(Public) Verifiability for Composable Protocols Without Adaptivity or Zero-Knowledge

Carsten Baum, Bernardo David, Rafael Dowsley

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

The Universal Composability (UC) framework (FOCS ’01) is the current standard for proving security of cryptographic protocols under composition. It allows to reason about complex protocol structures in a bottom-up fashion: any building block that is UC-secure can be composed arbitrarily with any other UC-secure construction while retaining their security guarantees. Unfortunately, some protocol properties such as the verifiability of outputs require excessively strong tools to achieve in UC. In particular, “obviously secure” constructions cannot directly be shown to be UC-secure, and verifiability of building blocks does not easily carry over to verifiability of the composed construction. In this work, we study Non-Interactive (Public) Verifiability of UC protocols, i.e. under which conditions a verifier can ascertain that a party obtained a specific output from the protocol. The verifier may have been part of the protocol execution or not, as in the case of public verifiability. We consider a setting used in a number of applications where it is ok to reveal the input of the party whose output gets verified and analyze under which conditions such verifiability can generically be achieved using “cheap” cryptographic primitives. That is, we avoid having to rely on adaptively secure primitives or heavy computational tools such as NIZKs. As Non-Interactive Public Verifiability is crucial when composing protocols with a public ledger, our approach can be beneficial when designing these with provably composable security and efficiency in mind.

Original languageEnglish
Title of host publicationProvable and Practical Security - 16th International Conference, ProvSec 2022, Proceedings
EditorsChunpeng Ge, Fuchun Guo
PublisherSpringer Science and Business Media Deutschland GmbH
Pages249-272
Number of pages24
ISBN (Print)9783031209161
DOIs
StatePublished - 2022
Externally publishedYes
Event16th International Conference on Provable and Practical Security, ProvSec 2022 - Nanjing, China
Duration: 11 Nov 202212 Nov 2022

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume13600 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference16th International Conference on Provable and Practical Security, ProvSec 2022
Country/TerritoryChina
CityNanjing
Period11/11/2212/11/22

Bibliographical note

Publisher Copyright:
© 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.

Funding

Funded by the European Research Council (ERC) under the European Unions’ Horizon 2020 program under grant agreement No 669255 (MPCPRO). Supported by the Concordium Foundation and by the Independent Research Fund Denmark grants number 9040-00399B (TrA2C), number 9131-00075B (PUMA) and number 0165-00079B (Foundations of Privacy Preserving and Accountable Decentralized Protocols).

FundersFunder number
Concordium Foundation
European Unions’ Horizon 2020 program669255
European Commission
Danmarks Frie Forskningsfond0165-00079B, 9040-00399B, 9131-00075B

    Fingerprint

    Dive into the research topics of '(Public) Verifiability for Composable Protocols Without Adaptivity or Zero-Knowledge'. Together they form a unique fingerprint.

    Cite this