Secret Key Recovery
Allison, Michael, and Yuwen
Secret Key Recovery
Privacy = Secret keys
2
Secret Key Recovery
Why it’s hard
3
Secret Key Recovery
Threat Model
4
Secret Key Recovery
Protocol Overview: Registration
5
P*: iloveice!11!
ilovei
ce!11!
<SK1>, <P*1>
<SK2>, <P*2>
SK:
Secret Key Recovery
Protocol Overview: Recovery
Step 1: Guess password
6
P: iloveice!11!
ilovei
ce!11!
<P1>
<P2>
ce!11!
ilovei
Secret Key Recovery
Protocol Overview: Recovery
Step 2: Receive back MPC result and add locally
7
ilovei
ce!11!
ce!11!
ilovei
MPC Computation
Secret Key Recovery
Protocol Overview: Recovery
What if the password guess is incorrect?
8
ilovei
ce!11!
ce!!!!!
ilovei
MPC Computation
Secret Key Recovery
MPC (SPDZ) Review
Parties hold additive secret shares of inputs and can compute an arithmetic circuit together without revealing their shares
9
x1, y1
x2, y2
x1 + y1
x2 + y2
C x1
C x2
x + y
Cx
Secret Key Recovery
Beaver Triples
10
Secret Key Recovery
Beaver Triple Server
11
Secret Key Recovery
Beaver Triple Server
12
a ← GF(p)
b ← GF(p)
c = a · b
(a1, b1, c1)
(a2, b2, c2)
ilovei
ce!11!
ce!11!
ilovei
MPC
Computation
Secret Key Recovery
MPC (2-party case)
Server 1
Server 2
Goal:
13
Secret Key Recovery
MPC (2-party case)
14
Secret Key Recovery
D-D-D-D-Demo!
15
Secret Key Recovery
Future work
16
Secret Key Recovery
questions?
17
Secret Key Recovery
MPC review - beaver triples - TODO
Math - [([R][actual PIN - PIN guess] + 1) (k)]
Huge diagrams
Current work - demo demo
Next steps - bigger curves, more bits
18
Secret Key Recovery