CORDIS - Wyniki badań wspieranych przez UE
CORDIS

Cryptography for Privacy and Integrity of Computation on Untrusted Machines

Periodic Reporting for period 1 - PICOCRYPT (Cryptography for Privacy and Integrity of Computation on Untrusted Machines)

Okres sprawozdawczy: 2021-06-01 do 2022-11-30

Due to phenomena like the ubiquity of the Internet and cloud computing it is increasingly common to store and process data on third-party machines. In spite of its attractive aspects, this trend raises a number of security concerns, including:

How to ensure that the results computed by third parties are correct (integrity) and no unauthorized information is leaked (privacy)?

The current way to deal with these problems is to trust third parties under legislation guarantees. This approach assumes that third-party machines stay honest all time, even if they get hacked! This is unrealistic and contradicted by the numerous security incidents that are regularly reported. In contrast, our vision is that any computing device must be able to store and process data on untrusted machines without risking for privacy and integrity and without the need of trusting these machines. Recent trends in cryptography promise solutions to realize our vision but the existing generation of protocols is limited due to its high costs and its poor support of emerging applications such as data streams processing.

The main goal of PICOCRYPT is to invent a new generation of cryptographic protocols for computing securely on untrusted machines in a way that is cost-effective and suitable for future application scenarios. While existing solutions are either general but impractical or efficient but of limited applicability, in PICOCRYPT we will look for protocols that support a wide range of applications while staying efficient. In particular, to achieve our main goal, PICOCRYPT aims to achieve the following objectives:
- Design new design methodologies and techniques for scaling up the performance of cryptographic protocols for ensuring integrity of computation on untrusted machines.
- Advance the theory and practice of cryptographic primitives for ensuring authenticity of computation on untrusted machines;
- Design new protocols for privacy and integrity of computation on untrusted machines;
- Analyse the challenges imposed by computing on untrusted machines over data streams, and develop new foundations to fit this scenario;
- Assess the cost-effectiveness of our new cryptographic protocols via new evaluation methods and experiments.

The solutions developed in PICOCRYPT can enable a paradigm shift in the way privacy and integrity will be enforced and will have impact in the IT world by making remote computing safer not only for citizens but also for public and private organizations that due to the current risks renounce to these services.
The first period of the project focused on the first two aforementioned objectives, namely achieving integrity and authenticity of computation performed on untrusted machines. Our work also addressed the last objective by generating, when appropriate, implementations and experiments to assess the costs of our solutions.

With respect to the problem of integrity of computation, we mainly focused on two cryptographic primitives: zero-knowledge succinct non-interactive arguments (aka zkSNARKs) and vector commitments. Both of these primitives are a form of succinct proof systems that enable an untrusted party to prove the correctness of data and computation by providing short and easy to verify proofs. Our most significant advances in these areas have been on expanding our modular design approach in order to build more efficient zkSNARKs, and on studying the foundations of vector commitments.

More specifically, our most significant results in this period are:
- the design of a new framework and techniques to build universal and updatable zkSNARKs with increased efficiency (published at Asiacrypt 2021);
- the proposal of new zkSNARKs for the problem of proving membership of a batch of elements in a large set (published at ACM CCS 2022);
- the study of vector commitments by proving that a significant class of these schemes is impossible to realize (published at TCC 2022).

With respect to the problem of authenticity of computation, we focused on homomorphic signatures. Our most significant results in this period are:
- the introduction and realization of a new class of homomorphic signature schemes with increased expressivity and efficiency (published at ACM CCS 2022);
- the proposal of a new approach to build homomorphic signature schemes via functional commitments, and realizations of this primitive (published at Asiacrypt 2022);
- a new methodology to build multi-key homomorphic signatures from single-key ones (published in the Theoretical Computer Science journal).
ll the project's results that we mentioned above have advanced significantly the state of the art; this is corroborated by the fact that they have been accepted for publication at top-tier venues in the fields of cryptography and security.

The results achieved so far constitute first steps in the plans of our project. Significant work remains to be done to achieve the main objectives.

In the near future, we will improve our solutions for integrity and authenticity of computation, taking advantage from our recent results. On this front, we believe that the work "Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures" is particularly promising for inspiring future improvements of homomorphic signatures. One of its conceptual contributions is a new approach to construct homomorphic signature schemes that has the potential of overcoming the existing barriers in the state of the art.

In the longer term, we will address the problem of designing cryptographic protocols for privacy and integrity of computation. To this end, we expect to take advantage from the techniques that we developed in the context of efficient zkSNARKs.

We will also tackle the problem of designing solutions for secure computation over data streams. Our next steps in this direction include extending our recent results in "Efficient Zero-Knowledge Proofs on Signed Data with Applications to Verifiable Computation on Data Streams" in order to achieve new methods for proving computation on authenticated data with faster verification algorithms.