Trading Static for Adaptive Security in Universally Composable Zero-Knowledge
|
|
|
- Griselda Logan
- 10 years ago
- Views:
Transcription
1 Trading Static for Adaptive Security in Universally Composable Zero-Knowledge Aggelos Kiayias and Hong-Sheng Zhou Computer Science and Engineering University of Connecticut Storrs, CT, USA Abstract. Adaptive security, while more realistic as an adversarial model, is typically much harder to achieve compared to static security in cryptographic protocol design. Universal composition (UC) provides a very attractive framework for the modular design of cryptographic protocols that captures both static and adaptive security formulations. In the UC framework, one can design protocols in hybrid worlds that allow access to idealized functionalities and then apply the universal composition theorem to obtain more concrete protocol instances. The zero-knowledge (ZK) ideal functionality is one of the most useful sub-protocols in modular cryptographic design. Given an adaptively secure protocol in the ideal ZK-hybrid-world do we always need an adaptively secure realization of the ZK functionality in order to preserve adaptive security under composition? In this work, perhaps surprisingly, we find that this is not so and in fact there are useful protocol instances that we can trade static security for adaptive security. We investigate the above setting, by introducing a weakened ZK ideal functionality, called the ideal leaking-zero-knowledge functionality () that leaks some information about the witness to the adversary in a certain prescribed way. We show that while is interchangeable to ZK against static adversaries, ZK is more stringent when adaptive adversaries are considered. We then proceed to characterize a class of protocols in the hybrid-zk-world that can be transported to the -hybridworld without forfeiting their security against adaptive adversaries. Our results demonstrate that in such settings a static protocol realization of ZK is sufficient for ensuring adaptive security for the parent hybrid protocol something that enables simplified and substantially more efficient UC realizations of such protocols. 1 Introduction When analyzing the security of cryptographic protocols there typically exists a divide between adaptive and static security, cf. [6]. In an adaptive security setting Research partly supported by NSF CAREER Award CNS
2 the adversary is allowed to corrupt parties dynamically and this makes simulation based proofs difficult: in particular without assuming erasures [2] the simulator would be forced to reconstruct the internal state of a corrupted machine that has been simulated. In fact, depending on the arguments used to prove the indistinguishability of simulated protocol transcripts, state reconstruction can be impossible. In contrast, in the static security setting, state reconstruction is not needed since the adversary is forced to decide a-priori on which parties are to be corrupted; this gives the leeway to the simulator to communicate to the adversary simulated transcripts that even though they substantially deviate from real protocol transcripts they are still indistinguishable from the point of view of a static adversary. The divide between static and adaptive security in simulation based security proofs naturally impacts the complexity of attaining these levels of security for many cryptographic functionalities (both in terms of protocol efficiency as well as in terms of necessary idealized setup assumptions). In particular, for a given functionality, an adaptively secure protocol realizing it, is typically much more complicated compared to a protocol that only realizes it in the static sense. In the Universal Composition (UC) setting most interesting functionalities can be realized much more easily in the static security sense; (a notable exception is the ideal functionality of a digital signature [4, 5]). This holds true also for the Zero-Knowledge ideal functionality F ZK that idealizes the operation of a zeroknowledge protocol [5]. Realizing F ZK in the UC-setting is based on the notion of UC-commitment [7]. Obtaining UC-commitments in the adaptive security sense is a rather arduous task [9, 10]. The functionality F ZK is arguably one of the most useful sub-component functionalities in the design of complex cryptographic protocols (cf. [12, 11]). The UC setting gives us the flexibility to focus on how to realize F ZK with some protocol ρ individually; then, given such realization, the universal composition theorem [3, 5] enables us to focus on protocol design in the F ZK -hybrid world. While the design of protocols within the F ZK -hybrid world is particularly attractive (given the power of the included ideal functionality that is supplied for free in the hybrid world) one cannot undervalue the substantial cost that will be incurred when F ZK will be substituted with some protocol ρ that realizes the ideal functionality in the adaptive security sense. This brings forth the following fundamental question that is the central theme of the present work: Are there useful F ZK -like functionalities that are (1) substantially cheaper to realize than F ZK against adaptive adversaries and (2) still sufficiently powerful to be useful as F ZK substitutes within a certain UC modular design scenario? Or, to pose this question more specifically, is it always necessary to use an adaptively secure realization of the ZK functionality in order to preserve the adaptive security of an F ZK hybrid protocol under composition? Contributions. In this work we answer the question posed above. In particular we define the ideal functionality of leaking zero-knowledge F that has the following characteristics:
3 (1) The leaking zero-knowledge functionality F is based on F ZK with the difference that it leaks to the adversary some information about the witness in a controlled way: in particular F encompasses a specialized commitment scheme (that we call R-commitment where R is the ZKrelationship and we formalize herein) and when the prover issues a prove command to the functionality F, the functionality leaks a commitment to w to the adversary. If the prover is corrupted at any moment after the commitment has been released, the commitment is opened to the adversary. (2) We prove that F is interchangeable with F ZK against static adversaries. Thus in some sense, one can say, that F is a static version of the F ZK zero-knowledge functionality. This also immediately implies that as long as one is interested in static security, F can be used in place of F ZK. Moreover, it hints that F may be cheaper to realize against adaptive adversaries when compared to F ZK. Indeed we present a simple protocol that realizes F in the (F, F ZKPM )-hybrid world against adaptive adversaries (and thus automatically also F ZK against static adversaries); it seems difficult to obtain a protocol of similar complexity that realizes F ZK against adaptive adversaries in the (F, F ZKPM )-hybrid world. (3) It is possible to construct an environment that uses adaptive corruptions and separates the two functionalities F and F ZK, unless the involved ZK-relation is a trivial relationship (to be clarified further in section 3.3). Moreover, we show that F ZK emulates F against any adversary something that is indicative of the fact that F ZK is more powerful as a functionality. (4) In the adaptive adversary setting, we characterize a family of protocols (using a sufficient condition cf. section 5.2) that operate in the F ZK - hybrid world and have the property that they retain adaptive security when transported to the F -hybrid world. To put it simply, for such protocols using F ZK is an overkill and it would be sufficient to consider them as protocols in the F -hybrid world. Interpreting the above in the context of the F ZK -hybrid world leads to the somewhat surprising result that there exist protocols where a certain static security realization of F ZK (which is an adaptive realization of F ) is still sufficient to achieve adaptive security in the UC setting. In such settings we can say that we have traded static for adaptive security! As expected the family of protocols we characterize in item (4) above excludes many functionalities that apparently require the adaptive security properties of a realization of F ZK. Still, many useful protocols fall into the class of protocols that we can trade static for adaptive security. In fact, the class, intuitively, contains all protocols that employ F ZK for consistency purposes (rather than say for witness hiding purposes). A simple example of a protocol that belongs to the class is the usage of the F ZK functionality that is part of the adaptive commit-and-prove protocol ACP of [9]: the ACP protocol involves three different instances of the F ZK functionality where one of them (the one employed by the verifier to ensure that his com-
4 mitment key is valid) can in fact be substituted by F without affecting the protocol s adaptive security (cf. FZK T in Figure 10, page 57 in [9]; we note that the FZK T functionality can also be simulated by an F CRS box a fact remarked in [9]). A more complex example of usage of F ZK within a protocol that can be substituted by F is exhibited in [13] for the design of UC blind signatures: in this type of signatures it turns out that the signer requires only F (as opposed to F ZK that is required for the user side). Other related work. Relaxations of ideal functionalities were also seen in the context of the monitored functionalities of [15]; note that the goal there was to relax w.r.t. correctness rather than security as we do here. A relaxation w.r.t. security for the key-exchange ideal functionality was performed in [8]; in their setting the ideal-functionality leaks a function of the exchanged key (by including the so called non-information oracle). Notations. a r RND denotes randomly selecting a in its domain; negl() denotes negligible function. 2 Preliminaries The Universal Composability Framework [5]. Defining security in the universal composibility framework involves the following steps: we first specify an ideal functionality F, which describes the desired behavior of the protocol by using a trusted party; this functionality F communicates also with an ideal world adversary. Then, we prove that a particular protocol π operating in the real world securely realizes this ideal functionality. Here, securely realizing means that for any adversary A in the real world, there exists a simulator S in the ideal world, and no environment Z can distinguish its interaction with the real protocol π and A, or with the functionality F and S. Once this is established, we can take advantage of the UC composition theorem and plug in the protocol π as a sub-routine in any arbitrary environment in place of the functionality F. For a complete definition of UC framework please refer to [5]. Functionality F gen gen. Next we describe functionality F, which is similar to the KS, KR, functionalities employed respectively in [5, 1, 14]. Here we only consider the case for two parties, P and V (and thus we modify it accordingly). Functionality F R ZK. A zero-knowledge proof is a two-party protocol parameterized by a binary relation R; the two parties called the prover and the verifier share a common input, the statement x. The prover has an additional input, the witness w. If (x, w) R, the verifier accepts; if not, the verifier will reject. Furthermore the verifier learn nothing from the protocol with the prover except of whether the prover knows the witness w s.t. (x, w) R or not. The functionality in figure 2 is taken from [5] which captures properly the security properties of a zero-knowledge proof.
5 F gen Functionality F gen proceeds as follows, running with two parties P, V, and an adversary S, and parameterized with a function gen. Register: Upon receiving (Register, sid) from party P, verify that sid = (P, V, sid ) for some sid. If not, then ignore the input. Else, randomly select dk and produce ek gen(dk), record (P, ek) in history, and send (Return, sid, ek) to S. If (Return, sid, ek, ok) is received from S, then return (Return, sid, ek) to P. Upon receiving (Register, sid, dk, P ) from a corrupted party P, produce ek gen(dk). Record (P, ek) in history. Retrieve: Upon receiving (Retrieve, sid, P ) from some party V, send (Retrieve, sid, P, V ) to S and obtain a value ek in return. If (P, ek) has been recorded in history then return (Return, sid, ek, P ) to V. Else, return (Return, sid,, P ) to V. Corrupt: Upon receiving (Corrupt, sid, P ) from S, record the fact that party P has been corrupted. Fig. 1. Private reference string functionality F gen for two parties. 3 The Leaking Zero-Knowledge Functionality 3.1 R-Commitment An R-commitment scheme is a special non-interactive commitment scheme that is bound to a given relation R. It is an extractable commitment where the hiding property is only required to hold with respect to the witnesses of the relation R. In particular, if the witness is computationally hidden by the statement, then an R-commitment can be at most computationally hiding. Formally, an R- commitment scheme E is a tuple gen E, com E, ver E, dec E. The key generation algorithm gen E produces a public parameter ek based on a randomly selected dk K. The procedures com E, ver E correspond to the commitment algorithm and the testing algorithm for the decommit information for a given commitment; they satisfy the correctness property ver E (x, ek, com E (ek, x, w, γ), w, γ) = 1 for any ek gen E (dk) with dk K. The procedure dec E always extracts the witness given the trapdoor key dk; in particular, we require E w, γ such that E = com E (ek, x, w, γ) and dec E (x, ek, E, dk) = w. Note that we may generalize these requirements to allow for partial correctness and extractability but this would not have any significant impact on our results. We say that E is an R-commitment for a given relation R if additionally to the above, it satisfies the R-hiding property: Definition 1 (R-hiding). We say a commitment E is R-hiding, if for all PPT adversaries A = (A 1, A 2 ), the advantage Adv R,E def hiding (λ) = 2Prob[Exp R,E hiding (λ)] 1 = negl(λ), where the experiment Exp R,E hiding (λ) is defined below. Additionally, we say that E is R-unequivocal for some sample R if it satisfies:
6 Functionality F R ZK F R ZK proceeds as follows, running with a prover P, a verifier V and an adversary S, and parameterized with a binary relation R. Prove: Upon receiving (ProveZK, sid, x, w) from party P, verify that sid = (P, V, sid ) for some sid. If not, then ignore the input. Else, forward (ProveZK, sid, x) to S. Upon receiving (ProveZK, sid, ok) from the adversary S, if (x, w) R then record x, w into history and output (VerifiedZK, sid, x) to party V, else do nothing. From now on, ignore future (ProveZK, sid,...) input. Corrupt: Upon receiving (CorruptProverZK, sid) from S, return S (CorruptedProverZK, sid, history). Record the fact that party P has been corrupted. After the corruption has occurred, upon receiving (PatchZK, sid, x, w ), if (x, w ) R and no output (VerifiedZK, sid,...) was returned to party V yet, then output (VerifiedZK, sid, x ) to party V. Fig. 2. Zero-knowledge functionality F R ZK. Definition 2 (R-unequivocal). We say a commitment E is R-unequivocal for some PPT sample R that returns (x, w) in R, if for all PPT adversaries A = (A 1, A 2 ), the advantage Adv R,E def unequivocal (λ) = Prob[Exp R,E unequivocal (λ) = 1] = negl(λ), where the experiment Exp R,E unequivocal (λ) is defined below. Exp R,E unequivocal (λ) (x, w) sample R (1 λ ); (ek, Ê, state) A1(x); γ A 2(state, w); if ver E(x, ek, Ê, w, γ) = 1 then output 1 else output 0. Exp R,E hiding (λ) (x, w) A 1(1 λ ); if verify R (x, w) 1 then abort; dk r K; ek gen E (dk); b r {0, 1}; if b = 0 then E com E(x, ek, ŵ, γ); ŵ, γ r RND; else E com E(x, ek, w, γ); γ r RND; b A 2(x, w, E); if b = b then return 1 else return Functionality F R,E In this subsection we introduce our new ZK functionality, called the leaking zeroknowledge functionality, F R,E, in figure 3; it is parameterized by a relation R as well as an R-commitment E. The design of F R,E is based on F ZK R. Recall that in the prove stage of FZK R, upon receiving the statement-witness pair x, w, FZK R is supposed to communicate the statement x to the adversary (but not the witness). In our case, during the prove stage of F R,E R,E, we allow F to leak more information about the witness that includes the parameter ek and a commitment E of the witness w, that is based on the parameter ek. Note that we still anticipate F R,E to capture some level of the zero-knowledge property, and a computationally bounded adversary still would not obtain any useful information about the witness w from reading the extra information ek and E that is leaked together with the statement (this is based on the R-hiding
7 property of the commitment as described above). Still, the quality of zeroknowledge offered by F R,E is substantially impaired compared to F ZK R. Note that whenever the prover is corrupted the commitment that was issued for proof s witness will be opened (i.e., the adversary will not only receive the witness but also the decommitment information of the released commitment). F R,E Functionality F R,E proceeds as follows, running with a prover P, a verifier V and an adversary S, and parameterized with a binary relation R and an R-commitment E; it incorporates F gen E and furthermore it has the additional functions as below. Prove: Upon receiving (Prove, sid, x, w) from party P, verify that sid = (P, V, sid ) for some sid. If not, then ignore the input. Else, randomly select γ and compute E = com E(x, ek, w, γ), and forward (Prove, sid, x, ek, E) to S. Upon receiving (Prove, sid, ok) from the adversary S, if (x, w) R then record x, E, w, γ in history and output (Verified, sid, x) to party V, else do nothing. From now on, ignore future (Prove, sid,...) input. Corrupt: Upon receiving (CorruptProver, sid) from S, return S (CorruptedProver, sid, history, ek). Record this fact that party P has been corrupted. After the corruption has occurred, upon receiving (Patch, sid, x, w ), if (x, w ) R and no output (Verified, sid,...) was returned to party V yet, then output (Verified, sid, x ) to party V. Fig. 3. Leaking zero-knowledge functionality F R,E. 3.3 Relation between F R,E and F R ZK In this subsection we explore the essential relation between F R,E and F ZK R. First, we show that the functionality FZK R R,E can UC-emulate F ; on the other hand, the other direction can only hold against static adversaries. Please refer to figure 4 below. Adaptive Adversaries Static Adversaries F R,E F ZK R F R,E F ZK R Fig. 4. Relation between F R,E and F R ZK. F 1 F 2 stands for F 1 UC-emulates F 2. F R ZK To establish the emulation result we show that a dummy protocol in the R,E -hybrid world realizes F. It is easy to see that a simulator interacting
8 with F R,E can perfectly simulate transcripts to an environment that operates with dummy parties in the FZK R -hybrid world by simply suppressing the extra information provided by F R,E. Theorem 1. Let FZK R R,E be the ideal ZK functionality, and F be the leaking version of FZK R. Let ρ d be a dummy ZK protocol. Then for any adversary A there exists an adversary S such that for any adaptive environment machine Z we have: EXEC F R ZK ρ d,a,z = EXECF R,E ρ d,s,z. We then investigate the other direction of theorem 1; we prove that a dummy protocol in F R,E -hybrid world can statically realize functionality F ZK R as described in theorem 2. The simulation is not perfect as it relies on the hiding properties of the R-commitment E. Theorem 2. Let FZK R R,E be the ideal ZK functionality, F the leaking version of FZK R, and ρ d a dummy ZK protocol. If E is an R-hiding commitment, then for any adversary A there exists an adversary S such that for any static environment machine Z we have: EXEC F R,E ρ d,a,z R EXECF ZK ρ d,s,z AdvR,E hiding (λ). Regarding adaptive adversaries, we cannot extend the result of the previous theorem. We establish this in theorem 3. The basic reason is that in the simulation of theorem 2 the simulator for FZK R has to simulate the extra information ek, E. The simulator can easily simulate ek by just using the key-generator gen E. However the simulator gets in trouble when it needs to simulate E for an adaptive environment Z. Note that the simulator does not know the witness w, which is blocked inside the functionality FZK R. The simulator may produce E based on a fake witness or simulate E in some other way; but when the adaptive Z corrupts the prover after the simulated commitment has been released, the simulator must explain E to Z for the real witness (that is now released from the ideal functionality). This would require that the underlying R-commitment scheme to be equivocal (which it is not). Given the inflexibility of the R-commitment the simulator may still succeed if the relation R is somewhat trivial, and an adversary can obtain the correct witness by observing the statement x. In such case, the simulator now has chance to develop a successful simulation even if the environment is adaptive. The R- unequivocal property was designed appropriately so that it captures all these scenarios; based on this, we obtain the following theorem that demonstrates that the functionality F R,E is weaker as a security notion compared to F ZK R. Theorem 3. Let FZK R R,E be the ideal ZK functionality, F the leaking version of FZK R, and ρ d a dummy ZK protocol. If E is R-unequivocal for some sample R, then there exists an adversary A and an adaptive environment machine Z such that for any adversary S, we have: EXEC F R,E R ρ d,a,z EXECF ZK ρ d,s,z 1 AdvR,E unequivocal (λ).
9 4 Implementation of F R,E in the (F gen E, F R ZKPM )-Hybrid World In this section we show that F R,E can be realized with the protocol π in the (F gen E, F ZKPM R )-hybrid world presented in figure 5. Note that based on Nielsen s result (refer to theorem 5.1 in page 180 in Nielsen s PhD thesis [14]), F ZKPM can be very efficiently implemented in the F -hybrid world as F ZKPM does not require witness extraction. So π can be implemented in the F -hybrid world without requiring UC commitments. Next we prove that the protocol π from figure 5 realizes F R,E. Protocol π in the (F gen E, F ZKPM)-Hybrid R World On input (Prove, sid, x, w) from Z, party P sends (Register, sid) to F gen E Whenever Party P receives (Return, sid, ek) from F gen E, it randomly se- the message lects γ and computes E = com E(x, ek, w, γ), and sends FZKPM R (ProveZKPM, sid, (x, ek, E), (w, γ)).. Whenever Party V receives (VerifiedZKPM, sid, (x, ek, E)) from FZKPM, R it sends (Get, sid) to F gen E and get ek from F gen E ; if the ek is same as the one from FZKPM R then returns (Verified, sid, x) to Z. Fig. 5. A protocol realizing F R,E in the (F gen E, F ZKPM)-hybrid R world. Here E is an R-commitment, and relation R is based on relation R and key generator gen, i.e. R = {(x, ek, E), (w, γ) (x, w) R E = com E(x, ek, w, γ)}. Theorem 4. Consider protocol π in the (F gen E, F ZKPM R )-hybrid world in figure 5, where E is an R-commitment. Let π d be a dummy ZK protocol. Then for any adversary A there exists an adversary S such that for any adaptive environment machine Z we have: EXEC F gen E R,FZKPM = EXEC F R,E π d,s,z. π,a,z Based on theorem 2 and theorem 4, we obtain immediately that the protocol of figure 5 statically realizes FZK R (with an AdvR,E hiding (λ) distance). In general, we can design a protocol π ZK to realize F ZK in the (F COM, F ZKPM )- hybrid world by committing the witness and then using ZKPM to bind the commitment and the ZK statement as in the figure 5 where E is computed based on F COM. Note that in π we compute E based on the R-commitment, but in π ZK we need the commitment to be both extractable and equivocal: in the case that the prover is corrupted, F ZK only supplies the witness and the simulator needs to figure out the random coins involved; on the contrary F supplies all witness and coins for E. Combining equivocality and extractability seems that it requires more work (more rounds or more communication), cf. [9, 10].
10 5 Using F in place of F ZK 5.1 A Protocol Transformation We describe a useful transformation which allows a protocol π in the FZK R - hybrid world to be modified into a slightly different protocol π based on an R-commitment E. The protocol π operates in the (F gen E, F ZK R )-hybrid world for a relation R defined as follows: R = {(x, ek, E), (w, γ) (x, w) R E = com E (x, ek, w, γ)}, where ek is obtained from F gen E, γ is randomly selected. In section 5.2 we will use such transformation to explore the application of the functionality F R,E. Transformation from π into π Each time in protocol π, party P π sends (ProveZK, sid, x, w) to FZK, R in protocol π party P π sends (Register, sid) to F gen E ; when it receives (Return, sid, ek) from F gen E, party P π randomly selects γ, it computes E = com E(x, ek, w, γ) and sends (ProveZK, sid, (x, ek, E), (w, γ)) to FZK. R Each time in protocol π, party V π receives (VerifiedZK, sid, (x, ek, E)) from FZK, R it sends (Retrieve, sid, P π) to F gen E, and obtains ek from F gen E ; if ek is same as the one from FZK, R then party V π sends (Verified, sid, x) to Z. Fig. 6. A transformation from π in the F R ZK-hybrid world into π in the (F gen E, F R ZK)- hybrid world. Note that functionally the protocols π and π are identical; nevertheless, the protocol π is possibly exposing some more information to the adversary as compared to π with respect to the witnesses that are employed within the F ZK version. If an adversary can see little difference between π and π then we can use F in place of F ZK. We elaborate on this in the next subsection. 5.2 A Sufficient Condition The goal of this section is to characterize the protocols for which we can substitute an FZK R R,E implementation with a (potentially cheaper) F implementation in the setting of adaptive adversaries. The protocol transformation of the previous subsection serves as a bridge between the protocol in the F ZK -hybrid world and the protocol in the F -hybrid world. We show in theorem 5 that if π realizes some F and the transformed protocol π maintains this functionality, this implies that the original protocol π can be transported into the F R,E -hybrid world without any impact. Theorem 5. (Sufficient Condition) Let π be a protocol in the FZK R -hybrid-world, π the transformation of π as described in section 5.1. If π in the (FZK R, F gen E )- hybrid world realizes functionality F, then π in the F R,E -hybrid world also realizes F.
11 The theorem is illustrated in figure 7. The sufficient condition for transporting a protocol π from the F R ZK hybrid world into the F -hybrid world is marked with?. Adaptive UC-emulation π FR ZK F? theorem 5 F π F R,E F ===== π FR ZK,Fgen E ===== Fig. 7. Trading F for F ZK. Note that π F 1 F 2 stands for π realizes F 2 in the F 1-hybrid world. 1 coins 2 Fig. 8. In constructing S the witness used for FZK R would be necessary for a simulation against adaptive adversaries; S may recover such witness if it appears in the communication lines 1, 2 or can be inferred from the coins of S. In the remaining of the section we investigate the setting where the sufficient condition can be satisfied. Assume a protocol π in the FZK R -hybrid-world that realizes F. This means there exists a simulator S that can simulate π-protocoltranscripts for any adaptive Z. In particular S simulates FZK R to produce the statement x and also the direct transcripts between the π parties. In order to show that the transformed protocol π in the (FZK R, F gen E )-hybrid world also realizes F, we need to construct a simulator S for the adaptive environment. We may build S based on S which is given above by the assumption that π F R ZK realizes F; the statement x and the direct transcripts between the π parties can be simulated verbatim from S. Still S needs to simulate the extra ek, E information since S does not supply this. Recall that our environment Z may involve adaptive corruptions. So S may not be able to produce the extra ek, E based on a fake witness w (because when the prover is corrupted and a real witness w is supplied, S cannot explain E to the real w, cf. theorem 3). Excluding the case of a non R-unequivocal commitment (which is rather trivial), it follows that the only way for the proof to work would be if there are circumstances for which S is capable of inferring the witness from either the coins used by S and or the communication lines of S with Z or F as shown in 1 or/and
12 2 in figure 8. For example consider F to be a functionality extending F SIG [4, 5] where the signer wishes to prove knowledge and correct application of his secret key to other parties (e.g., his signing key is involved in some more complex computation for meeting a certain goal of F). This is the case for example for the signer side in the UC blind signatures of [13]; in this protocol, the signer would require only F (as opposed to F ZK ) as the key is known to the simulator. Acknowledgements. We thank Jesper Nielsen for his kind clarifications on [1, 14]. We also thank the anonymous referees for their constructive comments. References 1. B. Barak, R. Canetti, J. B. Nielsen, and R. Pass. Universally composable protocols with relaxed set-up assumptions. In FOCS 2004, pages , D. Beaver and S. Haber. Cryptographic protocols provably secure against dynamic adversaries. In EUROCRYPT 1992, pages , R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In FOCS 2001, pages R. Canetti. Universally composable signature, certification, and authentication. In CSFW 2004, pages , R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In Cryptology eprint Archive: Report 2000/067, December Latest version at 6. R. Canetti, I. Damgård, S. Dziembowski, Y. Ishai, and T. Malkin. On adaptive vs. non-adaptive security of multiparty protocols. In EUROCRYPT 2001, pages , R. Canetti and M. Fischlin. Universally composable commitments. In CRYPTO 2001, pages R. Canetti and H. Krawczyk. Universally composable notions of key exchange and secure channels. In EUROCRYPT 2002, pages , R. Canetti, Y. Lindell, R. Ostrovsky, and A. Sahai. Universally composable twoparty and multi-party secure computation. In STOC 2002, pages http: // lindell/papers/uc-comp.ps. 10. I. Damgård and J. B. Nielsen. Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor. In CRYPTO 2002, pages O. Goldreich. Foundations of Cryptography- Basic Tools. Cambridge University Press, O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game or A completeness theorem for protocols with honest majority. In STOC 1987, pages , A. Kiayias and H.-S. Zhou. Equivocal blind signatures and adaptive UC-security. In Cryptology eprint Archive: Report 2007/132, J. B. Nielsen. On protocol security in the cryptographic model. Dissertation Series DS-03-8, BRICS, M. Prabhakaran and A. Sahai. Relaxing environmental security: Monitored functionalities and client-server computation. In TCC 2005, pages , 2005.
Non-Black-Box Techniques In Crytpography. Thesis for the Ph.D degree Boaz Barak
Non-Black-Box Techniques In Crytpography Introduction Thesis for the Ph.D degree Boaz Barak A computer program (or equivalently, an algorithm) is a list of symbols a finite string. When we interpret a
On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation
On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation Yuval Ishai 1, Eyal Kushilevitz 1, Yehuda Lindell 2, and Erez Petrank 1 1 Technion ({yuvali,eyalk,erez}@cs.technion.ac.il)
Non-interactive and Reusable Non-malleable Commitment Schemes
Non-interactive and Reusable Non-malleable Commitment Schemes Ivan Damgård a Jens Groth b June 16, 2003 Abstract We consider non-malleable (NM) and universally composable (UC) commitment schemes in the
Lecture 2: Complexity Theory Review and Interactive Proofs
600.641 Special Topics in Theoretical Cryptography January 23, 2007 Lecture 2: Complexity Theory Review and Interactive Proofs Instructor: Susan Hohenberger Scribe: Karyn Benson 1 Introduction to Cryptography
Enhanced Security Models for Network Protocols
Enhanced Security Models for Network Protocols by Shabsi Walfish A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy Department of Computer Science
1 Digital Signatures. 1.1 The RSA Function: The eth Power Map on Z n. Crypto: Primitives and Protocols Lecture 6.
1 Digital Signatures A digital signature is a fundamental cryptographic primitive, technologically equivalent to a handwritten signature. In many applications, digital signatures are used as building blocks
Legally Enforceable Fairness in Secure Two-Party Computation
Legally Enforceable Fairness in Secure Two-Party Computation Yehuda Lindell Department of Computer Science Bar-Ilan University, Israel. [email protected] Abstract In the setting of secure multiparty
Computational Soundness of Symbolic Security and Implicit Complexity
Computational Soundness of Symbolic Security and Implicit Complexity Bruce Kapron Computer Science Department University of Victoria Victoria, British Columbia NII Shonan Meeting, November 3-7, 2013 Overview
Simulation-Based Security with Inexhaustible Interactive Turing Machines
Simulation-Based Security with Inexhaustible Interactive Turing Machines Ralf Küsters Institut für Informatik Christian-Albrechts-Universität zu Kiel 24098 Kiel, Germany [email protected]
Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing
Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing Jan Camenisch IBM Research Zurich [email protected] Anna Lysyanskaya Brown University [email protected] Gregory Neven
Scalable Protocols for Authenticated Group Key Exchange
Scalable Protocols for Authenticated Group Key Exchange Jonathan Katz Moti Yung Abstract We consider the problem of authenticated group key exchange among n parties communicating over an insecure public
Lecture 10: CPA Encryption, MACs, Hash Functions. 2 Recap of last lecture - PRGs for one time pads
CS 7880 Graduate Cryptography October 15, 2015 Lecture 10: CPA Encryption, MACs, Hash Functions Lecturer: Daniel Wichs Scribe: Matthew Dippel 1 Topic Covered Chosen plaintext attack model of security MACs
Improved Online/Offline Signature Schemes
Improved Online/Offline Signature Schemes Adi Shamir and Yael Tauman Applied Math. Dept. The Weizmann Institute of Science Rehovot 76100, Israel {shamir,tauman}@wisdom.weizmann.ac.il Abstract. The notion
1 Message Authentication
Theoretical Foundations of Cryptography Lecture Georgia Tech, Spring 200 Message Authentication Message Authentication Instructor: Chris Peikert Scribe: Daniel Dadush We start with some simple questions
Victor Shoup Avi Rubin. fshoup,[email protected]. Abstract
Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin Bellcore, 445 South St., Morristown, NJ 07960 fshoup,[email protected] Abstract In this paper, we investigate a method by which smart
Security Analysis of DRBG Using HMAC in NIST SP 800-90
Security Analysis of DRBG Using MAC in NIST SP 800-90 Shoichi irose Graduate School of Engineering, University of Fukui hrs [email protected] Abstract. MAC DRBG is a deterministic random bit generator
Chosen-Ciphertext Security from Identity-Based Encryption
Chosen-Ciphertext Security from Identity-Based Encryption Dan Boneh Ran Canetti Shai Halevi Jonathan Katz Abstract We propose simple and efficient CCA-secure public-key encryption schemes (i.e., schemes
Privacy-Providing Signatures and Their Applications. PhD Thesis. Author: Somayeh Heidarvand. Advisor: Jorge L. Villar
Privacy-Providing Signatures and Their Applications PhD Thesis Author: Somayeh Heidarvand Advisor: Jorge L. Villar Privacy-Providing Signatures and Their Applications by Somayeh Heidarvand In fulfillment
Lecture 9 - Message Authentication Codes
Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,
1 Construction of CCA-secure encryption
CSCI 5440: Cryptography Lecture 5 The Chinese University of Hong Kong 10 October 2012 1 Construction of -secure encryption We now show how the MAC can be applied to obtain a -secure encryption scheme.
Constant-Round Leakage-Resilient Zero-Knowledge Arguments of Knowledge for NP
Constant-Round Leakage-Resilient Zero-Knowledge Arguments of Knowledge for NP Hongda Li, Qihua Niu, Guifang Huang 1 The Data Assurance and Communication Security Research Center 2 State Key Lab of Information
MACs Message authentication and integrity. Table of contents
MACs Message authentication and integrity Foundations of Cryptography Computer Science Department Wellesley College Table of contents Introduction MACs Constructing Secure MACs Secure communication and
Foundations of Group Signatures: The Case of Dynamic Groups
A preliminary version of this paper appears in Topics in Cryptology CT-RSA 05, Lecture Notes in Computer Science Vol.??, A. Menezes ed., Springer-Verlag, 2005. This is the full version. Foundations of
MTAT.07.003 Cryptology II. Digital Signatures. Sven Laur University of Tartu
MTAT.07.003 Cryptology II Digital Signatures Sven Laur University of Tartu Formal Syntax Digital signature scheme pk (sk, pk) Gen (m, s) (m,s) m M 0 s Sign sk (m) Ver pk (m, s)? = 1 To establish electronic
Lecture 5 - CPA security, Pseudorandom functions
Lecture 5 - CPA security, Pseudorandom functions Boaz Barak October 2, 2007 Reading Pages 82 93 and 221 225 of KL (sections 3.5, 3.6.1, 3.6.2 and 6.5). See also Goldreich (Vol I) for proof of PRF construction.
Adaptively-Secure, Non-Interactive Public-Key Encryption
Adaptively-Secure, Non-Interactive Public-Key Encryption Ran Canetti 1, Shai Halevi 1, and Jonathan Katz 2 1 IBM T.J. Watson Research Center, NY, USA. 2 Department of Computer Science, University of Maryland.
Introduction. Digital Signature
Introduction Electronic transactions and activities taken place over Internet need to be protected against all kinds of interference, accidental or malicious. The general task of the information technology
Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan
Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan 1 Internet of Things (IoT) CASAGRAS defined that: A global
Lecture 3: One-Way Encryption, RSA Example
ICS 180: Introduction to Cryptography April 13, 2004 Lecturer: Stanislaw Jarecki Lecture 3: One-Way Encryption, RSA Example 1 LECTURE SUMMARY We look at a different security property one might require
Cryptanalysis of a Partially Blind Signature Scheme or How to make $100 bills with $1 and $2 ones
Cryptanalysis of a Partially Blind Signature Scheme or How to make $100 bills with $1 and $2 ones Gwenaëlle Martinet 1, Guillaume Poupard 1, and Philippe Sola 2 1 DCSSI Crypto Lab, 51 boulevard de La Tour-Maubourg
Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing
Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing Jan Camenisch IBM Research Zurich [email protected] Anna Lysyanskaya Brown University [email protected] Gregory Neven
Post-Quantum Cryptography #4
Post-Quantum Cryptography #4 Prof. Claude Crépeau McGill University http://crypto.cs.mcgill.ca/~crepeau/waterloo 185 ( 186 Attack scenarios Ciphertext-only attack: This is the most basic type of attack
MESSAGE AUTHENTICATION IN AN IDENTITY-BASED ENCRYPTION SCHEME: 1-KEY-ENCRYPT-THEN-MAC
MESSAGE AUTHENTICATION IN AN IDENTITY-BASED ENCRYPTION SCHEME: 1-KEY-ENCRYPT-THEN-MAC by Brittanney Jaclyn Amento A Thesis Submitted to the Faculty of The Charles E. Schmidt College of Science in Partial
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham Dan Boneh Omer Reingold Abstract The Diffie-Hellman key-exchange protocol may naturally be extended to k > 2
3-6 Toward Realizing Privacy-Preserving IP-Traceback
3-6 Toward Realizing Privacy-Preserving IP-Traceback The IP-traceback technology enables us to trace widely spread illegal users on Internet. However, to deploy this attractive technology, some problems
Digital Signatures. What are Signature Schemes?
Digital Signatures Debdeep Mukhopadhyay IIT Kharagpur What are Signature Schemes? Provides message integrity in the public key setting Counter-parts of the message authentication schemes in the public
A Secure Protocol for the Oblivious Transfer (Extended Abstract) M. J. Fischer. Yale University. S. Micali Massachusetts Institute of Technology
J, Cryptoiogy (1996) 9:191-195 Joumol of CRYPTOLOGY O 1996 International Association for Cryptologic Research A Secure Protocol for the Oblivious Transfer (Extended Abstract) M. J. Fischer Yale University
Two Factor Zero Knowledge Proof Authentication System
Two Factor Zero Knowledge Proof Authentication System Quan Nguyen Mikhail Rudoy Arjun Srinivasan 6.857 Spring 2014 Project Abstract It is often necessary to log onto a website or other system from an untrusted
Entangled Encodings and Data Entanglement
An extended abstract of this paper is published in the proceedings of the 3rd International Workshop on Security in Cloud Computing SCC@AsiaCCS 2015. This is the full version. Entangled Encodings and Data
Capture Resilient ElGamal Signature Protocols
Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics [email protected] 2 Bilkent University, Department
Lecture 15 - Digital Signatures
Lecture 15 - Digital Signatures Boaz Barak March 29, 2010 Reading KL Book Chapter 12. Review Trapdoor permutations - easy to compute, hard to invert, easy to invert with trapdoor. RSA and Rabin signatures.
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009. Notes on Algebra
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009 Notes on Algebra These notes contain as little theory as possible, and most results are stated without proof. Any introductory
1 Signatures vs. MACs
CS 120/ E-177: Introduction to Cryptography Salil Vadhan and Alon Rosen Nov. 22, 2006 Lecture Notes 17: Digital Signatures Recommended Reading. Katz-Lindell 10 1 Signatures vs. MACs Digital signatures
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels Ran Canetti 1 and Hugo Krawczyk 2, 1 IBM T.J. Watson Research Center, Yorktown Heights, New York 10598. [email protected]
Public Key Encryption that Allows PIR Queries
Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E Skeith III Appeared at CRYPTO 2007: 50-67 Abstract Consider the following problem: Alice wishes to maintain
Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings
Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings Ernie Brickell Intel Corporation [email protected] Liqun Chen HP Laboratories [email protected] March
Chapter 3. Network Domain Security
Communication System Security, Chapter 3, Draft, L.D. Chen and G. Gong, 2008 1 Chapter 3. Network Domain Security A network can be considered as the physical resource for a communication system. This chapter
Chosen-Ciphertext Security from Identity-Based Encryption
Chosen-Ciphertext Security from Identity-Based Encryption Dan Boneh Ran Canetti Shai Halevi Jonathan Katz June 13, 2006 Abstract We propose simple and efficient CCA-secure public-key encryption schemes
New Efficient Searchable Encryption Schemes from Bilinear Pairings
International Journal of Network Security, Vol.10, No.1, PP.25 31, Jan. 2010 25 New Efficient Searchable Encryption Schemes from Bilinear Pairings Chunxiang Gu and Yuefei Zhu (Corresponding author: Chunxiang
Schnorr Blind Signatures and Insights From a Computer Network Marketing Model
On the Security of One-Witness Blind Signature Schemes Foteini Baldimtsi and Anna Lysyanskaya foteini,[email protected] Computer Science Department, Brown University Abstract. Blind signatures have proved
Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
The Order of Encryption and Authentication for Protecting Communications (Or: How Secure is SSL?)
The Order of Encryption and Authentication for Protecting Communications (Or: How Secure is SSL?) Hugo Krawczyk Abstract. We study the question of how to generically compose symmetric encryption and authentication
Security Arguments for Digital Signatures and Blind Signatures
Journal of Cryptology, Volume 13, Number 3. Pages 361 396, Springer-Verlag, 2000. 2000 International Association for Cryptologic Research Security Arguments for Digital Signatures and Blind Signatures
Massachusetts Institute of Technology. rosario,[email protected]. Abstract
Veriable Secret Sharing as Secure Computation Rosario Gennaro Silvio Micali Laboratory for Computer Science Massachusetts Institute of Technology rosario,[email protected] Abstract We present a
Secure Deduplication of Encrypted Data without Additional Independent Servers
Secure Deduplication of Encrypted Data without Additional Independent Servers Jian Liu Aalto University [email protected] N. Asokan Aalto University and University of Helsinki [email protected] Benny Pinkas
How to Protect Peer-to-Peer Online Games from Cheats
How to Protect Peer-to-Peer Online Games from Cheats Haruhiro Yoshimoto Rie Shigetomi Hideki Imai University of Tokyo Imai Laboratory, Institute of Industrial Science, The University of Tokyo, 4-6-1 Komaba,
Adaptive Online Gradient Descent
Adaptive Online Gradient Descent Peter L Bartlett Division of Computer Science Department of Statistics UC Berkeley Berkeley, CA 94709 bartlett@csberkeleyedu Elad Hazan IBM Almaden Research Center 650
Paillier Threshold Encryption Toolbox
Paillier Threshold Encryption Toolbox October 23, 2010 1 Introduction Following a desire for secure (encrypted) multiparty computation, the University of Texas at Dallas Data Security and Privacy Lab created
Official Arbitration with Secure Cloud Storage Application
Official Arbitration with Secure Cloud Storage Application Alptekin Küpçü Koç University, İstanbul, Turkey [email protected] February 11, 2013 Abstract Static and dynamic proof of storage schemes have been
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
CIS 5371 Cryptography. 8. Encryption --
CIS 5371 Cryptography p y 8. Encryption -- Asymmetric Techniques Textbook encryption algorithms In this chapter, security (confidentiality) is considered in the following sense: All-or-nothing secrecy.
Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries
Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries Yehuda Lindell Ben Riva October 12, 2015 Abstract Recently, several new techniques were presented to dramatically
A Brief Introduction to Property Testing
A Brief Introduction to Property Testing Oded Goldreich Abstract. This short article provides a brief description of the main issues that underly the study of property testing. It is meant to serve as
The Phish Market Protocol: Securely Sharing Attack Data Between Competitors
The Phish Market Protocol: Securely Sharing Attack Data Between Competitors Tal Moran and Tyler Moore Center for Research on Computation & Society, Harvard University {talm},{tmoore}@seas.harvard.edu Abstract.
Public Key Cryptography. c Eli Biham - March 30, 2011 258 Public Key Cryptography
Public Key Cryptography c Eli Biham - March 30, 2011 258 Public Key Cryptography Key Exchange All the ciphers mentioned previously require keys known a-priori to all the users, before they can encrypt
Chapter 12. Digital signatures. 12.1 Digital signature schemes
Chapter 12 Digital signatures In the public key setting, the primitive used to provide data integrity is a digital signature scheme. In this chapter we look at security notions and constructions for this
Chapter 11. Asymmetric Encryption. 11.1 Asymmetric encryption schemes
Chapter 11 Asymmetric Encryption The setting of public-key cryptography is also called the asymmetric setting due to the asymmetry in key information held by the parties. Namely one party has a secret
On the Limits of Anonymous Password Authentication
On the Limits of Anonymous Password Authentication Yan-Jiang Yang a Jian Weng b Feng Bao a a Institute for Infocomm Research, Singapore, Email: {yyang,baofeng}@i2r.a-star.edu.sg. b School of Computer Science,
Ch.9 Cryptography. The Graduate Center, CUNY.! CSc 75010 Theoretical Computer Science Konstantinos Vamvourellis
Ch.9 Cryptography The Graduate Center, CUNY! CSc 75010 Theoretical Computer Science Konstantinos Vamvourellis Why is Modern Cryptography part of a Complexity course? Short answer:! Because Modern Cryptography
