Catálogo de publicaciones - libros

Compartir en
redes sociales


Advances in Cryptology: CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings

Victor Shoup (eds.)

En conferencia: 25º Annual International Cryptology Conference (CRYPTO) . Santa Barbara, CA, USA . August 14, 2005 - August 18, 2005

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Coding and Information Theory; Data Encryption; Computer Communication Networks; Operating Systems; Discrete Mathematics in Computer Science; Computers and Society

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2005 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-28114-6

ISBN electrónico

978-3-540-31870-5

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2005

Tabla de contenidos

Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields

Ronald Cramer; Serge Fehr; Martijn Stam

A black-box secret sharing scheme (BBSSS) for a given access structure works in exactly the same way over any finite Abelian group, as it only requires black-box access to group operations and to random group elements. In particular, there is no dependence on e.g. the structure of the group or its order. The expansion factor of a BBSSS is the length of a vector of shares (the number of group elements in it) divided by the number of players n . At CRYPTO 2002 Cramer and Fehr proposed a threshold BBSSS with an asymptotically minimal expansion factor Θ(log n ). In this paper we propose a BBSSS that is based on a new paradigm, namely, primitive sets in algebraic number fields . This leads to a new BBSSS with an expansion factor that is absolutely minimal up to an additive term of at most 2, which is an improvement by a constant additive factor. We provide good evidence that our scheme is considerably more efficient in terms of the computational resources it requires. Indeed, the number of group operations to be performed is Õ( n ^2) instead of Õ( n ^3) for sharing and Õ( n ^1.6) instead of Õ( n ^2.6) for reconstruction. Finally, we show that our scheme, as well as that of Cramer and Fehr, has asymptotically optimal randomness efficiency.

Palabras clave: Secret Sharing; Algebraic Number; Expansion Factor; Secret Sharing Scheme; Chinese Remainder Theorem.

Pp. 344-360

Secure Computation Without Authentication

Boaz Barak; Ran Canetti; Yehuda Lindell; Rafael Pass; Tal Rabin

In the setting of secure multiparty computation, a set of parties wish to jointly compute some function of their inputs. Such a computation must preserve certain security properties, like privacy and correctness, even if some of the participating parties or an external adversary collude to attack the honest parties. Until this paper, all protocols for general secure computation assumed that the parties can communicate reliably via authenticated channels. In this paper, we consider the feasibility of secure computation without any setup assumption. We consider a completely unauthenticated setting, where all messages sent by the parties may be tampered with and modified by the adversary (without the honest parties being able to detect this fact). In this model, it is not possible to achieve the same level of security as in the authenticated-channel setting. Nevertheless, we show that meaningful security guarantees can be provided. In particular, we define a relaxed notion of what it means to “securely compute” a function in the unauthenticated setting. Then, we construct protocols for securely realizing any functionality in the stand-alone model, with no setup assumptions whatsoever. In addition, we construct universally composable protocols for securely realizing any functionality in the common reference string model (while still in an unauthenticated network). We also show that our protocols can be used to provide conceptually simple and unified solutions to a number of problems that were studied separately in the past, including password-based authenticated key exchange and non-malleable commitments .

Palabras clave: Signature Scheme; Secure Computation; Honest Party; Security Guarantee; Secure Multiparty Computation.

Pp. 361-377

Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator

Ivan Damgård; Yuval Ishai

We present a constant-round protocol for general secure multiparty computation which makes a black-box use of a pseudorandom generator. In particular, the protocol does not require expensive zero-knowledge proofs and its communication complexity does not depend on the computational complexity of the underlying cryptographic primitive. Our protocol withstands an active, adaptive adversary corrupting a minority of the parties. Previous constant-round protocols of this type were only known in the semi-honest model or for restricted classes of functionalities.

Palabras clave: Pseudorandom Generator; Oblivious Transfer; Secure Multiparty Computation; Output Wire; Input Wire.

Pp. 378-394

Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems

Omer Barkol; Yuval Ishai

Motivated by database search problems such as partial match or nearest neighbor, we present secure multiparty computation protocols for constant-depth circuits. Specifically, for a constant-depth circuit C of size s with an m -bit input x , we obtain the following types of protocols. – In a setting where k  ≥  poly log ( s ) servers hold C and a client holds x , we obtain a protocol in which the client privately learns C ( x ) by communicating Õ(m) bits with each server. – In a setting where x is arbitrarily distributed between k  ≥  poly log ( s ) parties who all know C , we obtain a secure protocol for evaluating C ( x ) using O ( m · poly ( k )) communication. Both types of protocols tolerate t  =  k / poly log ( s ) dishonest parties and their computational complexity is nearly linear in s . In particular, the protocols are optimal “up to polylog factors” with respect to communication, local computation, and minimal number of participating parties. We then apply the above results to obtain sublinear-communication secure protocols for natural database search problems. For instance, for the partial match problem on a database of n points in {0,1}^ m we get a protocol with $k \approx \frac{1}{2} log n$ servers, Õ(m) communication, and nearly linear server computation. Applying previous protocols to this problem would either require Ω( nm ) communication, Ω̃(m) servers, or super-polynomial computation.

Palabras clave: Secure Computation; Secure Function Evaluation; Security Threshold; Common Random String; Dishonest Party.

Pp. 395-411

Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes

Alexandra Boldyreva; Marc Fischlin

We investigate several previously suggested scenarios of instantiating random oracles (ROs) with “realizable” primitives in cryptographic schemes. As candidates for such “instantiating” primitives we pick perfectly one-way hash functions (POWHFs) and verifiable pseudorandom functions (VPRFs). Our analysis focuses on the most practical encryption schemes such as OAEP and its variant PSS-E and the Fujisaki-Okamoto hybrid encryption scheme. We also consider the RSA Full Domain Hash (FDH) signature scheme. We first show that some previous beliefs about instantiations for some of these schemes are not true. Namely we show that, contrary to Canetti’s conjecture, in general one cannot instantiate either one of the two ROs in the OAEP encryption scheme by POWHFs without losing security. We also confirm through the FDH signature scheme that the straightforward instantiation of ROs with VPRFs may result in insecure schemes, in contrast to regular pseudorandom functions which can provably replace ROs (in a well-defined way). But unlike a growing number of papers on negative results about ROs, we bring some good news. We show that one can realize one of the two ROs in a variant of the PSS-E encryption scheme and either one of the two ROs in the Fujisaki-Okamoto hybrid encryption scheme through POWHFs, while preserving the IND-CCA security in both cases (still in the RO model). Although this partial instantiation in form of substituting only one RO does not help to break out of the random oracle model, it yet gives a better understanding of the necessary properties of the primitives and also constitutes a better security heuristic.

Palabras clave: Hash Function; Encryption Scheme; Signature Scheme; Random Oracle; Random Oracle Model.

Pp. 412-429

Merkle-Damgård Revisited: How to Construct a Hash Function

Jean-Sébastien Coron; Yevgeniy Dodis; Cécile Malinaud; Prashant Puniya

The most common way of constructing a hash function ( e.g. , SHA-1) is to iterate a compression function on the input message. The compression function is usually designed from scratch or made out of a block-cipher. In this paper, we introduce a new security notion for hash-functions, stronger than collision-resistance. Under this notion, the arbitrary length hash function H must behave as a random oracle when the fixed-length building block is viewed as a random oracle or an ideal block-cipher. The key property is that if a particular construction meets this definition, then any cryptosystem proven secure assuming H is a random oracle remains secure if one plugs in this construction (still assuming that the underlying fixed-length primitive is ideal). In this paper, we show that the current design principle behind hash functions such as SHA-1 and MD5 — the (strengthened) Merkle-Damgård transformation — does not satisfy this security notion. We provide several constructions that provably satisfy this notion; those new constructions introduce minimal changes to the plain Merkle-Damgård construction and are easily implementable in practice.

Palabras clave: Hash Function; Block Cipher; Random Oracle; Compression Function; Random Oracle Model.

Pp. 430-448

On the Generic Insecurity of the Full Domain Hash

Yevgeniy Dodis; Roberto Oliveira; Krzysztof Pietrzak

The Full-Domain Hash (FDH) signature scheme forms [3] one the most basic usages of random oracles. It works with a family $\mathcal{F}$ of trapdoor permutations (TDP), where the signature of m is computed as f ^− − 1( h ( m )) (here ${f} \in_{\mathcal{R}} \mathcal{F}$ and h is modelled as a random oracle). It is known to be existentially unforgeable for any TDP family $\mathcal{F}$ [3], although a much tighter security reduction is known for a restrictive class of TDP’s [10,14]— namely, those induced by a family of claw-free permutations (CFP) pairs. The latter result was shown [11] to match the best possible “black-box” security reduction in the random oracle model, irrespective of the TDP family $\mathcal{F}$ (e.g., RSA) one might use. In this work we investigate the question if it is possible to instantiate the random oracle h with a “real” family of hash functions $\mathcal{H}$ such that the corresponding schemes can be proven secure in the standard model , under some natural assumption on the family $\mathcal{F}$ . Our main result rules out the existence of such instantiations for any assumption on $\mathcal{F}$ which (1) is satisfied by a family of random permutations; and (2) does not allow the attacker to invert ${f} \in_{\mathcal{R}} \mathcal{F}$ on an a-priori unbounded number of points. Moreover, this holds even if the choice of $\mathcal{H}$ can arbitrarily depend on f . As an immediate corollary, we rule out instantiating FDH based on general claw-free permutations, which shows that in order to prove the security of FDH in the standard model one must utilize significantly more structure on $\mathcal{F}$ than what is sufficient for the best proof of security in the random oracle model.

Palabras clave: Hash Function; Signature Scheme; Random Permutation; Random Oracle; Random Oracle Model.

Pp. 449-466

New Monotones and Lower Bounds in Unconditional Two-Party Computation

Stefan Wolf; Jürg Wullschleger

Since bit and string oblivious transfer and commitment , two primitives of paramount importance in secure two- and multi-party computation, cannot be realized in an unconditionally secure way for both parties from scratch, reductions to weak information-theoretic primitives as well as between different variants of the functionalities are of great interest. In this context, we introduce three independent monotones —quantities that cannot be increased by any protocol|and use them to derive lower bounds on the possibility and efficiency of such reductions. An example is the transition between different versions of oblivious transfer, for which we also propose a new protocol allowing to increase the number of messages the receiver can choose from at the price of a reduction of their length. Our scheme matches the new lower bound and is, therefore, optimal.

Palabras clave: Markov Chain; Dependent Part; Noisy Channel; Oblivious Transfer; Cryptology ePrint Archive.

Pp. 467-477

One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption

Thomas Holenstein; Renato Renner

Secret-key agreement between two parties Alice and Bob, connected by an insecure channel, can be realized in an information-theoretic sense if the parties share many independent pairs of correlated and partially secure bits. We study the special case where only one-way communication from Alice to Bob is allowed and where, for each of the bit pairs, with a certain probability, the adversary has no information on Alice’s bit. We give an expression which, for this situation, exactly characterizes the rate at which Alice and Bob can generate secret key bits. This result can be used to analyze a slightly restricted variant of the problem of polarizing circuits, introduced by Sahai and Vadhan in the context of statistical zero-knowledge, which we show to be equivalent to secret-key agreement as described above. This provides us both with new constructions to polarize circuits, but also proves that the known constructions work for parameters which are tight. As a further application of our results on secret-key agreement, we show how to immunize single-bit public-key encryption schemes from decryption errors and insecurities of the encryption, a question posed and partially answered by Dwork, Naor, and Reingold. Our construction works for stronger parameters than the known constructions.

Palabras clave: Encryption Scheme; Statistical Distance; Polarization Method; Bell System Technical Journal; Decryption Error.

Pp. 478-493

A Quantum Cipher with Near Optimal Key-Recycling

Ivan Damgård; Thomas Brochmann Pedersen; Louis Salvail

Assuming an insecure quantum channel and an authenticated classical channel, we propose an unconditionally secure scheme for encrypting classical messages under a shared key, where attempts to eavesdrop the ciphertext can be detected. If no eavesdropping is detected, we can securely re-use the entire key for encrypting new messages. If eavesdropping is detected, we must discard a number of key bits corresponding to the length of the message, but can re-use almost all of the rest. We show this is essentially optimal. Thus, provided the adversary does not interfere (too much) with the quantum channel, we can securely send an arbitrary number of message bits, independently of the length of the initial key. Moreover, the key-recycling mechanism only requires one-bit feedback. While ordinary quantum key distribution with a classical one time pad could be used instead to obtain a similar functionality, this would need more rounds of interaction and more communication.

Palabras clave: Quantum cryptography; key-recycling; unconditional security; private-key encryption.

Pp. 494-510