Abstract
Achieving constant-round adaptively secure protocols (where all parties can be corrupted) in the plain model is a notoriously hard problem. Very recently, three works published in TCC 2015 (Dachman-Soled et al., Garg and Polychroniadou, Canetti et al.), solved the problem in the Common Reference String (CRS) model. In this work, we present a constant-round adaptive UC-secure computation protocol for all well-formed functionalities in the tamper-proof hardware model using stateless tokens from only one-way functions. In contrast, all prior works in the CRS model require very strong assumptions, in particular, the existence of indistinguishability obfuscation. As a corollary to our techniques, we present the first adaptively secure protocols in the Random Oracle Model (ROM) with round complexity proportional to the depth of circuit implementing the functionality. Our protocols are secure in the Global Random Oracle Model introduced recently by Canetti, Jain and Scafuro in CCS 2014 that provides strong compositional guarantees. More precisely, we obtain an adaptively secure UC-commitment scheme in the global ROM assuming only one-way functions. In comparison, the protocol of Canetti, Jain and Scafuro achieves only static security and relies on the specific assumption of Discrete Diffie-Hellman assumption (DDH).
| Original language | English |
|---|---|
| Title of host publication | Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings |
| Editors | Serge Fehr |
| Publisher | Springer Verlag |
| Pages | 428-460 |
| Number of pages | 33 |
| ISBN (Print) | 9783662543870 |
| DOIs | |
| State | Published - 2017 |
| Event | 20th IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2017 - Amsterdam, Netherlands Duration: 28 Mar 2017 → 31 Mar 2017 |
Publication series
| Name | Lecture Notes in Computer Science |
|---|---|
| Volume | 10175 LNCS |
| ISSN (Print) | 0302-9743 |
| ISSN (Electronic) | 1611-3349 |
Conference
| Conference | 20th IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2017 |
|---|---|
| Country/Territory | Netherlands |
| City | Amsterdam |
| Period | 28/03/17 → 31/03/17 |
Bibliographical note
Publisher Copyright:© International Association for Cryptologic Research 2017.
Funding
The first author acknowledges support from the Israel Ministry of Science and Technology (grant No. 3-10883) and support by the BIU Center for Research in Applied Cryptography and Cyber Security in conjunction with the Israel National Cyber Bureau in the Prime Minister’s Office. The second author acknowledges support from the Danish National Research Foundation and the National Science Foundation of China (under the grant 61061130540) for the Sino-Danish Center for the Theory of Interactive Computation and from the Center for Research in Foundations of Electronic Markets (CFEM), supported by the Danish Strategic Research Council. In addition, this work was done in part while visiting the Simons Institute for the Theory of Computing, supported by the Simons Foundation and by the DIMACS/Simons Collaboration in Cryptography through NSF grant CNS-1523467. The third author is supported by Google Faculty Research Grant and NSF Awards CNS-1526377/1618884.
| Funders | Funder number |
|---|---|
| Center for Research in Foundations of Electronic Markets | |
| Simons Institute | |
| Sino-Danish Center for the Theory of Interactive Computation | |
| National Science Foundation | CNS-1523467 |
| Simons Foundation | |
| CNS-1526377/1618884 | |
| Strategiske Forskningsråd | |
| Danmarks Grundforskningsfond | |
| National Natural Science Foundation of China | 61061130540 |
| Ministry of science and technology, Israel | 3-10883 |
Fingerprint
Dive into the research topics of 'Constant round adaptively secure protocols in the tamper-proof hardware model'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver