Skip to main navigation Skip to search Skip to main content

Constant round adaptively secure protocols in the tamper-proof hardware model

  • Carmit Hazay
  • , Antigoni Polychroniadou
  • , Muthuramakrishnan Venkitasubramaniam

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

8 Scopus citations

Abstract

Achieving constant-round adaptively secure protocols (where all parties can be corrupted) in the plain model is a notoriously hard problem. Very recently, three works published in TCC 2015 (Dachman-Soled et al., Garg and Polychroniadou, Canetti et al.), solved the problem in the Common Reference String (CRS) model. In this work, we present a constant-round adaptive UC-secure computation protocol for all well-formed functionalities in the tamper-proof hardware model using stateless tokens from only one-way functions. In contrast, all prior works in the CRS model require very strong assumptions, in particular, the existence of indistinguishability obfuscation. As a corollary to our techniques, we present the first adaptively secure protocols in the Random Oracle Model (ROM) with round complexity proportional to the depth of circuit implementing the functionality. Our protocols are secure in the Global Random Oracle Model introduced recently by Canetti, Jain and Scafuro in CCS 2014 that provides strong compositional guarantees. More precisely, we obtain an adaptively secure UC-commitment scheme in the global ROM assuming only one-way functions. In comparison, the protocol of Canetti, Jain and Scafuro achieves only static security and relies on the specific assumption of Discrete Diffie-Hellman assumption (DDH).

Original languageEnglish
Title of host publicationPublic-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings
EditorsSerge Fehr
PublisherSpringer Verlag
Pages428-460
Number of pages33
ISBN (Print)9783662543870
DOIs
StatePublished - 2017
Event20th IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2017 - Amsterdam, Netherlands
Duration: 28 Mar 201731 Mar 2017

Publication series

NameLecture Notes in Computer Science
Volume10175 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference20th IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2017
Country/TerritoryNetherlands
City Amsterdam
Period28/03/1731/03/17

Bibliographical note

Publisher Copyright:
© International Association for Cryptologic Research 2017.

Funding

The first author acknowledges support from the Israel Ministry of Science and Technology (grant No. 3-10883) and support by the BIU Center for Research in Applied Cryptography and Cyber Security in conjunction with the Israel National Cyber Bureau in the Prime Minister’s Office. The second author acknowledges support from the Danish National Research Foundation and the National Science Foundation of China (under the grant 61061130540) for the Sino-Danish Center for the Theory of Interactive Computation and from the Center for Research in Foundations of Electronic Markets (CFEM), supported by the Danish Strategic Research Council. In addition, this work was done in part while visiting the Simons Institute for the Theory of Computing, supported by the Simons Foundation and by the DIMACS/Simons Collaboration in Cryptography through NSF grant CNS-1523467. The third author is supported by Google Faculty Research Grant and NSF Awards CNS-1526377/1618884.

FundersFunder number
Center for Research in Foundations of Electronic Markets
Simons Institute
Sino-Danish Center for the Theory of Interactive Computation
National Science FoundationCNS-1523467
Simons Foundation
GoogleCNS-1526377/1618884
Strategiske Forskningsråd
Danmarks Grundforskningsfond
National Natural Science Foundation of China61061130540
Ministry of science and technology, Israel3-10883

    Fingerprint

    Dive into the research topics of 'Constant round adaptively secure protocols in the tamper-proof hardware model'. Together they form a unique fingerprint.

    Cite this