A Framework for Efficient Fully-Equipped UC Commitments

نویسنده

  • Eiichiro Fujisaki
چکیده

We present a general framework for constructing non-interactive universally composable (UC) commitmentschemes that are secure against adaptive adversaries in the non-erasure setting under a single re-usable commonreference string. Previously, such “fully-equipped” UC commitment schemes are only known in [8, 9], with anunavoidable overhead of O(κ) in the sense of communication and computational complexities; meaning that tocommit λ bits, the communication and computational costs require O(λκ), where κ denotes the security parame-ter. Efficient construction of a fully-equipped UC commitment scheme was a long-standing open problem. Weintroduce a cryptographic primitive, called all-but-many encryptions (ABMEs), and prove that it is a translation offully-equipped UC commitment in the primitive level. We then construct ABMEs from cryptographic primitivesthat we call a probabilistic pseudo random function family and extractable sigma protocols – the former is a prob-abilistic version of a pseudo random function family and the latter is a special kind of sigma (i.e., canonical 3-roundpublic-coin HVSZK) protocols with some extractability. We provide fully-equipped UC commitment schemes fromABMEs under DDH and DCR-based assumptions, respectively. In particular, the DCR-based scheme is the firstfully-equipped UC commitment scheme with optimal expansion factor Ω(1); to commit κ bits, the communicationand computational costs are Ω(κ). We further construct a fully-equipped UC commitment scheme from a generalassumption (in which trap-door permutations exist), which is far more efficient than the previous construction [9],because, unlike [9], our construction does not require non-interactive zero-knowledge proof systems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

All-But-Many Encryption - A New Framework for Fully-Equipped UC Commitments

We present a general framework for constructing non-interactive universally composable (UC) commitment schemes that are secure against adaptive adversaries in the non-erasure model under a re-usable common reference string. Previously, such “fully-equipped” UC commitment schemes have been known only in [CF01,CLOS02], with strict expansion factor O(κ); meaning that to commit λ bits, communicatio...

متن کامل

SPHF-Friendly Non-interactive Commitments

In 2009, Abdalla et al. proposed a reasonably practical password-authenticated key exchange (PAKE) secure against adaptive adversaries in the universal composability (UC) framework. It exploited the Canetti-Fischlin methodology for commitments and the Cramer-Shoup smooth projective hash functions (SPHFs), following the Gennaro-Lindell approach for PAKE. In this paper, we revisit the notion of n...

متن کامل

On the Complexity of UC Commitments

Motivated by applications to secure multiparty computation, we study the complexity of realizing universally composable (UC) commitments. Several recent works obtain practical UC commitment protocols in the common reference string (CRS) model under the DDH assumption. These protocols have two main disadvantages. First, even when applied to long messages, they can only achieve a small constant r...

متن کامل

UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens

Complex cryptographic protocols are often designed from simple cryptographic primitives, such as signature schemes, encryption schemes, verifiable random functions, and zero-knowledge proofs, by bridging between them with commitments to some of their inputs and outputs. Unfortunately, the known universally composable (UC) functionalities for commitments and the cryptographic primitives mentione...

متن کامل

Physically Uncloneable Functions in the Universal Composition Framework

Recently, there have been numerous works about hardware-assisted cryptographic protocols, either improving previous constructions in terms of efficiency, or in terms of security. In particular, many suggestions use Canetti’s universal composition (UC) framework to model hardware tokens and to derive schemes with strong security guarantees in the UC framework. Here, we augment this approach by c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2012  شماره 

صفحات  -

تاریخ انتشار 2012