(Public) Verifiability for Composable Protocols Without Adaptivity or Zero-Knowledge

نویسندگان

چکیده

The Universal Composability (UC) framework (FOCS ’01) is the current standard for proving security of cryptographic protocols under composition. It allows to reason about complex protocol structures in a bottom-up fashion: any building block that UC-secure can be composed arbitrarily with other construction while retaining their guarantees. Unfortunately, some properties such as verifiability outputs require excessively strong tools achieve UC. In particular, “obviously secure” constructions cannot directly shown UC-secure, and blocks does not easily carry over construction. this work, we study Non-Interactive (Public) Verifiability UC protocols, i.e. which conditions verifier ascertain party obtained specific output from protocol. may have been part execution or not, case public verifiability. We consider setting used number applications where it ok reveal input whose gets verified analyze generically achieved using “cheap” primitives. That is, avoid having rely on adaptively secure primitives heavy computational NIZKs. As Public crucial when composing ledger, our approach beneficial designing these provably composable efficiency mind.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Framework for Practical Universally Composable Zero-Knowledge Protocols

Zero-knowledge proofs of knowledge (ZK-PoK) for discrete logarithms and related problems are indispensable for practical cryptographic protocols. Recently, Camenisch, Kiayias, and Yung provided a specification language (the CKY-language) for such protocols which allows for a modular design and protocol analysis: for every zero-knowledge proof specified in this language, protocol designers are e...

متن کامل

Zero-Knowledge Protocols for Code-Based Public-Key Encryption

Cryptography relies on Mathematics in all its aspects, beginning from the constructions relying on various mathematical theories, continuing with security evaluation of cryptographic systems, and proving their security, and finally ending in implementation. Recently, new security threats are posed by the emerging quantum computing technology. Specifically, quantum algorithms can break some publ...

متن کامل

Universally Composable Zero-Knowledge Proof of Membership

Since its introduction the UC framework by Canetti has received a lot of attention. A contributing factor to its popularity is that it allows to capture a large number of common cryptographic primitives using ideal functionalities and thus can be used to give modular proofs for many cryptographic protocols. However, an important member of the cryptographic family has not yet been captured by an...

متن کامل

On the Composition of Public-Coin Zero-Knowledge Protocols

We show that only languages in BPP have public-coin black-box zero-knowledge protocols that are secure under an unbounded (polynomial) number of parallel repetitions. This result holds both in the plain model (without any set-up) and in the Bare Public-Key Model (where the prover and the verifier have registered public keys). We complement this result by constructing a public-coin black-box zer...

متن کامل

Trading Static for Adaptive Security in Universally Composable Zero-Knowledge

Adaptive security, while more realistic as an adversarial model, is typically much harder to achieve compared to static security in cryptographic protocol design. Universal composition (UC) provides a very attractive framework for the modular design of cryptographic protocols that captures both static and adaptive security formulations. In the UC framework, one can design protocols in hybrid wo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2022

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-031-20917-8_17