

  2. Outline Problem Statement Threat Model Applications Existing Solutions Background Our Result Theorem Statement Intuition Overview Of Techniques

  3. Outline Problem Statement Threat Model Applications Existing Solutions Background Our Result Theorem Statement Intuition Overview Of Techniques

  4. Problem Statement Anonymous Permutation Routing [Shi Wu 21: Non-Interactive Anonymous Router] N Senders, N Receivers

  5. Problem Statement Anonymous Permutation Routing [Shi Wu 21: Non-Interactive Anonymous Router] Senders Receivers N Senders, N Receivers

  6. Problem Statement Anonymous Permutation Routing [Shi Wu 21: Non-Interactive Anonymous Router] Senders Receivers N Senders, N Receivers, permutation , messages {mi}

  7. Problem Statement Anonymous Permutation Routing [Shi Wu 21: Non-Interactive Anonymous Router] Senders Receivers m1 N Senders, N Receivers, permutation , messages {mi} m2 m3 mN

  8. Problem Statement Anonymous Permutation Routing [Shi Wu 21: Non-Interactive Anonymous Router] Senders Receivers m1 N Senders, N Receivers, permutation , messages {mi} Central Router C m2 m3 mN

  9. Problem Statement Anonymous Permutation Routing [Shi Wu 21: Non-Interactive Anonymous Router] Senders Receivers m1 N Senders, N Receivers, permutation , messages {mi} Central Router C m2 C m3 mN

  10. Problem Statement Anonymous Permutation Routing [Shi Wu 21: Non-Interactive Anonymous Router] Senders Receivers m1 N Senders, N Receivers, permutation , messages {mi} Central Router C Protect: Message contents {mi} Permutation : Unknown to all (2N + 1) parties Adversary: HBC, Static Collusion: Router C, plus: Basic : Up to (N-2) Sender-Receiver pairs Sender Collusion : All Senders, Up to (N-2) Receivers Receiver Collusion : All Receivers, Up to (N-2) Senders m2 C m3 mN

  11. Applications Collusion: Router C, plus: Basic : Up to (N-2) Sender-Receiver pairs Sender Collusion : All Senders, Up to (N-2) Receivers Receiver Collusion : All Receivers, Up to (N-2) Senders

  12. Applications Collusion: Router C, plus: Basic : Up to (N-2) Sender-Receiver pairs Sender Collusion : All Senders, Up to (N-2) Receivers Receiver Collusion : All Receivers, Up to (N-2) Senders Basic Collusion C + (up to) N-2 Sender-Receiver pairs Sender Collusion Receiver Collusion C + (up to) all Receivers + (up to) N-2 Senders C + (up to) all Senders + (up to) N-2 Receivers Arbitrary Collusion C + (up to) 2N 2 Senders + Receivers

  13. Applications Collusion: Router C, plus: Basic : Up to (N-2) Sender-Receiver pairs Sender Collusion : All Senders, Up to (N-2) Receivers Receiver Collusion : All Receivers, Up to (N-2) Senders Basic Collusion: P2P Messaging Basic Collusion C + (up to) N-2 Sender-Receiver pairs Sender Collusion Receiver Collusion C + (up to) all Receivers + (up to) N-2 Senders C + (up to) all Senders + (up to) N-2 Receivers Arbitrary Collusion C + (up to) 2N 2 Senders + Receivers

  14. Applications Collusion: Router C, plus: Basic : Up to (N-2) Sender-Receiver pairs Sender Collusion : All Senders, Up to (N-2) Receivers Receiver Collusion : All Receivers, Up to (N-2) Senders Basic Collusion: P2P Messaging Sender Collusion: Pub/Sub with Privacy Multi-Client PIR Basic Collusion C + (up to) N-2 Sender-Receiver pairs Sender Collusion Receiver Collusion C + (up to) all Receivers + (up to) N-2 Senders C + (up to) all Senders + (up to) N-2 Receivers Arbitrary Collusion C + (up to) 2N 2 Senders + Receivers

  15. Applications Collusion: Router C, plus: Basic : Up to (N-2) Sender-Receiver pairs Sender Collusion : All Senders, Up to (N-2) Receivers Receiver Collusion : All Receivers, Up to (N-2) Senders Basic Collusion: P2P Messaging Sender Collusion: Pub/Sub with Privacy Multi-Client PIR Receiver Collusion: NIAS [Shi Wu 21] Multi-Client PIW Basic Collusion C + (up to) N-2 Sender-Receiver pairs Sender Collusion Receiver Collusion C + (up to) all Receivers + (up to) N-2 Senders C + (up to) all Senders + (up to) N-2 Receivers Arbitrary Collusion C + (up to) 2N 2 Senders + Receivers

  16. Applications Collusion: Router C, plus: Basic : Up to (N-2) Sender-Receiver pairs Sender Collusion : All Senders, Up to (N-2) Receivers Receiver Collusion : All Receivers, Up to (N-2) Senders Basic Collusion: P2P Messaging Sender Collusion: Pub/Sub with Privacy Multi-Client PIR Receiver Collusion: NIAS [Shi Wu 21] Multi-Client PIW Non-corrupt Router C Oblivious Shuffle Basic Collusion C + (up to) N-2 Sender-Receiver pairs Sender Collusion Receiver Collusion C + (up to) all Receivers + (up to) N-2 Senders C + (up to) all Senders + (up to) N-2 Receivers Arbitrary Collusion C + (up to) 2N 2 Senders + Receivers

  17. Our Work Applications Collusion: Router C, plus: Basic : Up to (N-2) Sender-Receiver pairs Sender Collusion : All Senders, Up to (N-2) Receivers Receiver Collusion : All Receivers, Up to (N-2) Senders Basic Collusion: P2P Messaging Sender Collusion: Pub/Sub with Privacy Multi-Client PIR Receiver Collusion: NIAS [Shi Wu 21] Multi-Client PIW Non-corrupt Router C Oblivious Shuffle Basic Collusion C + (up to) N-2 Sender-Receiver pairs Sender Collusion Receiver Collusion C + (up to) all Receivers + (up to) N-2 Senders C + (up to) all Senders + (up to) N-2 Receivers Arbitrary Collusion C + (up to) 2N 2 Senders + Receivers

  18. Outline Problem Statement Threat Model Applications Existing Solutions Background Our Result Theorem Statement Intuition Overview Of Techniques

  19. Existing Solutions Na ve Solution 1: Flooding (+ Encryption) O(N2) (total) Communication O(N2) Computation (at C) Non-Interactive Senders Receivers m1 m2 C m3 mN Per message bit

  20. Existing Solutions Na ve Solution 1: Flooding (+ Encryption) O(N2) (total) Communication O(N2) Computation (at C) Non-Interactive Senders Receivers m1 m2 Na ve Solution 2: [Single-Server] PIR (+ Encryption) O(N polylog N) (total) Communication O(N2) Computation (at C) Non-Interactive (after 1-time Setup) C m3 mN Per message bit

  21. Existing Solutions Na ve Solution 1: Flooding (+ Encryption) O(N2) (total) Communication O(N2) Computation (at C) Non-Interactive Senders Receivers m1 m2 Na ve Solution 2: [Single-Server] PIR (+ Encryption) O(N polylog N) (total) Communication O(N2) Computation (at C) Non-Interactive (after 1-time Setup) C m3 Solution 3: [Shi Wu 21] Non-Interactive Anonymous Router O(N polylog N) (total) Communication O(N2) Computation (at C) Non-Interactive (after 1-time Setup) Per message bit mN

  22. Concurrent Work [Fernando, Shi, Soni, Vanjani, Waters 23 Next Talk]: Collusion tolerance: Per message bit

  23. Our Work Concurrent Work [Fernando, Shi, Soni, Vanjani, Waters 23 Next Talk]: Collusion tolerance: Basic Collusion C + (up to) N-2 Sender-Receiver pairs Sender Collusion Receiver Collusion C + (up to) all Receivers + (up to) N-2 Senders C + (up to) all Senders + (up to) N-2 Receivers Arbitrary Collusion C + (up to) 2N 2 Senders + Receivers Per message bit

  24. [FSSVW] Concurrent Work [Fernando, Shi, Soni, Vanjani, Waters 23 Next Talk]: Collusion tolerance: Basic Collusion C + (up to) N-2 Sender-Receiver pairs Sender Collusion Receiver Collusion C + (up to) all Receivers + (up to) N-2 Senders C + (up to) all Senders + (up to) N-2 Receivers Arbitrary Collusion C + (up to) 2N 2 Senders + Receivers Per message bit

  25. [FSSVW] Concurrent Work [Fernando, Shi, Soni, Vanjani, Waters 23 Next Talk]: Collusion tolerance: Improves upon original NIAR [Shi, Wu 21]: Achieves quasi-linear overall performance Requires obfuscation: iO vs. Rate-1 OT (DDH, QR,LWE) Basic Collusion C + (up to) N-2 Sender-Receiver pairs Sender Collusion Receiver Collusion C + (up to) all Receivers + (up to) N-2 Senders C + (up to) all Senders + (up to) N-2 Receivers Arbitrary Collusion C + (up to) 2N 2 Senders + Receivers Per message bit

  26. Problem Statement Is there a NIAR solution with overall (quasi-) linear performance? E.g. requires quasi-linear computation at C Under standard crypto assumptions? E.g. feasible in practice

  27. Outline Problem Statement Threat Model Applications Existing Solutions Background Our Result Theorem Statement Intuition Overview Of Techniques

  28. Background Rate-1 OT [DGI+ 1-out-of-2 string OT 19, GHO 20, CGH+ 21]: Server response size message size Known instantiating assumptions (can use any of): DDH, QR, LWE (post-quantum) [DGI+ 19]

  29. Outline Problem Statement Threat Model Applications Existing Solutions Background Our Result Theorem Statement Intuition Overview Of Techniques

  30. Our Result Theorem: Assuming rate-1 OT, there is a solution to the Anonymous Permutation Routing problem that achieves: O(N polylog N) (total) Communication O(N polylog N) Computation (at C) Non-Interactive (after 1-time Setup) Per message bit

  31. Our Result: Intuition Senders Receivers Observation 1: Anonymous Permutation Routing is similar to (non-anonymous) Permutation Routing m1 m2 C m3 mN

  32. Our Result: Intuition Senders Receivers Observation 1: Anonymous Permutation Routing is similar to (non-anonymous) Permutation Routing m1 m2 m3 mN

  33. Our Result: Intuition Senders Receivers Observation 1: Anonymous Permutation Routing is similar to (non-anonymous) Permutation Routing m1 m2 Choose paths per permutation m3 mN

  34. Our Result: Intuition Senders Receivers Observation 1: Anonymous Permutation Routing is similar to (non-anonymous) Permutation Routing m1 m2 Choose paths per permutation m3 mN

  35. Our Result: Intuition Senders Receivers Observation 1: Anonymous Permutation Routing is similar to (non-anonymous) Permutation Routing m1 m2 Choose paths per permutation m3 mN

  36. Our Result: Intuition Senders Receivers Observation 1: Anonymous Permutation Routing is similar to (non-anonymous) Permutation Routing m1 m2 Choose paths per permutation m3 mN

  37. Our Result: Intuition Senders Receivers Observation 1: Anonymous Permutation Routing is similar to (non-anonymous) Permutation Routing m1 m2 Choose paths per permutation m3 mN

  38. Our Result: Intuition Senders Receivers Observation 2: Because (non-anonymous) Permutation Routing networks are small (N polylog N), central router can simulate it m1 m2 m3 mN

  39. Our Result: Intuition Senders Receivers Observation 2: Because (non-anonymous) Permutation Routing networks are small (N polylog N), central router can simulate it m1 m2 C m3 mN

  40. Our Result: Intuition Observation 3: Use PIR to add anonymity ( Obfuscated Gate ) m1 m2 n n Wire: wi Value: qi = PIRquery(DB, j) mn m1 m2 . DB= . . . . . mj . . . mn

  41. Our Result: Overview of Techniques 1. Combine Observations 1-3 Central Router simulates a virtual (permutation) network, where routing decisions at each gate are obfuscated by PIR (PIR queries are assigned to each edge in a 1-time Setup) 2. Need Small Networks Issue (Cost): Computation at C is proportional to network size (number of edges) Solution: Results from the literature in Permutation Routing use small networks (N polylog N) 3. Need Specialized PIR Issue (Cost): Standard PIR (server response size has non-constant stretch) won t work Solution:Use rate-1 (constant stretch) PIR (immediate from rate-1 OT)

  42. Our Result: Overview of Techniques 4. Need Edge-Disjoint Paths Issue (Correctness): If two paths collide on an edge, PIR will fail (message will be lost) Solution: Choose network carefully so randomly chosen paths will (w.h.p) be edge-disjoint 5. Edge-Disjoint Not Enough Issue (Anonymity): Knowing that paths are disjoint, and able to observe (N-2) paths (of the corrupt parties), Adversary can have advantage is guessing the other 2 paths. Solution: Define a property locally reversible edge-disjointness that a (Network, PathSelection protocol) pair can satisfy, which can be used to prove anonymity.

  43. Thank You! Questions?

More Related Content