Paris Crypto Day A full day of cryptography talks in the Paris area. https://pariscryptoday.github.io/ Thu, 13 Jun 2019 12:19:55 +0000 Thu, 13 Jun 2019 12:19:55 +0000 Jekyll v3.8.5 June 21 @ ENS <p>The next Paris Area Crypto Day will be held on 21.06.19 (Fri) at ENS, co-located with <a href="https://quefaire.paris.fr/40919/fete-de-la-musique">Fête de la Musique</a>.</p> <ul> <li><a href="#Access">Amphi Rataud</a>, ENS, 45 rue d’Ulm</li> <li>Please <a href="https://docs.google.com/forms/d/e/1FAIpQLSdU9SDqLdHWnDRSyj-AKfPzGAsiwA9Ih_1sne8J3RXFDsAWLA/viewform">register</a> (free). Deadline 17.06.19</li> </ul> <h3 id="tentative-program">Tentative Program</h3> <table> <tbody> <tr> <td>09:55–10:00</td> <td>Welcome</td> </tr> <tr> <td>10:00–11:00</td> <td>Jean Paul Degabriele: <a href="#JP">The Security of Onion Encryption in Tor</a></td> </tr> <tr> <td>11:00–12:00</td> <td>Joël Alwen: <a href="#JA">2-Party Secure Messaging for Unreliable Channels</a></td> </tr> <tr> <td>12:00–14:00</td> <td>Lunch</td> </tr> <tr> <td>14:00–14:30</td> <td>Aisling Connolly: <a href="#AC">Freedom of Encryption</a></td> </tr> <tr> <td>14:30–15:00</td> <td>Ward Beullens: <a href="#WB">On Sigma Protocols with Helper for MQ and PKP, Fishy Signature Schemes and More</a></td> </tr> <tr> <td>15:00–15:30</td> <td>Rotem Tsabary: <a href="#RT">Degree 2 is Complete for the Round Complexity of Malicious MPC</a></td> </tr> <tr> <td>15:30–16:00</td> <td>Coffee Break</td> </tr> <tr> <td>16:00–17:00</td> <td>Hoeteck Wee: <a href="#HW">Encrypted Computation from Lattices</a></td> </tr> </tbody> </table> <!-- * [Joël Alwen](#JA) (Wickr) * [Ward Beullens](#WB) (KU Leuven) * [Aisling Connolly](#AC) (ENS) * [Jean Paul Degabriele](#JP) (TU Darmstadt) * [Rotem Tsabary](#RT) (Weizmann) * [Hoeteck Wee](#HW) (CNRS/ENS/PSL) --> <p><strong>Organizers.</strong> Michel Abdalla, Georg Fuchsbauer and Hoeteck Wee (<a href="https://crypto.di.ens.fr/web2py">ENS</a>)</p> <p><strong>Acknowledgements.</strong> ERC <a href="http://www.di.ens.fr/~pointche/CryptoCloud/">CryptoCloud</a>, <a href="http://cordis.europa.eu/project/rcn/193658_en.html">aSCEND</a> and <a href="https://www.di.ens.fr/~fuchsbau/eftrec.html">EfTrEC</a></p> <hr /> <h3 id="abstracts">Abstracts</h3> <p><strong><a name="JP"></a>The Security of Onion Encryption in Tor</strong><br /> <em>Jean Paul Degabriele (TU Darmstadt)</em></p> <p>Tor is a primary tool for maintaining anonymity online. It provides a low-latency, circuit-based, bidirectional secure channel between two parties through a network of onion routers, with the aim of obscuring exactly who is talking to whom, even to adversaries controlling part of the network. Tor relies heavily on cryptographic techniques, yet its onion encryption scheme is susceptible to tagging attacks (Fu and Ling, 2009), which allow an active adversary controlling the first and last node of a circuit to deanonymize with near-certainty. This contrasts with less active traffic correlation attacks, where the same adversary can at best deanonymize with high probability. The Tor project has been actively looking to defend against tagging attacks and its most concrete alternative is proposal 261, which specifies a new onion encryption scheme based on a variable-input-length tweakable cipher. We provide a formal treatment of low-latency, circuit-based onion encryption, relaxed to the unidirectional setting, by expanding existing secure channel notions to the new setting and introducing circuit hiding to capture the anonymity aspect of Tor. We demonstrate that circuit hiding prevents tagging attacks and show proposal 261’s relay protocol is circuit hiding and thus resistant against tagging attacks. <br /><br /></p> <p><strong><a name="JA"></a>2-Party Secure Messaging for Unreliable Channels</strong><br /> <em>Joël Alwen (Wickr)</em></p> <p>Double Ratchet (DR) based protocols have rapidly become the world’s dominant 2-party secure messaging (2SM) paradigm. Yet, despite the paradigm’s wide spread adoption in wild, our cryptographic understanding of it is still evolving.</p> <p>In this talk, we’ll look at the recent results of Alwen, Coretti and Dodis at Eurocrypt 2019, which focus on building 2SM protocols using the DR paradigm with the explicit goal of obtaining robust, simple and efficient protocols for use in the real world yet provably exhibiting very strong security properties.</p> <p>We first look at is their new security notion for 2SM. The definition captures (in a clean, intuitive and yet succinct game) both the desired functionality of 2SM, as well as the security properties of Forward Secrecy, Authenticity, Post-Compromise Security and “Resilience to Adversarially Chosen Randomness”. In an effort to further reduce the assumptions about an underlying network’s behavior, the new 2SM definition is also the first to capture the intuitive goal of “Immediate Decryption”; namely that any honestly generated ciphertext can be decrypted immediately upon delivery by the receiver. As this property must hold regardless of the order in which ciphertexts are delivered (and even when arbitrary previous protocol packets were outright dropped) constructions enjoying Immediate Decryption will be far more resilient when used over unreliable transports. This stands in stark contrast to almost all 2SM’s that have been proposed thus far as improvements over the original DR protocol still being used in practice. In fact, essentially all stronger security notions for 2SM’s proposed in those works seem to fundamentally contradict supporting Immediate Decryption. Now, while it is easy to imagine practical settings that require these stronger security notions and/or where the reliability of the underlying transport can be guaranteed, we observe that, to the best of our knowledge, essentially <em>all</em> 2SM protocols actually deployed in practice do indeed support Immediate Decryption. We believe this shows that, often, in practice the added robustness afforded by Immediate Decryption outweighs the value of achieving yet stronger security properties.</p> <p>Armed with the new security notion, we will take a new look at the DR design paradigm. In particular:</p> <ul> <li>We describe a modular construction of a DR-based 2SM (and prove its security). For this we use 3, significantly simpler, black-box primitives. In particular, we believe that this approach not only “explains” a wide class of 2SM protocols but that it will also generalize well to the (much more challenging and poorly understood) group secure messaging setting.</li> <li>We provide constructions of each of the 3 primitives based on a variety of number-theoretic and black-box primitives. In particular, we obtain: 1) the original DR protocol as used in practice resulting in a new security proof for a 2SM currently used by over 1 billion people. 2) the first provably PQ-secure 2SM. 3) a new highly efficient 2SM with stronger security properties than anything used in practice (yet still enjoying Immediate Decryption).</li> </ul> <p>Finally, we extend the modular construction to include basic public-key primitives. Using this, we obtain a yet more secure 2SM, albeit at a moderate cost in efficiency. <br /><br /></p> <p><strong><a name="AC"></a>Freedom of Encryption</strong><br /> <em>Aisling Connolly (ENS)</em></p> <p>Legislation surrounding digital privacy has seen quite an upheaval in recent years. The introduction of the General Data Protection Regulation (GDPR) in the EU, and new resolutions within the United Nations Human Rights Council (UNHRC) have recognized the urgency to include recommendations on the use of encryption to protect the digital identities of citizens. In this work, we meander through the main events in history which have shaped the legislative landscape that encompasses the use of encryption, paying particular attention to recent (post-Snowden) developments. <br /><br /></p> <p><strong><a name="WB"></a>On Sigma Protocols with Helper for MQ and PKP, Fishy Signature Schemes and More</strong><br /> <em>Ward Beullens (KU Leuven)</em></p> <p>This work presents 2 sigma protocols with helper to prove knowledge of:</p> <ul> <li>A solution to a system of quadratic polynomials</li> <li>A solution to an instance of the Permuted Kernel Problem</li> </ul> <p>We then remove the helper from the protocol with a “cut-and-choose” protocol and we apply the Fiat-Shamir transform to obtain signature schemes with security proof in the QROM. We show that the resulting signature schemes, which we call the “MUltivarite quaDratic FIat-SHamir” scheme (MUDFISH) and the “ShUffled Solution to Homogeneous linear SYstem FIat-SHamir” scheme (SUSHSYFISH), are more efficient than existing signatures based on the MQ problem and the Permuted Kernel Problem. We also leverage the ZK-proof for PKP to improve the efficiency of Stern-like Zero Knowledge proofs for lattice statements. <br /><br /></p> <p><strong><a name="RT"></a>Degree 2 is Complete for the Round Complexity of Malicious MPC</strong><br /> <em>Rotem Tsabary (Weizmann)</em></p> <p>We show, via a non-interactive reduction, that the existence of a secure multi-party computation (MPC) protocol for degree-2 functions implies the existence of a protocol with the same round complexity for general functions. Thus showing that when considering the round complexity of MPC, it is sufficient to consider very simple functions.</p> <p>Our completeness theorem applies in various settings: information theoretic and computational, fully malicious and malicious with various types of aborts. In fact, we give a master theorem from which all individual settings follow as direct corollaries. Our basic transformation does not require any additional assumptions and incurs communication and computation blow-up which is polynomial in the number of players and in S, 2^D, where S,D are the circuit size and depth of the function to be computed. Using one-way functions as an additional assumption, the exponential dependence on the depth can be removed.</p> <p>As a consequence, we are able to push the envelope on the state of the art in various settings of MPC, including the following cases.</p> <ul> <li>3-round perfectly-secure protocol (with guaranteed output delivery) against an active adversary that corrupts less than a quarter of the parties.</li> <li>2-round statistically-secure protocol that achieves security with “selective abort” against an active adversary that corrupts less than half of the parties.</li> <li>Assuming one-way functions, 2-round computationally-secure protocol that achieves security with (standard) abort against an active adversary that corrupts less than half of the parties. <br /><br /></li> </ul> <p><strong><a name="HW"></a>Encrypted Computation from Lattices</strong><br /> <em>Hoeteck Wee (CNRS/ENS/PSL)</em></p> <p>In this talk, we will survey three cryptographic notions of enabling computation over encrypted data – attribute-based encryption, fully homomorphic encryption, and laconic functional evaluation – as well as their instantiations from lattices.<br /><br /></p> <h3 id="venue">Venue</h3> <p><a name="Access"></a>45 rue d’Ulm, 75005 Paris, Amphi Rataud: level -1 in the building labeled “Bibliothèque” <!---[here](https://www.di.ens.fr/static/img/Map_DIENS.jpg)--> <br /><br /> <img src="https://www.di.ens.fr/static/img/Map_DIENS.jpg" width="75%" height="75%" /></p> Sat, 01 Jun 2019 10:10:00 +0000 https://pariscryptoday.github.io/tenth.html https://pariscryptoday.github.io/tenth.html Mar 18 @ ENS <p>The next Paris Area Crypto Day will be held on 18.03.2019 (Mon) at ENS.</p> <ul> <li>Amphi Jaurès, ENS (29 rue d’Ulm, level B1)</li> <li>Please <a href="https://docs.google.com/forms/d/1N_h57pxPSZmjYiCN5lPUz8XHWGMzZ5Qqnbo97NddhrQ/viewform">register</a> (free). Deadline 12.03.2019</li> </ul> <h3 id="program">Program</h3> <table> <tbody> <tr> <td>10:00 - 10:05</td> <td>Welcome</td> </tr> <tr> <td>10:05 - 10:50</td> <td><a href="#SA">Shweta Agrawal</a> Mathematical Assumptions Underlying Code Obfuscation</td> </tr> <tr> <td>11:00 - 11:45</td> <td><a href="#DH">Dennis Hofheinz</a> Tight Security (<a href="../DennisHofheinz.pdf">slides</a>)</td> </tr> <tr> <td>12:00 - 14:00</td> <td>Lunch</td> </tr> <tr> <td>14:00 - 14:45</td> <td><a href="#DF">Dario Fiore</a> Homomorphic Authentication for Computing Securely on Untrusted Machines (<a href="../DarioFiore.pdf">slides</a>)</td> </tr> <tr> <td>15:00 - 15:45</td> <td><a href="#TL">Tancrède Lepoint</a> Cryptographic Suite for Algebraic Lattices</td> </tr> </tbody> </table> <p><strong>Organizers.</strong> Michel Abdalla, Georg Fuchsbauer, and Hoeteck Wee (<a href="https://crypto.di.ens.fr/web2py">ENS</a>)</p> <p><strong>Acknowledgements.</strong> ERC <a href="http://www.di.ens.fr/~pointche/CryptoCloud/">CryptoCloud</a> and <a href="http://cordis.europa.eu/project/rcn/193658_en.html">aSCEND</a></p> <hr /> <h3 id="abstracts">Abstracts</h3> <p><strong><a name="SA"></a>Mathematical Assumptions Underlying Code Obfuscation</strong><br /> <em>Shweta Agrawal</em> (IIT Madras)</p> <p>In recent times, there has been significant interest in constructing the cryptographic primitive of “indistinguishability obfuscation”. Standard cryptographic hardness assumptions appear insufficient for this task, and we now have a variety of new mathematical conjectures to fill the gap. I will define the notion of indistinguishability obfuscation, briefly describe its importance and discuss the new mathematical conjectures, hard distributions, known attacks and open problems.</p> <p><strong><a name="DH"></a>Tight security</strong><br /> <em>Dennis Hofheinz</em> (KIT)</p> <p>A cryptographic building block (such as an encryption or signature scheme) is called tightly secure if its security reduction is tight, i.e., if its reduction connects security and underlying assumption in a quantitatively close way, even in a multi-instance/multi-use scenario. In particular, the security of a tightly secure scheme should not degrade in the number of instances or uses of that scheme. This property is beneficial in particular in scenarios in which it is not clear a priori how many instances of that scheme are used.</p> <p>In this talk, we survey recent results to achieve tight security, with a focus on encryption schemes. We explain the intrinsic difficulty to achieve tight security (e.g., for chosen-ciphertext secure encryption or signatures), and also showcase techniques to overcome this difficulty.</p> <p><strong><a name="DR"></a>Homomorphic Authentication for Computing Securely on Untrusted Machines</strong><br /> <em>Dario Fiore</em> (IMDEA)</p> <p>Due to phenomena like the ubiquity of the Internet and cloud computing, it is increasingly common to store and process data on third-party machines. In spite of its attractive aspects, this trend raises a number of security concerns, including: how to ensure that the results computed by third parties are correct (integrity) and no unauthorized information is leaked (privacy)? This talk focuses on cryptographic solutions for integrity, and more specifically on the notion of homomorphic authentication. It presents this notion, gives an overview of the state of the art in this area, and covers some of the recent efficient constructions.</p> <p><strong><a name="DR"></a>Cryptographic Suite for Algebraic Lattices</strong><br /> <em>Tancrède Lepoint</em> (Google)</p> <p>In this talk, I introduce CRYSTALS — Cryptographic Suite for Algebraic Lattices —, a cryptographic suite composed of a CCA-secure KEM and a digital signature based on module lattices and designed in collaboration with Joppe Bos, Léo Ducas, Eike Kiltz, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Gregor Seiler, and Damien Stehlé in 2017. CRYSTALS is designed to enable ease of implementation and modularity in security by using module lattices and well established cryptographic assumptions. Module lattices not only enable simple implementations (the core operation, a polynomial multiplication, has only to be implemented in dimension 256), but enable extremely simple scaling up and down of the security without the need to reimplement anything.</p> <p>In January 2019, the algorithms in CRYSTALS were selected for the second round of the NIST post-standardization effort; I’ll report on performances and second round tweaks.</p> Sat, 16 Mar 2019 10:10:10 +0000 https://pariscryptoday.github.io/ninth.html https://pariscryptoday.github.io/ninth.html Oct 25 @ ENS <p>The next Paris Area Crypto Day will be held on 25.10.2018 (Thu) at ENS.</p> <ul> <li>Amphi Jaurès, ENS (29 rue d’Ulm, level B1)</li> <li>Please <a href="https://docs.google.com/forms/d/e/1FAIpQLSeop24A0asJvd73HvUH8zTDorfzPOpswA_pfcyVxc2zkctoMg/viewform">register</a> (free). Deadline 23.10.2018</li> </ul> <h3 id="tentative-program">Tentative Program</h3> <table> <tbody> <tr> <td>10:00 - 10:05</td> <td>Welcome</td> </tr> <tr> <td>10:05 - 11:05</td> <td><a href="#SM">Sarah Meiklejohn</a>: Anonymity in Cryptocurrencies</td> </tr> <tr> <td>11:15 - 11:45</td> <td><a href="#MaMa">Mary Maller</a>: Updatable and Universal Common Reference Strings with Applications to zk-SNARKs</td> </tr> <tr> <td>11:45 - 12:15</td> <td><a href="#JL">Julian Loss</a>: The Algebraic Group Model and its Applications</td> </tr> <tr> <td>12:15 - 14:15</td> <td>Lunch</td> </tr> <tr> <td>14:15 - 15:15</td> <td><a href="#BS">Benjamin Smith</a>: Post-quantum Diffie–Hellman: Caveat Emptor</td> </tr> <tr> <td>15:15 - 15:45</td> <td><a href="#MiMi">Michele Minelli</a>: Fast Homomorphic Evaluation of Deep Discretized Neural Networks</td> </tr> <tr> <td>15:45 - 16:15</td> <td>Coffee Break</td> </tr> <tr> <td>16:15 - 17:15</td> <td><a href="#AO">Adam O’Neill</a>: Towards RSA-OAEP without Random Oracles</td> </tr> </tbody> </table> <p><strong>Organizers.</strong> Michel Abdalla, Georg Fuchsbauer, and Hoeteck Wee (<a href="https://crypto.di.ens.fr/web2py">ENS</a>)</p> <p><strong>Acknowledgements.</strong> ERC <a href="http://www.di.ens.fr/~pointche/CryptoCloud/">CryptoCloud</a> and <a href="http://cordis.europa.eu/project/rcn/193658_en.html">aSCEND</a></p> <hr /> <h3 id="abstracts">Abstracts</h3> <p><strong><a name="SM"></a>Anonymity in Cryptocurrencies</strong> <em>Sarah Meiklejohn</em> (UCL)</p> <p>A long line of recent research has demonstrated that existing cryptocurrencies often do not achieve the level of anonymity that users might expect they do, while at the same time another line of research has worked to increase the level of anonymity by adding new features to existing cryptocurrencies or creating entirely new cryptocurrencies. This talk will explore both of these lines of research, briefly demonstrating de-anonymization attacks but focusing primarily on techniques for anonymity that achieve provably secure guarantees.</p> <p><strong><a name="MaMa"></a>Updatable and Universal Common Reference Strings with Applications to zk-SNARKs</strong> <em>Mary Maller</em> (UCL)</p> <p>By design, existing (pre-processing) zk-SNARKs embed a secret trapdoor in a relation-dependent common reference strings (CRS). The trapdoor is exploited by a (hypothetical) simulator to prove the scheme is zero knowledge, and the secret-dependent structure facilitates a linear-size CRS and linear-time prover computation. If known by a real party, however, the trapdoor can be used to subvert the security of the system. The structured CRS that makes zk-SNARKs practical also makes deploying zk-SNARKS problematic, as it is difficult to argue why the trapdoor would not be available to the entity responsible for generating the CRS. Moreover, for pre-processing zk-SNARKs a new trusted CRS needs to be computed every time the relation is changed.</p> <p>In this paper, we address both issues by proposing a model where a number of users can update a universal CRS. The updatable CRS model guarantees security if at least one of the users updating the CRS is honest. We provide both a negative result, by showing that zk-SNARKs with private secret-dependent polynomials in the CRS cannot be updatable, and a positive result by constructing a zk-SNARK based on a CRS consisting only of secret-dependent monomials. The CRS is of quadratic size, is updatable, and is universal in the sense that it can be specialized into one or more relation-dependent CRS of linear size with linear-time prover computation.</p> <p>(Joint work with Jens Groth, Markulf Kohlweiss, Sarah Meiklejohn and Ian Miers)</p> <p><strong><a name="JL"></a>The Algebraic Group Model and its Applications</strong> <em>Julian Loss</em> (RUB)</p> <p>One of the most important and successful tools for assessing hardness assumptions in cryptography is the Generic Group Model (GGM). Over the past two decades, numerous assumptions and protocols have been analyzed within this model. While a proof in the GGM can certainly provide some measure of confidence in an assumption, its scope is rather limited since it does not capture group-specific algorithms that make use of the representation of the group.</p> <p>To overcome this limitation, we propose the Algebraic Group Model (AGM), a model that lies in between the Standard Model and the GGM. It is the first restricted model of computation covering group-specific algorithms yet allowing to derive simple and meaningful security statements.<br /> To prove its usefulness, we show that several important assumptions, among them the Computational Diffie-Hellman, the Strong Diffie-Hellman, and the interactive LRSW assumptions, are equivalent to the Discrete Logarithm (DLog) assumption in the AGM. On the more practical side, we prove tight security reductions for two important schemes in the AGM to DLog or a variant thereof: the BLS signature scheme and Groth’s zero-knowledge SNARK (EUROCRYPT 2016), which is the most efficient SNARK for which only a proof in the GGM was known. Our proofs are quite simple and therefore less prone to subtle errors than those in the GGM.</p> <p>Moreover, in combination with known lower bounds on the Discrete Logarithm assumption in the GGM, our results can be used to derive lower bounds for all the above-mentioned results in the GGM.</p> <p>(Joint work with Georg Fuchsbauer and Eike Kiltz)</p> <p><strong><a name="BS"></a>Post-quantum Diffie–Hellman: Caveat Emptor</strong> <em>Benjamin Smith</em> (INRIA/LIX)</p> <p>In the mad dash towards post-quantum crypto, it is often overlooked that it has been surprisingly hard to find a practical drop-in replacement for Diffie–Hellman key exchange (as opposed to post-quantum KEMs for key establishment). Recent work revisiting an old isogeny-based primitive due to Couveignes, Rostovtsev, and Stolbunov has given some very useful results in this direction: practical post-quantum Diffie–Hellman is now in reach, especially with the new CSIDH proposal. These key exchanges, based on isogenies of elliptic curves with commutative endomorphism rings, have a clear superficial resemblance to classical Diffie–Hellman; but the deeper we look, the further their properties diverge from the common intuitions for Diffie–Hellman-based cryptosystems that we have developed over the last four decades. In this talk we will compare and contrast pre- and post-quantum Diffie–Hellman algorithms and their applications, highlighting some important subtleties and distinctions.</p> <p><strong><a name="MiMi"></a>Fast Homomorphic Evaluation of Deep Discretized Neural Networks</strong> <em>Michele Minelli</em> (ENS)</p> <p>The rise of machine learning as a service multiplies scenarios where one faces a privacy dilemma: either sensitive user data must be revealed to the entity that evaluates the cognitive model (e.g., in the Cloud), or the model itself must be revealed to the user so that the evaluation can take place locally. Fully Homomorphic Encryption (FHE) offers an elegant way to reconcile these conflicting interests in the Cloud-based scenario and also preserve non-interactivity. However, due to the inefficiency of existing FHE schemes, most applications prefer to use Somewhat Homomorphic Encryption (SHE), where the complexity of the computation to be performed has to be known in advance, and the efficiency of the scheme depends on this global complexity.</p> <p>In this paper, we present a new framework for homomorphic evaluation of neural networks, that we call FHE-DiNN, whose complexity is strictly linear in the depth of the network and whose parameters can be set beforehand. To obtain this scale-invariance property, we rely heavily on the bootstrapping procedure. We refine the recent FHE construction by Chillotti et al. (ASIACRYPT 2016) in order to increase the message space and apply the sign function (that we use to activate the neurons in the network) during the bootstrapping. We derive some empirical results, using TFHE library as a starting point, and classify encrypted images from the MNIST dataset with more than 96% accuracy in less than 1.7 seconds.</p> <p>Finally, as a side contribution, we analyze and introduce some variations to the bootstrapping technique of Chillotti et al. that offer an improvement in efficiency at the cost of increasing the storage requirements.</p> <p>(Joint work with Florian Bourse, Matthias Minihold and Pascal Paillier)</p> <p><strong><a name="AO"></a>Towards RSA-OAEP without Random Oracles</strong> <em>Adam O’Neill</em> (Georgetown)</p> <p>We give the first positive results about instantiability of the widely implemented and standarized RSA-OAEP encryption scheme of Bellare and Rogaway (EUROCRYPT 1994) and variants <em>under chosen-ciphertext attack</em>. Recall that RSA-OAEP adds redundancy and randomness to a message before composing two rounds of an underlying Feistel transform, whose round functions are modeled as random oracles (ROs), with RSA. First, we show that either of the two oracles (while still modeling the other as a RO) can be instantiated in RSA-OAEP under IND-CCA2 using mild standard model assumptions. Surprisingly, ours are the first “partial instantiation” results for RSA-OAEP. We obtain them by exploiting (generalizations of) algebraic properties of RSA proven by Barthe, Pointcheval, and Báguelin (CCS 2012). Second, we show that both oracles can be instantiated simultaneously for two variants of RSA-OAEP, called “t-clear” and “s-clear” RSA-OAEP. In particular, we are the first to consider s-clear RSA-OAEP, and our result for it yields the most efficient RSA-based IND-CCA2 secure scheme (under plausible assumptions) in the standard model to date. We obtain it by leveraging a new hierarchy of extractability-style assumptions in the sense of Canetti and Dakdouk (TCC 2010) on the round functions, as well as novel yet plausible assumptions on RSA.</p> <p>(Joint work with Nairen Cao and Mohammad Zaheri)</p> Mon, 01 Oct 2018 10:10:00 +0000 https://pariscryptoday.github.io/eighth.html https://pariscryptoday.github.io/eighth.html June 14 @ ENS <p>The next Paris Area Crypto Day will be held on 14.06.2018 (Thu) at ENS.</p> <ul> <li>Amphi Jaurès, ENS (29 rue d’Ulm, level B1)</li> </ul> <h3 id="program">Program</h3> <table> <tbody> <tr> <td>14:30 - 15:30</td> <td><a href="#DB">Dan Boneh</a> Cryptography for crypto currencies</td> </tr> </tbody> </table> <h3 id="abstracts">Abstracts</h3> <p><strong><a name="DB"></a>Cryptography for crypto currencies</strong><br /> <em><a href="http://crypto.stanford.edu/~dabo/">Dan Boneh</a></em> (Stanford)</p> <p>Cryptocurrencies raise many new questions in cryptography, including in the area of digital signatures. In this talk we will describe recent progress on signatures, aggregate signatures, and multi-signatures that is motivated by their use in cryptocurrencies. These new constructions show how modern signatures can significantly shrink the size of the blockchain.</p> <p>This is joint work with Manu Drijvers and Gregory Neven.</p> Mon, 04 Jun 2018 10:10:00 +0000 https://pariscryptoday.github.io/seventh.html https://pariscryptoday.github.io/seventh.html Nov 30 @ ENS <p>The sixth Paris Area Crypto Day will be held on 30.11.2017 (Thu) at ENS.</p> <ul> <li><a href="http://www.ens.fr/IMG/pdf/Plan_45ULM_RDC.pdf">Salle Celan</a>, ENS</li> <li>Please <a href="https://docs.google.com/forms/d/1S-31XgG6q7iFgNBcOhWh8nSJxij-_VivJfxv4bvscag/viewform">register</a> (free). Deadline 27.11.2016</li> </ul> <h3 id="program">Program</h3> <table> <tbody> <tr> <td>13:30 - 14:30</td> <td><a href="#YI">Yuval Ishai</a> Secure Arithmetic Computation with Constant Computational Overhead</td> </tr> <tr> <td>14:40 - 15:40</td> <td><a href="#JG">Jens Groth</a> Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability</td> </tr> <tr> <td>15:45 - 16:30</td> <td>Coffee &amp; Snacks @ S16, ENS</td> </tr> </tbody> </table> <h3 id="abstracts">Abstracts</h3> <p><strong><a name="YI"></a>Secure Arithmetic Computation with Constant Computational Overhead</strong><br /> <em><a href="http://www.cs.technion.ac.il/~yuvali/">Yuval Ishai</a></em> (Technion)</p> <p>Motivated by the goal of efficient secure computations on sensitive numerical data, we present a protocol for securely computing arithmetic circuits that requires only a constant (amortized) number of arithmetic operations per gate. This applies to the model of security against passive (or “semi-honest”) adversaries. Our protocol is based on new cryptographic assumptions that can be viewed as natural arithmetic analogues of well studied assumptions. Beyond the asymptotic result, a key building block in our protocol can yield concrete efficiency improvements for natural secure computation tasks.</p> <p>Joint work with Benny Applebaum, Ivan Damgård, Michael Nielsen, and Lior Zichron</p> <p><strong><a name="JG"></a>Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability</strong><br /> <em><a href="http://www0.cs.ucl.ac.uk/staff/j.groth/">Jens Groth</a></em> (UCL)</p> <p>We give computationally efficient zero-knowledge proofs of knowledge for arithmetic circuit satisfiability over a large field. For a circuit with N addition and multiplication gates, the prover only uses O(N) multiplications and the verifier only uses O(N) additions in the field. If the commitments we use are statistically binding, our zero-knowledge proofs have unconditional soundness, while if the commitments are statistically hiding we get computational soundness. Our zero-knowledge proofs also have sub-linear communication if the commitment scheme is compact.</p> <p>Our construction proceeds in three steps. First, we give a zero-knowledge proof for arithmetic circuit satisfiability in an ideal linear commitment model where the prover may commit to secret vectors of field elements, and the verifier can receive certified linear combinations of those vectors. Second, we show that the ideal linear commitment proof can be instantiated using error-correcting codes and non-interactive commitments. Finally, by choosing efficient instantiations of the primitives we obtain linear-time zero-knowledge proofs.</p> Thu, 02 Nov 2017 10:10:00 +0000 https://pariscryptoday.github.io/sixth.html https://pariscryptoday.github.io/sixth.html Jun 27-28 @ ENS <p>The next Paris Area Crypto Day will take place on 27.06.2017 and 28.06.2017 (Tue/Wed) at ENS. The event will be co-located with the ECRYPT NET Workshop on Crypto for the Cloud &amp; Implementation; the website is <a href="https://crypto-events.di.ens.fr/ecryptnet/">here</a>.</p> <ul> <li><a href="http://www.di.ens.fr/CryptoAccess.html.en">Salle Dussane</a>, ENS (item 9 of this <a href="https://crypto-events.di.ens.fr/ecryptnet/docs/Plan_45ULM_RDC.pdf">map</a>)</li> <li>Please <a href="https://docs.google.com/forms/d/e/1FAIpQLSeGa89lxTKtPi7BReaWC4x9Gl_p9HkqQESZKJVim0JRi2zlmg/viewform?entry.2092238618&amp;entry.1135279802&amp;entry.479301265&amp;entry.1753222212=First+day+(June+27)&amp;entry.1753222212=Second+day+(June+28)">register here</a> (free)</li> </ul> <h3 id="program">Program</h3> <h4 id="day-one-jun-27">Day one (Jun 27)</h4> <table> <tbody> <tr> <td>09:30 - 10:00</td> <td>Coffee &amp; Welcome</td> </tr> <tr> <td>10:10 - 11:10</td> <td><a href="#DavEva">David Evans</a> Secure multi-party computation: promises, protocols, and practicalities [<a href="https://www.jeffersonswheel.org/2017/secure-multi-party-computation-promises-protocols-and-practicalities">slides</a>]</td> </tr> <tr> <td>11:15 - 12:00</td> <td><a href="#GeoFuc">Georg Fuchsbauer</a> Subversion-resistant zero knowledge [<a href="http://www.di.ens.fr/~fuchsbau/ParisCryptoDay.pdf">slides</a>]</td> </tr> <tr> <td>12:00 - 14:00</td> <td>Lunch (not provided)</td> </tr> <tr> <td>14:00 - 15:00</td> <td><a href="#IngVer">Ingrid Verbauwhede</a> Energy efficiency and security for cryptographic algorithm implementations</td> </tr> <tr> <td>15:00 - 15:30</td> <td>Coffee Break</td> </tr> <tr> <td>15:30 - 16:30</td> <td><a href="#PasPai">Pascal Paillier</a> Whitebox cryptomania [<a href="https://crypto-events.di.ens.fr/ecryptnet/slides/Whitebox_Cryptomania-4.pdf">slides</a>]</td> </tr> </tbody> </table> <h4 id="day-two-jun-28">Day two (Jun 28)</h4> <table> <tbody> <tr> <td>09:50 - 10:00</td> <td>Coffee &amp; Welcome</td> </tr> <tr> <td>10:00 - 11:00</td> <td><a href="#KenPat">Kenneth Paterson</a> Secure storage in the cloud using property preserving encryption [<a href="https://crypto-events.di.ens.fr/ecryptnet/slides/secure-storage-property-preserving.pdf">slides</a>]</td> </tr> <tr> <td>11:15 - 12:00</td> <td><a href="#RapBos">Raphael Bost</a> Searchable encryption: from theory to implementation [<a href="https://raphael.bost.fyi/slides/SSE_ENS.pdf">slides</a>]</td> </tr> <tr> <td>12:00 - 14:00</td> <td>Lunch (not provided)</td> </tr> <tr> <td>14:00 - 15:00</td> <td><a href="#SerGor">Sergey Gorbunov</a> IRON: functional encryption using Intel SGX [<a href="https://crypto-events.di.ens.fr/ecryptnet/slides/FEonSGX_public.pdf">slides</a>]</td> </tr> <tr> <td>15:00 - 15:30</td> <td>Coffee Break</td> </tr> <tr> <td>15:30 - 16:00</td> <td>Panel</td> </tr> </tbody> </table> <h3 id="abstracts">Abstracts</h3> <p><strong><a name="DavEva"></a>Secure multi-party computation: promises, protocols, and practicalities</strong><br /> <em><a href="http://www.cs.virginia.edu/~evans/">David Evans</a></em> (University of Virginia)</p> <p>Secure multi-party computation (MPC) provides a way for two (or more) parties to compute a function that depends on inputs from both parties, while keeping their inputs private. A general solution to this problem have been known since Yao’s pioneering work on garbled circuits in the 1980s, but only recently has it become conceivable to use this approach in real systems. Over the past decade, the costs of executing MPC protocols have dropped by about 7 orders of magnitude, but real-world deployments remain rare, and mostly unsatisfying. In this talk, I’ll provide a brief introduction to MPC and summarize some of the work our group has done to make secure computation scalable, efficient, and accessible. I’ll describe some attempts to build interesting practical systems with MPC including an ongoing effort to develop a decentralized certificate authority that can produce signed certificates without ever exposing the private signing key. Finally, I’ll discuss the remaining impediments that are holding back MPC from being widely used in practice.</p> <p><strong><a name="GeoFuc"></a>Subversion-resistant zero knowledge</strong><br /> <em><a href="http://www.di.ens.fr/~fuchsbau/">Georg Fuchsbauer</a></em> (INRIA and ENS)</p> <p>Motivated by the subversion of “trusted” public parameters in mass-surveillance activities, we study the security of non-interactive zero-knowledge (NIZK) proofs in the presence of a maliciously chosen common reference string. We first provide definitions for subversion-resistant soundness, witness indistinguishability and zero knowledge. We show that certain combinations of goals are unachievable but for all other combinations we give constructions that achieve them.</p> <p>We then turn to zk-SNARKs (succinct non-interactive arguments of knowledge), which are computationally sound NIZK systems with short and efficiently verifiable proofs, used e.g. in cryptocurrencies such as Zcash. We show that under plausible hardness assumptions, many zk-SNARK schemes proposed in the literature can be made subversion-zero-knowledge at very little cost.</p> <p>(joint work with Mihir Bellare and Alessandra Scafuro)</p> <p><strong><a name="IngVer"></a>Energy efficiency and security for cryptographic algorithm implementations</strong><br /> <em><a href="http://homes.esat.kuleuven.be/~iverbauw/">Ingrid Verbauwhede</a></em> (K.U. Leuven)</p> <p>Energy and power efficiency is an extremely important optimization goal when implementing applications on any digital platform. This is important for light-weight InternetOfThings devices as well as high end servers and cloud computing. The first one requires a long battery life, the second one needs to reduce the cost of cooling (and the electricity bill).</p> <p>The energy and power optimization also holds for the implementation of cryptographic algorithms. Our goal is to build devices that can perform the mathematically demanding cryptographic operations in an efficient way. At the same time, we request that the implementations are also secure against a wide range of physical attacks, including side-channel attacks. Unfortunately countermeasures to side-channel attacks impose an extra cost.</p> <p>This presentation will focus on the implementation aspects of cryptographic operations and how to balance the computation requirements with the resource constraints. These concepts will be illustrated with the design of several cryptographic co-processors, secret key, public key and new generation of post-quantum secure algorithms.</p> <p><strong><a name="PasPai"></a>Whitebox cryptomania</strong><br /> <em><a href="https://www.cryptoexperts.com/">Pascal Paillier</a></em> (CryptoExperts)</p> <p>In the utopic world of whitebox cryptomania, cryptographic programs can be freely executed, copied and shared without endangering their inner secret keys, as breaking them requires intractable computational efforts. Once again, constructive cryptography has prevailed over cryptanalysis thanks to reductionist proofs and tamper-resistant cryptographic software has suddenly become a reality. This talk explores the side effects of this parallel universe on cryptographic constructions - good and bad alike - and what they potentially mean for the security of the Cloud.</p> <p><strong><a name="KenPat"></a>Secure storage in the cloud using property preserving encryption</strong><br /> <em><a href="http://www.isg.rhul.ac.uk/~kp/">Kenneth Paterson</a></em> (Royal Holloway)</p> <p>In this talk, we’ll take a look at how Property Preserving Encryption (PPE) schemes can be used to store data in encrypted form at cloud service providers while still allowing various forms of search queries to be carried out against the data. We’ll explain why some of the currently deployed schemes provide insufficient security in practice, and discuss methods by which security can be enhanced whilst preserving search capabilities.</p> <p><strong><a name="RapBos"></a>Searchable encryption: from theory to implementation</strong><br /> <em><a href="https://raphael.bost.fyi/">Raphael Bost</a></em> (DGA and Universite Rennes 1)</p> <p>Searchable encryption is a very appealing concept to store data on an untrusted server, so as to keep search functionalities while ensuring privacy of both the queries and the data. Many different solutions emerged, differing on their security and on their efficiency, originating both from the industry and the academia. Actually, these past few years, searchable encryption has actually been a very hot topic, a lot of work on new constructions or new attacks has been done.</p> <p>In this presentation, I will try to give an insight on the big challenges of searchable encryption, and explain why the compromise between security and performance is the core problem in this area. To do so, I will talk about lower bounds, recent attacks and constructions, and ongoing work, both theoretical and practical. This will give you a glimpse at the variety of techniques and tools that can be applied to searchable encryption, and at how wide this topic can be, ranging from theoretical computer science, to systems design. Finally, I will conclude by describing some exciting open problems on searchable encryption, again both theoretical and practical.</p> <p><strong><a name="SerGor"></a>IRON: functional encryption using Intel SGX</strong><br /> <em><a href="https://cs.uwaterloo.ca/~sgorbuno/">Sergey Gorbunov</a></em> (University of Waterloo)</p> <p>Functional encryption (FE) is an extremely powerful cryptographic mechanism that lets an authorized entity compute on encrypted data, and learn the results in the clear. However, all current cryptographic instantiations for general FE are too impractical to be implemented. We build Iron, a practical and usable FE system using Intel’s recent Software Guard Extensions (SGX). We show that Iron can be applied to complex functionalities, and even for simple functions, outperforms the best known cryptographic schemes. We argue security by modeling FE in the context of hardware elements, and prove that Iron satisfies the security model.</p> <p>Joint work with: Ben A Fisch, Dhinakaran Vinayagamurthy, Dan Boneh</p> Fri, 02 Jun 2017 10:10:00 +0000 https://pariscryptoday.github.io/fifth.html https://pariscryptoday.github.io/fifth.html Jan 12 @ ENS <p>The fourth Paris Area Crypto Day will be held on 12.01.2017 (Thu) at ENS.</p> <ul> <li><a href="http://www.di.ens.fr/CryptoAccess.html.en">Amphi Dussane</a>, ENS (<a href="http://www.di.ens.fr/~wee/docs/ENS-map.pdf">map</a>)</li> <li>Please <a href="https://docs.google.com/forms/d/1yAlkUyKNNxf0JeYJ_n9hgJHboi3lCgB-0TG6PqHVReU/viewform">register</a> (free, lunch included). Deadline 09.01.2016</li> </ul> <h3 id="program">Program</h3> <table> <tbody> <tr> <td>09:30 - 09:50</td> <td>Coffee &amp; Welcome</td> </tr> <tr> <td>10:00 - 11:00</td> <td><a href="#VV">Vinod Vaikuntanathan</a> Low-Complexity Cryptographic Hash Functions</td> </tr> <tr> <td>11:00 - 12:00</td> <td><a href="#MC">Melissa Chase</a> Basing Privacy-Preserving Credentials on Standard Signatures</td> </tr> <tr> <td>12:00 - 13:30</td> <td>Lunch</td> </tr> <tr> <td>14:00 - 15:00</td> <td><a href="#GP">Guillaume Poupard</a> De la crypto à la « cyberguerre » ?</td> </tr> <tr> <td>15:00 - 15:30</td> <td>Coffee Break</td> </tr> <tr> <td>15:30 - 16:30</td> <td><a href="#PAF">Pierre-Alain Fouque</a> Content Delivery over TLS: A Cryptographic Analysis of Keyless SSL</td> </tr> </tbody> </table> <h3 id="abstracts">Abstracts</h3> <p><strong><a name="VV"></a>Low-Complexity Cryptographic Hash Functions</strong><br /> <em><a href="https://people.csail.mit.edu/vinodv/">Vinod Vaikuntanathan</a></em> (MIT)</p> <p>Cryptographic hash functions are efficiently computable functions that shrink a long input into a shorter output while achieving some of the useful security properties of a random function. The most common type of such hash functions is collision resistant hash functions (CRH), which prevent an efficient attacker from finding a pair of inputs on which the function has the same output.</p> <p>Despite the ubiquitous role of hash functions in cryptography, several of the most basic questions regarding their computational and algebraic complexity remained open. In this work we settle most of these questions under new, but arguably quite conservative, cryptographic assumptions, whose study may be of independent interest.</p> <p>Concretely, we obtain the following results:</p> <ul> <li> <p>Low-complexity CRH. Assuming the intractability of finding short codewords in natural families of linear error-correcting codes, there are CRH that shrink the input by a constant factor and have a constant algebraic degree over Z_2 (as low as 3), or even constant output locality and input locality and thus computable by linear-size circuits. Such CRH are potentially MPC- and FHE-friendly.</p> </li> <li> <p>Win-win results. If low-degree CRH with good shrinkage do not exist, this has useful consequences for learning algorithms and data structures.</p> </li> <li> <p>Degree-2 hash functions. Assuming the conjectured intractability of solving a random system of quadratic equations over Z_2, a uniformly random degree-2 mapping is a universal one-way hash function (UOWHF). UOWHF relaxes CRH by forcing the attacker to find a collision with a random input picked by a challenger. On the other hand, a uniformly random degree-2 mapping is not a CRH. We leave the existence of degree-2 CRH open, and relate it to open questions on the existence of degree-2 randomized encodings of functions.</p> </li> </ul> <p>An important research direction is to understand the security of our assumptions from the cryptanalysis standpoint.</p> <p>Joint Work with Benny Applebaum, Naama Haramaty, Yuval Ishai and Eyal Kushilevitz, to appear in ITCS 2017.</p> <p><strong><a name="MC"></a>Basing Privacy-Preserving Credentials on Standard Signatures</strong><br /> <em><a href="http://research.microsoft.com/en-us/um/people/melissac/">Melissa Chase</a></em> (Microsoft Research)</p> <p>Practical anonymous credential systems are generally built around sigma-protocol ZK proofs. This requires that credentials be based on specially formed signatures. Here we ask whether we can instead use a standard (say, RSA, or (EC)DSA) signature that includes formatting and hashing messages, as a credential, and still provide privacy. Existing techniques do not provide efficient solutions for proving knowledge of such a signature: On the one hand, ZK proofs based on garbled circuits (Jawurek et al. 2013) give efficient proofs for checking formatting of messages and evaluating hash functions. On the other hand they are expensive for checking algebraic relations such as RSA or discrete-log, which can be done efficiently with sigma protocols.</p> <p>We design new constructions obtaining the best of both worlds: combining the efficiency of the garbled circuit approach for non-algebraic statements and that of sigma protocols for algebraic ones. We then discuss how to use these as building-blocks to construct privacy-preserving credential systems based on standard RSA and (EC)DSA signatures.</p> <p>Other applications of our techniques include anonymous credentials with more complex policies, the ability to efficiently switch between commitments (and signatures) in different groups, and secure two-party computation on committed/signed inputs.</p> <p><strong><a name="GP"></a> De la crypto à la « cyberguerre » ?</strong><br /> <em><a href="https://www.ssi.gouv.fr/agence/organisation/la-direction-generale/">Guillaume Poupard</a></em> (ANSSI)</p> <p>Discipline pourtant exclusivement défensive, la cryptographie a historiquement été associée à nombre de conflits et d’histoires d’espionnage en tout genre. On aurait pu croire, avec la libéralisation mais également la banalisation de son usage dans notre vie de tous les jours que la crypto allait réintégrer le simple champ des technologies indispensables aux développements numériques mais il n’en est rien. Dans un contexte de fortes incertitudes géopolitiques où le « cyber » tend à jouer un rôle déstabilisateur de plus important mais également face à la menace de terroristes présumés adeptes de « messageries cryptées », la cryptologie continue à jouer un rôle complexe mais déterminant. Petit tour d’horizon de la question et des enjeux vu de l’ANSSI…</p> <p><strong><a name="PAF"></a> Content Delivery over TLS: A Cryptographic Analysis of Keyless SSL</strong><br /> <em><a href="https://www.di.ens.fr/~fouque/">Pierre-Alain Fouque</a></em> (Rennes)</p> <p>The Transport Layer Security (TLS) protocol is designed to allow two parties, a client and a server, to communicate securely over an insecure network. However, when TLS connections are proxied through an intermediate middlebox, like a Content Delivery Network (CDN), the standard end-to-end security guarantees of the protocol no longer apply. In this talk, we will investigate the security guarantees provided by Keyless SSL, a CDN architecture currently deployed by CloudFlare that composes two TLS 1.2 handshakes to obtain a proxied TLS connection. We demonstrate new attacks that show that Keyless SSL does not meet its intended security goals. These attacks have been reported to CloudFlare and we are in the process of discussing fixes.</p> <p>We argue that proxied TLS handshakes require a new, stronger, 3-party security definition. We modify Keyless SSL and prove that our modifications guarantee the new 3-party security, assuming ACCE-security for the individual TLS 1.2 connections. We also propose a new design for Keyless TLS 1.3 and prove its security, assuming that the TLS 1.3 handshake implements an authenticated 2-party key exchange. Notably, we show that secure proxying in Keyless TLS 1.3 is computationally lighter and requires simpler assumptions on the certificate infrastructure than our proposed fix for Keyless SSL. Our results indicate that proxied TLS architectures, as currently used by a number of CDNs, may be vulnerable to subtle attacks and deserve close attention.</p> <p>joint work with K. Bhargavan, I. Carlson, C. Onete, and B. Richard Will appear at EURO S&amp;P 2017.</p> Sun, 08 Jan 2017 10:10:00 +0000 https://pariscryptoday.github.io/fourth.html https://pariscryptoday.github.io/fourth.html Sep 6 @ INRIA <p>The third Paris Area Crypto Day will be held on 06.09.16 (Tue) at INRIA.</p> <ul> <li><a href="https://www.inria.fr/en/centre/paris/overview/how-to-reach-us">Salle JL Lions</a>, INRIA</li> <li>Please <a href="https://docs.google.com/forms/d/1q8oqAj31ODGjPV00q8bE6p4GMFHZgBXO6-V3p9Zc-No/">register</a> (free, lunch included). Deadline 01.09.2016</li> </ul> <h3 id="program">Program</h3> <table> <tbody> <tr> <td>10:00 - 10:10</td> <td>Welcome</td> </tr> <tr> <td>10:10 - 11:10</td> <td><a href="#VL">Vadim Lyubashevsky</a> Directions in Lattice Cryptography</td> </tr> <tr> <td>11:30 - 12:00</td> <td><a href="#MM">Michele Minelli</a> FHE Circuit Privacy Almost For Free</td> </tr> <tr> <td>12:00 - 12:30</td> <td><a href="#VLa">Virginie Lallemand</a> Cryptanalysis of the FLIP Family of Stream Ciphers</td> </tr> <tr> <td>12:30 - 14:30</td> <td>Lunch</td> </tr> <tr> <td>14:30 - 15:30</td> <td><a href="#CB">Chris Brzuska</a> Assumptions in Cryptography</td> </tr> <tr> <td>15:30 - 16:00</td> <td>Coffee Break</td> </tr> <tr> <td>16:00 - 16:30</td> <td><a href="#BC">Benoît Cogliati</a> EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC</td> </tr> <tr> <td>16:30 - 17:00</td> <td><a href="#GC">Geoffroy Couteau</a> Encryption Switching Protocols</td> </tr> </tbody> </table> <h3 id="abstracts">Abstracts</h3> <p><strong><a name="VL"></a>Directions in Lattice Cryptography</strong><br /> <em><a href="http://researcher.ibm.com/researcher/view.php?person=zurich-VAD">Vadim Lyubashevsky</a></em> (IBM Zurich)</p> <p>In the past 20 years, lattice cryptography went from a purely theoretical research area to actually being implemented inside of Google Chrome today. I will describe the state-of-the-art results in practical lattice cryptography and sketch out what I consider to be interesting directions for further research.</p> <p><strong><a name="MM"></a>HE Circuit Privacy Almost For Free</strong><br /> <em>Michele Minelli</em> (ENS)</p> <p>Circuit privacy is an important property for many applications of fully homomorphic encryption. Prior approaches for achieving circuit privacy rely on superpolynomial noise flooding or on bootstrapping. In this work, we present a conceptually different approach to circuit privacy based on a novel characterization of the noise distribution. In particular, we show that a variant of the GSW FHE for branching programs already achieves circuit privacy; this immediately yields a circuit-private FHE for NC1 circuits under the standard LWE assumption with polynomial modulus-to-noise ratio. Our analysis relies on a variant of the discrete Gaussian leftover hash lemma which states that $e^t G^{−1}(v)$ + small noise does not depend on $v$. We believe that this result is of independent interest.</p> <p>Joint work with Florian Bourse, Rafaël Del Pino and Hoeteck Wee</p> <p><strong><a name="VLa"></a>Cryptanalysis of the FLIP Family of Stream Ciphers</strong><br /> <em>Virginie Lallemand</em> (INRIA)</p> <p>At Eurocrypt 2016, Méaux et al. proposed FLIP, a new family of stream ciphers intended for use in Fully Homomorphic Encryption systems. Unlike its competitors which either have a low initial noise that grows at each successive encryption, or a high constant noise, the FLIP family of ciphers achieves a low constant noise thanks to a new construction called filter permutator. In this paper, we present an attack on the early version of FLIP that exploits the structure of the filter function and the constant internal state of the cipher. Applying this attack to the two instantiations proposed by Méaux et al. allows for a key recovery in $2^{54}$ basic operations (resp. $2^{68}$), compared to the claimed security of $2^{80}$ (resp. $2^{128}$).</p> <p>Joint work with Sébastien Duval and Yann Rotella</p> <p><strong><a name="CB"></a>Assumptions in Cryptography</strong><br /> <em><a href="http://chrisbrzuska.de/">Chris Brzuska</a></em> (TU Hamburg)</p> <p><strong><a name="BC"></a>EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC</strong><br /> <em>Benoît Cogliati</em> (University of Versailles)</p> <p>We propose a nonce-based MAC construction called EWCDM (<em>Encrypted Wegman-Carter with Davies-Meyer</em>), based on an almost xor-universal hash function and a block cipher, with the following properties: (i) it is simple and efficient, requiring only two calls to the block cipher, one of which can be carried out in parallel to the hash function computation; (ii) it is provably secure beyond the birthday bound when nonces are not reused; (iii) it provably retains security up to the birthday bound in case of nonce misuse. Our construction is a simple modification of the Encrypted Wegman-Carter construction, which is known to achieve only (i) and (iii) when based on a block cipher. Underlying our new construction is a new PRP-to-PRF conversion method coined Encrypted Davies-Meyer, which turns a pair of secret random permutations into a function which is provably indistinguishable from a perfectly random function up to at least $2^{2n/3}$ queries, where $n$ is the bit-length of the domain of the permutations.</p> <p>Joint work with Yannick Seurin</p> <p><strong><a name="GC"></a>Encryption Switching Protocols</strong><br /> <em>Geoffroy Couteau</em> (ENS)</p> <p>We put forth a novel cryptographic primitive: encryption switching protocol (ESP), allowing to switch between two encryption schemes. Intuitively, this two-party protocol converts given ciphertexts from one scheme into ciphertexts of the same messages in the other scheme, for any polynomial number of switches, in any direction. Although ESP is a special kind of two-party computation protocol, it turns out that ESP implies general two-party computation under natural conditions. In particular, our new paradigm is tailored to the evaluation of functions over rings. Indeed, assuming the compatibility of two additively and multiplicatively homomorphic encryption schemes, switching ciphertexts makes it possible to efficiently reconcile the two internal laws. Since no such pair of schemes appeared in the literature, except for the non-interactive case of fully homomorphic encryption which still remains prohibitive in practice, we build the first ElGamal-like encryption scheme over $(Z_n;\times)$ as a complement to the Paillier encryption scheme over $(Z_n;+)$, where $n$ is a strong RSA modulus. Eventually, we also instantiate secure ESP between the two schemes, in front of malicious adversaries. Thanks to a pre-processing step, we manage to get an online communication in terms of group elements which neither depends on the security parameter nor on the modulus $n$. This makes use of a new technique called refreshable twin-ciphertext pool that is of independent interest.</p> <p>Joint work with Thomas Peters and David Pointcheval</p> Thu, 01 Sep 2016 10:10:00 +0000 https://pariscryptoday.github.io/third.html https://pariscryptoday.github.io/third.html June 30 @ ENS <p>The second Paris Area Crypto Day will be held on 30.06.16 (Thur) at ENS.</p> <ul> <li><a href="https://www.di.ens.fr/AccesDI.html.fr">Amphi Rataud</a>, ENS</li> <li>Please <a href="https://docs.google.com/forms/d/1avLA_9MSnv5qR0D1MriNhbKLsqB17CyOx2fP_sv_x4k/viewform">register</a> (free, lunch included). Deadline 27.06.16</li> </ul> <h3 id="program">Program</h3> <table> <tbody> <tr> <td> 9:50 - 10:00  </td> <td>Welcome</td> </tr> <tr> <td>10:00 - 11:00</td> <td><a href="#AC">Anne Canteaut</a> Algebraic Distinguishers against Symmetric Primitives</td> </tr> <tr> <td>11:00 - 12:00</td> <td><a href="#LR">Leonid Reyzin</a> On Memory Hardness of SCrypt</td> </tr> <tr> <td>12:00 - 14:00</td> <td>Lunch</td> </tr> <tr> <td>14:00 - 15:30</td> <td><a href="#VS">Victor Shoup</a> Hash Proof Systems, Old and New</td> </tr> <tr> <td>15:30 - 16:00</td> <td>Coffee Break</td> </tr> <tr> <td>16:00 - 17:00</td> <td><a href="#RP">Rafael Pass</a> Analysis of the Blockchain Protocol in Asynchronous Networks</td> </tr> </tbody> </table> <p><strong>Organizers.</strong> Michel Abdalla and Hoeteck Wee (<a href="https://crypto.di.ens.fr/web2py">ENS</a>)</p> <p><strong>Acknowledgements.</strong> ERC <a href="http://www.di.ens.fr/~pointche/CryptoCloud/">CryptoCloud</a>, <a href="http://cordis.europa.eu/project/rcn/193658_en.html">aSCEND</a>, and <a href="http://www.ecrypt.eu.org/net/">ECRYPT-NET</a></p> <hr /> <h3 id="abstracts">Abstracts</h3> <p><strong><a name="AC"></a>Algebraic Distinguishers against Symmetric Primitives</strong><br /> <em>Anne Canteaut, INRIA</em></p> <p>Higher-order differential attacks, introduced by Knudsen in 1994, are the first family of attacks against block ciphers which exploit some specific property of the polynomial representation of the cipher. Indeed, these attacks rely on the fact that, for all keys, the involved multivariate polynomial does not have maximal degree. This idea has then been generalized by several authors and has led to the notion of cube distinguishers, and more recently to the so-called division property. Both generalizations actually exploit the fact that some given monomials do not appear in the polynomials. In this talk, I will present some unified view of these attacks, and I will show how such algebraic properties propagate through the successive layers of iterated primitives.</p> <p>Joint work with Christina Boura (Université de Versailles St Quentin)</p> <p><strong><a name="LR"></a>On Memory Hardness of SCrypt</strong><br /> <em>Leonid Reyzin, BU</em></p> <p>The key derivation function scrypt (Percival, 2009) is defined as the result of n steps, where each step consists of selecting one or two previously computed values (the selection depends on the values themselves) and hashing them. It is conjectured that this function is memory-hard.</p> <p>We show that indeed scrypt is maximally memory-hard in the parallel random oracle model. Specifically, we show that the product of memory and time used during the computation of scrypt must be Theta(n^2). Moreover, even if the amount of memory used fluctuates during the computation, we show that the sum of memory usage over time (a.k.a. “cumulative memory complexity” introduced by Alwen and Serbinenko in 2015) is Theta(n^2). This suggests that computation of multiple instances of scrypt in cannot be improved via amortization. Our result holds even if the adversary is allowed to make an unlimited number of parallel random oracle queries at each step.</p> <p>Previous work (Alwen, Chen, Kamath, Kolmogorov, Pietrzak, Tessaro 2016) showed a lowerbounds of Omega( n^2 / log^2 n) on the memory complexity of scrypt in more restricted models, where the adversary was assumed to store only random oracle outputs or specific functions of them. Our result improves the bound quantitatively by eliminating the log^2 n factor and qualitatively by allowing arbitrary storage by the adversary.</p> <p>Joint work with Joel Alwen, Jeremiah Blocki, and Krzysztof Pietrzak.</p> <p><strong><a name="VS"></a>Hash Proof Systems, Old and New</strong><br /> <em>Victor Shoup, NYU</em></p> <p>This talk will be an exposition on hash proof systems and their applications. I will review the basic definitions, constructions, and applications of hash proof systems, focusing on the original application to chosen ciphertext secure public key encryption, as well as more recent applications to password authenticated key exchange.</p> <p><strong><a name="RP"></a>Analysis of the Blockchain Protocol in Asynchronous Networks</strong><br /> <em>Rafael Pass, Cornell</em></p> <p>Nakamoto’s famous blockchain protocol enables achieving consensus in a so-called <em>permissionless</em> setting—anyone can join (or leave) the protocol execution, and the protocol instructions do not depend on the identities of the players. His ingenious protocol prevents “sybil attacks” (where an adversary spawns any number of new players) by relying on computational puzzles (a.k.a. “moderately hard functions”) introduced by Dwork and Naor (Crypto’92).</p> <p>Prior works that analyze the blockchain protocol either make the simplifying assumption that network channels are fully synchronous (i.e. messages are instantly delivered without delays) (Garay et al, Eurocrypt’15) or only consider specific attacks (Nakamoto’08; Sampolinsky and Zohar, FinancialCrypt’15); additionally, as far as we know, none of them deal with players joining or leaving the protocol.</p> <p>We prove that the blockchain consensus mechanism satisfies a strong forms of consistency and liveness in an asynchronous network with adversarial delays that are a-priori bounded, within a formal model allowing for adaptive corruption and spawning of new players, assuming that the computational puzzle is modeled as a random oracle. (We complement this result by showing a simple attack against the blockchain protocol in a fully asynchronous setting, showing that the “puzzle-hardness” needs to be appropriately set as a function of the maximum network delay.)</p> <p>As an independent contribution, we define an abstract notion of a blockchain protocol and identify appropriate security properties of such protocols; we prove that Nakamoto’s blockchain protocol satisfies them and that these properties are sufficient for typical applications. We finally show how to use our analysis to build <em>new</em> blockchain protocols that overcome some of the bottlenecks in Nakamoto’s original protocol.</p> <p>The analysis of Nakamoto’s blockchain is based on joint work with Lior Seeman and abhi shelat, and new blockchain protocols are based on joint work with Elaine Shi. No prior knowledge of Bitcoin or the blockchain will be assumed.</p> Fri, 03 Jun 2016 10:10:00 +0000 https://pariscryptoday.github.io/second.html https://pariscryptoday.github.io/second.html Crypto Day 10000.10.10000 <p>The first Paris Area Crypto Day will be held on 16.02.16 (Tues) at ENS.</p> <ul> <li><a href="https://www.di.ens.fr/AccesDI.html.fr">Amphi Rataud</a>, ENS</li> <li>Please <a href="https://docs.google.com/forms/d/1VkvweWTJN8s1s6CH_1PGq5NlDcNYGvpziEmRW-jkb1E/viewform">register</a> (free, lunch included). Deadline 11.02.16</li> </ul> <h3 id="program">Program</h3> <table> <tbody> <tr> <td>10:00 - 10:10</td> <td>Welcome</td> </tr> <tr> <td>10:10 - 11:10</td> <td><a href="#AJ">Antoine Joux</a> Technical History of Discrete Logarithms in Small Characteristic Finite Fields</td> </tr> <tr> <td>11:20 - 11:40</td> <td><a href="#RG">Romain Gay</a> Tightly Secure CCA-Secure Encryption without Pairings</td> </tr> <tr> <td>11:40 - 12:00</td> <td><a href="#PM">Pierrick Méaux</a> Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts</td> </tr> <tr> <td>12:00 - 14:00</td> <td>Lunch</td> </tr> <tr> <td>14:00 - 15:00</td> <td><a href="#SB">Sonia Belaïd</a> On the Use of Masking to Defeat Power-Analysis Attacks</td> </tr> <tr> <td>15:00 - 15:20</td> <td><a href="#AP">Alain Passelègue</a> Randomness Complexity of Private Circuits for Multiplication</td> </tr> <tr> <td>15:20 - 15:50</td> <td>Coffee Break</td> </tr> <tr> <td>15:50 - 16:50</td> <td><a href="#KB">Karthikeyan Bhargavan</a> Freak, Logjam, and Sloth: Protecting TLS from Legacy Crypto</td> </tr> </tbody> </table> <p><strong>Organizers.</strong> Michel Abdalla and Hoeteck Wee (<a href="https://crypto.di.ens.fr/web2py">ENS</a>)</p> <p><strong>Acknowledgements.</strong> ERC <a href="http://www.di.ens.fr/~pointche/CryptoCloud/">CryptoCloud</a> and <a href="http://cordis.europa.eu/project/rcn/193658_en.html">aSCEND</a></p> <hr /> <h3 id="abstracts">Abstracts</h3> <p><strong><a name="AJ"></a>Technical History of Discrete Logarithms in Small Characteristic Finite Fields</strong> <em>Antoine Joux</em></p> <p>Due to its use in cryptographic protocols such as the Diffie–Hellman key exchange, the discrete logarithm problem attracted a considerable amount of attention in the past 40 years. In this talk, we summarize the key technical ideas and their evolution for the case of discrete logarithms in small characteristic finite fields. This road leads from the original belief that this problem was hard enough for cryptographic purpose to the current state of the art where the algorithms are so efficient and practical that the problem can no longer be considered for cryptographic use.</p> <p><strong><a name="SB"></a>On the Use of Masking to Defeat Power-Analysis Attacks</strong> <em>Sonia Belaïd</em></p> <p>While most cryptographic algorithms are assumed to be secure against black-box attacks, they are often vulnerable to side-channel attacks which exploit the physical emanations of the underlying device (e.g., temperature, power consumption, time). In order to defeat such attacks, several countermeasures have been exhibited within the last two decades. So far, the most deployed one at the algorithmic level is probably the use of masking. It consists in randomly splitting each sensitive variable of the computation into t+1 shares, where the masking order t represents the security level. While this countermeasure is very efficient in practice, it can be complex to design while t grows. During this talk, I will discuss the current issues to build higher-order masking schemes and the solutions that currently show up. In particular, I will present the construction of theoretical proofs to show the security of such schemes in the widely used t-probing leakage model.</p> <p><strong><a name="KB"></a>Freak, Logjam, and Sloth: Protecting TLS from Legacy Crypto</strong> <em>Karthikeyan Bhargavan</em></p> <p>The Transport Layer Security (TLS) protocol suffers from legacy bloat: after 20 years of evolution, it features many versions, extensions, and ciphersuites, some of which are obsolete and known to be insecure. Implementations and deployments of TLS deal with this complexity by implementing composite state machines that allow new and old features to coexist for interoperability, while waiting for deprecated features to be disabled over time. Getting this composition right is tricky, and any flaw can result in a serious attack that bypasses the expected security of TLS.</p> <p>This talk will discuss three recent vulnerabilities discovered in our group: FREAK uses legacy support for export-grade RSA cipher suites to break into connections between mainstream browsers and 25% of the web; Logjam exploits a protocol flaw to confuse DHE key exchanges into using export-grade Diffie-Hellman groups; SLOTH exploits hash function collisions to mount downgrade and impersonation attacks on TLS. These attacks rely on a combination of protocol-level weaknesses, implementation bugs, and weak cryptography. The talk will advocate principled methods to avoid such weaknesses in the future, such as software verification and new robust designs for new protocols like TLS 1.3.</p> <p><strong><a name="RG"></a>Tightly Secure CCA-Secure Encryption without Pairings</strong> <em>Romain Gay</em></p> <p>We present the first CCA-secure public-key encryption scheme based on DDH where the security loss is independent of the number of challenge ciphertexts and the number of decryption queries. Our construction extends also to the standard k-Lin assumption in pairing-free groups, whereas all prior constructions starting with Hofheinz and Jager (Crypto ‘12) rely on the use of pairings. Moreover, our construction improves upon the concrete efficiency of existing schemes, reducing the ciphertext overhead by about half (to only 3 group elements under DDH), in addition to eliminating the use of pairings. We also show how to use our techniques in the NIZK setting. Specifically, we construct the first tightly simulation-sound designated-verifier NIZK for linear languages without pairings. Using pairings, we can turn our construction into a highly optimized publicly verifiable NIZK with tight simulation-soundness.</p> <p>Joint work with Dennis Hofheinz, Eike Kiltz and Hoeteck Wee</p> <p><strong><a name="PM"></a>Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts</strong> <em>Pierrick Méaux</em></p> <p>Symmetric ciphers purposed for Fully Homomorphic Encryption (FHE) have recently been proposed for two main reasons. First, minimizing the implementation (time and memory) overheads that are inherent to current FHE schemes. Second, improving the homomorphic capacity, i.e. the amount of operations that one can perform on homomorphic ciphertexts before bootstrapping, which amounts to limit their level of noise. Existing solutions for this purpose suggest a gap between block ciphers and stream ciphers. The first ones typically allow a constant but small homomorphic capacity, due to the iteration of rounds eventually leading to complex Boolean functions (hence large noise). The second ones typically allow a larger homomorphic capacity for the first ciphertext blocks, that decreases with the number of ciphertext blocks (due to the increasing Boolean complexity of the stream ciphers’ output). In this work, we aim to combine the best of these two worlds, and propose a new stream cipher construction that allows constant and small(er) noise. Its main idea is to apply a Boolean (filter) function to a public bit permutation of a constant key register, so that the Boolean complexity of its outputs is constant. We then propose an instantiation of the filter designed to exploit recent (3rd-generation) FHE schemes, where the error growth is quasi-additive when adequately multiplying ciphertexts with the same amount of noise. We finally analyze the cryptanalytic security and noise of a couple of instances of this stream cipher, and conclude by highlighting its excellent properties regarding the other goal of minimizing the time and memory complexity of calculus delegation (for 2nd-generation FHE schemes).</p> <p>Joint work with Anthony Journault, François-Xavier Standaert and Claude Carlet.</p> <p><strong><a name="AP"></a>Randomness Complexity of Private Circuits for Multiplication</strong> <em>Alain Passelègue</em></p> <p>Many cryptographic algorithms appear to be vulnerable to side channel analysis and several leakage models have been introduced to better understand these analyses. In 2003, Ishai, Sahai and Wagner introduced the $d$-probing security model, in which an attacker can observe at most $d$ intermediate values during a processing. They also proposed an algorithm that securely performs the multiplication of 2 bits in this model, using only $d(d+1)/2$ random bits to protect the computation. The $d$-probing model and the latter multiplication algorithm are nowadays widely used by the community to either prove the security of constructions or to define secure implementations.</p> <p>In this paper, we study the randomness complexity of multiplication algorithms secure in the $d$-probing model. On this subject, we propose several contributions: we provide new theoretical characterizations and constructions, new practical constructions and a new efficient algorithmic tool to analyze the security of such schemes.</p> <p>We first start by a theoretical treatment of the subject: we propose an algebraic model for multiplication algorithms and exhibit an algebraic characterization of the security in the $d$-probing model. Using this algebraic characterization, we prove a linear (in $d$) lower bound as well as a quasi-linear (non-constructive) upper bound for this randomness cost. This characterization also allows us to better understand the security of a multiplication algorithm and we construct a new generic algorithm to perform secure multiplication in the $d$-probing model that only uses $d + d^2/4$ random bits.</p> <p>From a practical point of view, we consider the important cases $d \le 4$ that are actually used in real-life implementations and we build optimal algorithms for these small-order cases. More precisely, we propose algorithms with a randomness complexity matching our theoretical lower bound. Finally, still using our algebraic characterization, we provide a new dedicated verification tool, based on information set decoding, which aims at finding attacks on algorithms for fixed order $d$ at a very low computational cost.</p> <p>Joint work with Sonia Belaïd, Fabrice Benhamouda, Emmanuel Prouff, Adrian Thillard, and Damien Vergnaud.</p> Thu, 04 Feb 2016 23:20:28 +0000 https://pariscryptoday.github.io/first.html https://pariscryptoday.github.io/first.html