300 likes | 318 Views
This workshop, held in Chennai in January 2019, focuses on secure multiparty computation, exploring the concept of approximate degree and bounded indistinguishability in global computation to prevent local leakage. Discussions delve into scenarios where local closeness implies global closeness, addressing factors like visual cryptography, secret sharing schemes, and quantum query complexities. The event also examines the relationship between indistinguishability and independence in various cryptographic scenarios, proposing potential conjectures and conclusions regarding the connection between local closeness and AC0-security in cryptographic systems.
E N D
Andrej Bogdanov Chinese University of Hong Kong APPROXIMATE DEGREE AND BOUNDED INDISTINGUISHABILITY CAALM workshop, Chennai | January 2019
💰💰 💰💰 💰💰 💰💰 💰 💰💰 💰💰
secure multiparty computation [Yao, Ben Or et al., Chaumet al.]
allows global computation • prevents local leakage Is this reasonable? Is this the best we can do?
Bounded indistinguishability (X1,…, Xn) and (Y1,…, Yn) are k-close if all their projections on size-k subsets are identical Example (X1, X2, X3) uniform s.t.X1 + X2 + X3 = 0 (Y1, Y2, Y3) uniform s.t.Y1 + Y2 + Y3 = 1
When does local closeness imply global closeness? ⨁ AC0 ROF AND NC0
(X1,…, Xn), (Y1,…, Yn) are bit sequences m, n: {0, 1}n→R their p.m.f.s • f = m–n local global f ∑ f(x) p(x) = 0 ∑ f(x) f(x) small for all p of degree ≤ k
∑ f(x) f(x) small ∑ f(x) p(x) = 0 for all p of degree ≤ k • approximate • if there f has • degree ≤ k • exists p: Rn → Rof degree ≤ k such that • |f(x) – p(x)| ≤ e for allxin {0, 1}n
f cannot distinguish any k-close X, Y if • and only if degef≤k
Approximate degree of AND xd xd Td(x) degeAND=Q(√ n log 1/e) [Nisan-Szegedy]
secret sharing scheme secret = or shares = or 1 1 0 0 reconstruction function = AND
How to share g(x) = ES[Pi∈Sxi]2 x ∈{–1, 1}n S |S| ≤ (n –√n)/2 To share bit b, sample x w/p ∝ g(x) | Pxi = b
∑ f(x) AND(x)large ∑ f(x) p(x) = 0 • f = Pi∈Sxi ES[Pi∈Sxi]2/Z for all p of degree ≤ k S • f(1n) = 1/Z • Z = ∑ES[Pi∈Sxi]2 • = Pr[S]
degree ≤ query complexity exact ≤ deterministic approximate ≤ randomized ≤ 2x quantum
Grover: deg≈AND = O(√n) Reichardt: deg≈ ∀ROF = O(√n) open: Is deg≈ ∀ROF = W(√n)?
Composition f … g g ? deg≈f ∘ g ≥ deg≈f deg≈g
Composition deg≈ ∀ROF2 = W(√n) [Sherstov, Bun-Thaler, …] deg≈ ∀ROFd = 2-O(d) √n [Ben-David et al.]
? deg≈ ∃AC0 = W(n) ? deg≈ ∃DNF = W(n) deg≈ ∃AC0d = n1 – 2 -W(d) [Bun-Thaler] deg≈ ∀kDNF = O(n1 – 1/k) [Sherstov]
Imperfect security If X, Yare symmetricand k-close, then they are (K, e-O(k /K))-close for K ≤ n/4. 2 advantage [Williamson] 0 n coalition size k = √n
Classical vs. quantum If f requires k queries, then it requires W(k1/6) quantum queries [Nisan-Szegedy, Bealset al.] If X, Y are (k, 0.01)-close, are they (k1/10, 0.1)-quantum close?
Indistingushability vs. independence Polylog-wise independence fools AC0… [Braverman] …but √-wise indistingushability doesn’t
Indistingushability vs. independence Common use: x = As for linear code A Conjecture: If As and Bs are polylog-close, are they AC0-close?
There are W(n)-close X, Ythat are separated by some AC0 function [B.-Ishai-Viola-Williamson] Alphabet size exponential in n Conjecture: W(n) <n– 1
Ramp secret sharing There are X, Ythat are 49%n-close but AC0-far by any size 51%n coalitions Here gap is necessary
For specific distributions originating in crypto, local closeness sometimes does imply AC0-security. [Ishaiet al., Faust et al., Rothblum]