A Framework for Efficient Fully-Equipped UC Commitments
نویسنده
چکیده
We present a general framework for constructing non-interactive universally composable (UC) commitmentschemes that are secure against adaptive adversaries in the non-erasure setting under a single re-usable commonreference string. Previously, such “fully-equipped” UC commitment schemes are only known in [8, 9], with anunavoidable overhead of O(κ) in the sense of communication and computational complexities; meaning that tocommit λ bits, the communication and computational costs require O(λκ), where κ denotes the security parame-ter. Efficient construction of a fully-equipped UC commitment scheme was a long-standing open problem. Weintroduce a cryptographic primitive, called all-but-many encryptions (ABMEs), and prove that it is a translation offully-equipped UC commitment in the primitive level. We then construct ABMEs from cryptographic primitivesthat we call a probabilistic pseudo random function family and extractable sigma protocols – the former is a prob-abilistic version of a pseudo random function family and the latter is a special kind of sigma (i.e., canonical 3-roundpublic-coin HVSZK) protocols with some extractability. We provide fully-equipped UC commitment schemes fromABMEs under DDH and DCR-based assumptions, respectively. In particular, the DCR-based scheme is the firstfully-equipped UC commitment scheme with optimal expansion factor Ω(1); to commit κ bits, the communicationand computational costs are Ω(κ). We further construct a fully-equipped UC commitment scheme from a generalassumption (in which trap-door permutations exist), which is far more efficient than the previous construction [9],because, unlike [9], our construction does not require non-interactive zero-knowledge proof systems.
منابع مشابه
All-But-Many Encryption - A New Framework for Fully-Equipped UC Commitments
We present a general framework for constructing non-interactive universally composable (UC) commitment schemes that are secure against adaptive adversaries in the non-erasure model under a re-usable common reference string. Previously, such “fully-equipped” UC commitment schemes have been known only in [CF01,CLOS02], with strict expansion factor O(κ); meaning that to commit λ bits, communicatio...
متن کاملSPHF-Friendly Non-interactive Commitments
In 2009, Abdalla et al. proposed a reasonably practical password-authenticated key exchange (PAKE) secure against adaptive adversaries in the universal composability (UC) framework. It exploited the Canetti-Fischlin methodology for commitments and the Cramer-Shoup smooth projective hash functions (SPHFs), following the Gennaro-Lindell approach for PAKE. In this paper, we revisit the notion of n...
متن کاملOn the Complexity of UC Commitments
Motivated by applications to secure multiparty computation, we study the complexity of realizing universally composable (UC) commitments. Several recent works obtain practical UC commitment protocols in the common reference string (CRS) model under the DDH assumption. These protocols have two main disadvantages. First, even when applied to long messages, they can only achieve a small constant r...
متن کاملUC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens
Complex cryptographic protocols are often designed from simple cryptographic primitives, such as signature schemes, encryption schemes, verifiable random functions, and zero-knowledge proofs, by bridging between them with commitments to some of their inputs and outputs. Unfortunately, the known universally composable (UC) functionalities for commitments and the cryptographic primitives mentione...
متن کاملPhysically Uncloneable Functions in the Universal Composition Framework
Recently, there have been numerous works about hardware-assisted cryptographic protocols, either improving previous constructions in terms of efficiency, or in terms of security. In particular, many suggestions use Canetti’s universal composition (UC) framework to model hardware tokens and to derive schemes with strong security guarantees in the UC framework. Here, we augment this approach by c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2012 شماره
صفحات -
تاریخ انتشار 2012