(Public) Verifiability for Composable Protocols Without Adaptivity or Zero-Knowledge
نویسندگان
چکیده
The Universal Composability (UC) framework (FOCS ’01) is the current standard for proving security of cryptographic protocols under composition. It allows to reason about complex protocol structures in a bottom-up fashion: any building block that UC-secure can be composed arbitrarily with other construction while retaining their guarantees. Unfortunately, some properties such as verifiability outputs require excessively strong tools achieve UC. In particular, “obviously secure” constructions cannot directly shown UC-secure, and blocks does not easily carry over construction. this work, we study Non-Interactive (Public) Verifiability UC protocols, i.e. which conditions verifier ascertain party obtained specific output from protocol. may have been part execution or not, case public verifiability. We consider setting used number applications where it ok reveal input whose gets verified analyze generically achieved using “cheap” primitives. That is, avoid having rely on adaptively secure primitives heavy computational NIZKs. As Public crucial when composing ledger, our approach beneficial designing these provably composable efficiency mind.
منابع مشابه
A Framework for Practical Universally Composable Zero-Knowledge Protocols
Zero-knowledge proofs of knowledge (ZK-PoK) for discrete logarithms and related problems are indispensable for practical cryptographic protocols. Recently, Camenisch, Kiayias, and Yung provided a specification language (the CKY-language) for such protocols which allows for a modular design and protocol analysis: for every zero-knowledge proof specified in this language, protocol designers are e...
متن کاملZero-Knowledge Protocols for Code-Based Public-Key Encryption
Cryptography relies on Mathematics in all its aspects, beginning from the constructions relying on various mathematical theories, continuing with security evaluation of cryptographic systems, and proving their security, and finally ending in implementation. Recently, new security threats are posed by the emerging quantum computing technology. Specifically, quantum algorithms can break some publ...
متن کاملUniversally Composable Zero-Knowledge Proof of Membership
Since its introduction the UC framework by Canetti has received a lot of attention. A contributing factor to its popularity is that it allows to capture a large number of common cryptographic primitives using ideal functionalities and thus can be used to give modular proofs for many cryptographic protocols. However, an important member of the cryptographic family has not yet been captured by an...
متن کاملOn the Composition of Public-Coin Zero-Knowledge Protocols
We show that only languages in BPP have public-coin black-box zero-knowledge protocols that are secure under an unbounded (polynomial) number of parallel repetitions. This result holds both in the plain model (without any set-up) and in the Bare Public-Key Model (where the prover and the verifier have registered public keys). We complement this result by constructing a public-coin black-box zer...
متن کاملTrading Static for Adaptive Security in Universally Composable Zero-Knowledge
Adaptive security, while more realistic as an adversarial model, is typically much harder to achieve compared to static security in cryptographic protocol design. Universal composition (UC) provides a very attractive framework for the modular design of cryptographic protocols that captures both static and adaptive security formulations. In the UC framework, one can design protocols in hybrid wo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2022
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-031-20917-8_17