Concurrent Secure Computation with Optimal Query Complexity and Fully Concurrent PAKE With No Setup

نویسندگان

  • Ran Canetti
  • Vipul Goyal
  • Abhishek Jain
چکیده

The multiple ideal query (MIQ) model [Goyal, Jain, and Ostrovsky, Crypto’10] offers a relaxed notion of security for concurrent secure computation, where the simulator is allowed to query the ideal functionality multiple times per session (as opposed to just once in the standard definition). The model provides a quantitative measure for the degradation in security under concurrent self-composition. As an immediate application, MIQ-secure protocols with low per-session query complexity yield concurrent password-authenticated key exchange protocols in the model of [Goldreich and Lindell, Crypto 2001]. However, to date, all known MIQ-secure protocols guarantee only an overall average bound on the number of queries per session throughout the execution. No worst-case per-session bound has been shown. We show the first MIQ-secure protocol with worst-case per-session guarantee. Specifically, we show a protocol for every PPT functionality f , where the simulator makes only a constant number of ideal queries in every session. The constant depends on the adversary but is independent of the security parameter. The result exactly matches a lower bound of [Goyal and Jain, Eurocrypt’13] who ruled out protocols where the simulator makes only an adversary-independent constant number of ideal queries per session. An immediate corollary of our main result is the resolution of the long standing open problem of designing a fully concurrent password authenticated key exchange protocol with no set-up assumptions. Prior constructions either required a setup assumption, or a random oracle, or an a priori bound on the number of concurrent execution, or worked only for a single password.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Concurrent Secure Computation with Optimal Query Complexity

The multiple ideal query (MIQ) model [Goyal, Jain, and Ostrovsky, Crypto’10] offers a relaxed notion of security for concurrent secure computation, where the simulator is allowed to query the ideal functionality multiple times per session (as opposed to just once in the standard definition). The model provides a quantitative measure for the degradation in security under concurrent self-composit...

متن کامل

Password-Authenticated Session-Key Generation on the Internet in the Plain Model

The problem of password-authenticated key exchange (PAKE) has been extensively studied for the last two decades. Despite extensive studies, no construction was known for a PAKE protocol that is secure in the plain model in the setting of concurrent self-composition, where polynomially many protocol sessions with the same password may be executed on the distributed network (such as the Internet)...

متن کامل

A Unified Framework for UC from Only OT

In [1], the authors presented a unified framework for constructing Universally Composable (UC) secure computation protocols, assuming only enhanced trapdoor permutations. In this work, we weaken the hardness assumption underlying the unified framework to only the existence of a stand-alone secure semi-honest Oblivious Transfer (OT) protocol. The new framwork directly implies new and improved UC...

متن کامل

Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable Commitments

We present a unified approach for obtaining general secure computation that achieves adaptive-Universally Composable (UC)-security. Using our approach we essentially obtain all previous results on adaptive concurrent secure computation, both in relaxed models (e.g., quasi-polynomial time simulation), as well as trusted setup models (e.g., the CRS model, the imperfect CRS model). This provides c...

متن کامل

Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices

We describe a public-key encryption scheme based on lattices — specifically, based on the hardness of the learning with error (LWE) problem — that is secure against chosen-ciphertext attacks while admitting (a variant of) smooth projective hashing. This encryption scheme suffices to construct a protocol for password-based authenticated key exchange (PAKE) that can be proven secure based on the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014