On the (Im)Possibility of Key Dependent Encryption Iftach Haitner Thomas Holenstein Microsoft Research Princeton University August 04, 2009 outline Define Key Dependent Message (KDM) secure encryption scheme Two (impossibility) results – On fully-black-box reductions from KDM security to TDP – On strongly-black-box reductions from KDM security to “any” hardness assumption WhatKey classDependant of query functionsMessage (e.g., h) should be Weak Security considered? An encryption scheme (Enc,Dec) is KDM secure, if In most settings, we should consider any (efficient) for any function efficient A Challenger Challenger h1:{0,1}n {0,1}m h1:{0,1}n {0,1}m Enck(h1(k)) h2 kÃ{0,1}n A kÃ{0,1}n A ¼C Enck(Um) h2 A cannot find k Enck(h2(k)) Enck(Um) … … Feasibility Results Limited output length functions: – [Hofheinz-Unruh ‘08] based on any PKE Family of affine functions: – [Bonhe-Halevi-Hamburg-Ostrovsky ‘08] based on DDH – [Applabaum-Cash-Peikert-Sahai ‘09] based on LPN/LWE Efficient functions – [Gentry ‘09] based on the self reference security of [Gentry ‘09] Any function – [Black-Rogway-Shrimpton ‘02] based on Random Oracle Our Impossibility Results (informal) It is impossible to construct (via black-box techniques) KDM encryption scheme that is secure against the family of poly-wise independent hash functions, based on OWF – extends to TDP any function, based on “any assumption” • We focus on the private key setting • Hold also for the “many PK keys” setting outline Define Key Dependent Message (KDM) secure encryption scheme Our (impossibility) results – On fully black-box reductions from KDM security to TDP – On strongly black-box reduction from KDM security to “any” hardness assumption Fully-Black-Box Reduction from KDM security to OWF Black-box construction (Enc,Dec) OWF Black-box proof of security Adversary for breaking KDM ) Inverter for breaking OWF Inverter for OWF Adversary for KDM OWF Black-box proof of security Breaks the KDM security of (Enc¼,Dec¼) Y à {0,1}n A OWF ¼ R x 2 ¼-1(y) Impossibility Result for OWF Based Schemes There exists no fully-black-box reduction from KDMsecure encryption scheme to OWF, which is secure against the family of poly(n)-wise independent hash functions More formally: Let (Enc(),Dec()) be a OWF based encryption scheme, and let v(n) = |Enc()(M)|, for M2{0,1}2n. Then (Enc(),Dec()) cannot be proved (in a black-box way) to be KDM-secure against Hv(n)+n – a family of (v(n)+n)-independent hash functions from {0,1}n to {0,1}2n Our adversary 1) Select h à Hv(n)+n 2) On input C, output (the first) k Y à {0,1}n s.t. Deck(C) = h(k) A 1n h c k OWF ¼ R … x2 ¼-1(y) 1. A breaks the (weak) KDM security of (Enc¼,Dec¼) 2. ¼ is hard to invert in the presence of A. Proof: a la’ [Simon ‘98] /[Gennaro-Trevisan ‘01, H-Hoch-Reingold- Segev ‘07] outline Define Key Dependent Message (KDM) secure encryption scheme Our (impossibility) results – On fully black-box reductions from KDM security to TDP – On strongly black-box reductions from KDM security to “any” hardness assumption Strongly Black-Box Reduction from KDM security to ¡ Let ¡ be a cryptographic assumption (e.g., factoring is hard) Arbitrary construction Black-box proof of security. The query function h is treated as a black box Adversary for ¡ Adversary for KDM Strongly Black-box proof of security A break the KDM security of (Enc,Dec) A 1n h c k R for breaking ¡ … p,q 1. h is only accessed via its input/output interface 2. Access to h is not given to a “third party” n = pq Factoring is ¡hard Impossibility Result for Strongly Black-Box Reductions Assume that there exists a strongly-black-box reduction from KDM encryption scheme to ¡, which is secure against On – the family of random functions from {0,1}n to {0,1}2n. Then ¡ can be broken unconditionally Our Adversary 1) Select h à On 2) On query C, output (the first) k Breakss.t. theDek KDM(C) = h(k) k security of (Enc,Dec) A ¡ R 1. A breaks the (weak) KDM security of (Enc,Dec) 2. RA,¡ can be efficiently emulated The Emulation 1n hÃOn A x1 h h(x1) x2 ¡ R h(x2) … c k 1. Answer to h(xi) with a random yi2{0,1}2n (while keeping consistency) 2. On query C, return (the first) xi s.t Decx (C) = yi i Proof Idea: the probability that h(k)= Deck(C) for non-queried k, is 2-2n Further Issues Both bounds hold for 1-1 PRF Open questions Prove feasibility result against larger class of functions Extend the first impossibility result to other assumptions (e.g., “Generic Groups”)