Universally Composable Identity-Based Encryption

Total Page:16

File Type:pdf, Size:1020Kb

Universally Composable Identity-Based Encryption SCIS 2006 The 2006 Symposium on Cryptography and Information Security All rights are reserved and copyright of this manuscript belongs to the authors. Hiroshima, Japan, Jan. 17-20, 2006 This manuscript has been published without reviewing and editing as received The Institute of Electronics, from the authors: posting the manuscript to SCIS 2006 does not prevent future Information and Communication Engineers submissions to any journals or conferences with proceedings. Universally Composable Identity-Based Encryption Ryo Nishimaki ¤ Yoshifumi Manabe ¤ y Tatsuaki Okamoto ¤ y Abstract| The identity-based encryption (IBE) is one of the most important primitives in cryp- tography, and various security notions of IBE (e.g., IND-ID-CCA2, NM-ID-CCA2, IND-sID-CPA etc.) have been introduced and the relations among them have been clari¯ed recently. This paper, for the ¯rst time, investigate the security of IBE in the universally composable (UC) framework. This paper ¯rst de¯nes the UC-security of IBE, i.e., we de¯ne the ideal functionality of IBE, FIBE. We then show that UC-secure IBE is equivalent to conventionally-secure (IND-ID-CCA2-secure) IBE. This paper also introduces the UC-security of weaker security notions of IBE, which correspond to IND-ID-CPA IBE and IND-sID-CCA2. We ¯nally prove that Boneh-Franklin's suggestion on the construction of a secure signatures from an IND-ID-CPA IBE scheme is true in the UC framework. Keywords: identity-based encryption, IND-ID-CCA2, universal composition, digital signatures 1 Introduction entionally-secure primitives/protocols has been one of the signi¯cant topics in cryptography [4, 5, 8, 9, 11]. 1.1 Background Since UC represents stronger security requirements, a The concept of identity-based encryption (IBE) was lot of conventionally-secure protocols fail to meet UC introduced by Shamir [12], and is a variant of public- security requirements. For example, we cannot design key encryption (PKE), where the identity of a user is secure two party protocols in the UC framework with employed in place of the user's public-key. no setup assumption, while there are conventionally- Boneh and Franklin [2] de¯ned the security, IND- secure two party protocols (e.g., commitment and zero- ID-CCA2 (indistinguishable against adaptively chosen- knowledge proofs) with no setup assumption. ciphertext attacks under chosen identity attacks), as However, we know that the conventional security the desirable security of IBE schemes. Canetti, Halevi, notions are equivalent to UC security notions for a and Katz [6, 7] de¯ned a weaker notion of security in few cryptographic primitives. For example, UC-secure which the adversary commits ahead of time to the chal- PKE is equivalent to conventionally-secure (IND-CCA2- lenge identity it will attack. We refer to this notion as secure) PKE [3] and UC-secure signatures are equiva- selective identity (sID) adaptively chosen-ciphertext se- lent to conventionally-secure (existentially unforgeable cure IBE (IND-sID-CCA2). In addition, they also de- against chosen message attacks: EUF-CMA-secure) sig- ¯ne a weaker security notion of IBE, selective-identity natures [4]. chosen-plaintext (CPA) secure IBE (IND-sID-CPA). At- IBE is a more complex cryptographic primitive than trapadung et. al. [1], and Galindo and Hasuo [10] PKE and signatures, so it is not clear whether conventi- introduced the non-malleability (NM) in the security onally-secure (i.e., IND-ID-CCA2-secure) IBE is equiv- notion of IBE. Thus, the security de¯nitions consid- alent to UC-secure IBE or not. Since IBE is one of the ered up to now in the literature are: G-A1-A2, where most signi¯cant primitives like PKE and signatures in G 2 fIND, NMg, A1 2 fID, sIDg, ID denotes full- cryptography, it is important to clarify the relationship identity attacks, and A2 2 fCPA, CCA1, CCA2g. between the UC security and conventional security no- Attrapadung et. al. [1], and Galindo and Hasuo tions of IBE. The UC security of IBE, however, has not [10] have clari¯ed the relationship among these no- been investigated. tions, and shown that IND-ID-CCA2 is equivalent to That is, we have the following problems: the strongest security notion, NM-ID-CCA2, among them. 1. What is the security de¯nition of IBE in the UC Since Canetti introduced universal composability (UC) framework (i.e., how to de¯ne an ideal function- as a new framework for analyzing the security of cryp- ality of IBE)? tographic primitives/protocols [3], investing the rela- 2. Is UC-secure IBE equivalent to IND-ID-CCA2- tion between UC-secure primitives/protocols and conv- secure IBE? ¤ Department of Social Informatics, Graduate School of Infor- Some weaker security notions of IBE than IND-ID- matics, Kyoto University, Yoshidahonmachi, Sakyo-ku, Kyoto- CCA2 are also useful to construct a secure (IND-CCA2) shi, Japan, [email protected] y NTT Laboratories, 1-1 Hikari-no-oka, Yokosuka- PKE scheme and a secure (EUF-CMA) signatures. For shi, Japan, [email protected], example, Canetti, Halevi and Katz [7] have shown how [email protected] to construct a secure PKE scheme from a selective-ID- We say that a function g : < ! < is negligible if for j j 1 secure (IND-sID-CPA-secure) IBE scheme. Boneh and any d > 0 we have g(k) < kd for su±ciently large k. Franklin [2] suggested a construction of a secure signa- tures from an IND-ID-CPA IBE scheme. 2.2 Identity-Based Encryption The UC security treatment of such weaker security Identity-Based Encryption scheme Identity-based notions of IBE may provide insight into a new relation- encryption scheme § is speci¯ed by four algorithms: S, ship between IBE and other primitives and also o®er a X , E, D: simpler and more clear proof of the relations than the Setup: S takes security parameter k and returns params conventional proofs. Therefore, it should be signi¯cant (system parameters) and mk (master-key). The to de¯ne the weaker security notions of IBE in the UC system parameters include a description of a ¯- framework. nite message space M, and a description of a ¯- That is, we have the following problem: nite ciphertext space C. 1. What are the UC security de¯nitions of the weaker Extract: X takes as input params, mk, and an ar- security notions of IBE? bitrary ID 2 f0; 1g¤, and returns private key d. 2. How to prove the constructibility of secure PKE/ Here ID is an arbitrary string that will be used signatures from the weaker security notions of as a public key, and d is the corresponding private IBE in the UC framework? decryption key. E 2 M 1.2 Our Results Encrypt: takes as input params, ID, and M . It returns a ciphertext C 2 C. This paper answers the above-mentioned problems: Decrypt: D takes as input params, C 2 C, and a 1. This paper de¯nes the UC-security of IBE, i.e., private key d. It returns M 2 M. we de¯ne the ideal functionality of IBE, FIBE. These algorithms must satisfy the standard consis- 2. We show that UC-secure IBE is equivalent to tency constraint, namely, conventionally-secure (IND-ID-CCA2-secure) IBE. 8M 2 M : D(params; C; d) = M where C = 3. We de¯ne the ideal functionalities of weaker se- E(params; ID; M), d = X (params; mk; ID) F ND F sID curity notions of IBE, IBE and IBE. We then F ND 2.3 De¯nitions of security notions for IBE schemes show that UC-secure IBE with IBE is equivalent to IND-ID-CPA IBE, and that UC-secure IBE Let A = (A1; A2) be an adversary; we say A is poly- F sID nomial time if both probabilistic algorithm A and A with IBE is equivalent to IND-sID-CCA2 IBE. 1 2 are polynomial time. At the ¯rst stage, given the sys- 4. We prove that Boneh-Franklin's suggestion [2] tem parameters, the adversary computes and outputs on the construction of a secure signatures from challenge template ¿. A1 can output some information an IND-ID-CPA IBE scheme is true in the UC s which will be transferred to A2. At the second stage, framework. That is, we present a protocol which the adversary is challenged with ciphertext y¤ gener- F F ND UC-realizes ideal functionality SIGW in the IBE- ated from ¿ by a probabilistic function, in a manner F hybrid model, where SIGW is an ideal function- depending on the goal. We say adversary A success- F ality with (normal) unforgeability, while SIG de- fully breaks the scheme if she achieves her goal. We ¯ned by Canetti [4] represents strong unforgeabil- consider a security goal, IND [1, 10], and three attack ity. models, ID-CPA, ID-CCA, ID-CCA2, listed in order of increasing strength. The di®erence among the models 2 Preliminaries is whether or not A1 or A2 is granted access to decryp- 2.1 Conventions tion oracles. We describe in Table 1 the ability with which the adversary can, in the di®erent attack mod- Notations We describe probabilistic algorithms and els, access the Extraction Oracle X (params; mk; ¢), the experiments with standard notations and conventions. Encryption Oracle E(params; ID; ¢) and the Decryp- For probabilistic algorithm A, A(x1; x2; :::; r) is the re- tion Oracle D(params; d; ¢) (We omit parameters in sult of running A that takes as inputs x1; x2; ::: and Table 1). When we say O = fEO ; XO ; DO g = Ã i i i i coins r.
Recommended publications
  • A Second Note on the Feasibility of Generalized Universal Composability
    A final version of this paper appeared in Math. Struct. in Comp. Science, 2016. This is the preliminary full version. A Second Note on the Feasibility of Generalized Universal Composability ALONSOGONZ ALEZ´ y and A L E J A N D R O H E V I Az Departamento de Ciencias de la Computaci´on,Universidad de Chile. [email protected], [email protected]. Received 2 October 2014; revised 11 May 2016 Yao et al. (YYZ09a; YYZ07) claimed a potential limitation on the class of protocols that could be securely implemented in the Generalized Universal Composability (GUC) framework proposed by Canetti et al. (CDPW07). Specifically, Yao et al. presented a concrete attack on a GUC Zero Knowledge (GUCZK) protocol, a natural adaptation Blum's ZK proof for Directed Hamiltonicity using the general GUC feasibility of (CDPW07). Interestingly, the attack was not analyzed in the GUC model in (YYZ09a) but in the FUC model, a new UC-like framework proposed in the same work. Nonetheless, Yao et al. (YYZ09a) argued that, in light of this attack, GUC would lose its concurrent general composability and proof of knowledge properties. Concretely, they argue that GUC composability would now be with respect to some adversaries with limited access to external arbitrary protocols. In this work, we show that the claimed attack from Yao et al. is indeed harmless and does not contradict the security of the mentioned GUCZK protocol, thus restoring the general feasibility for GUC. 1. Introduction The Universal Composability framework (UC), introduced by Canetti (Can01), allows designing protocols whose security is maintained even when composed with any other arbitrary protocol (i.e.
    [Show full text]
  • Universally Composable Security: a New Paradigm for Cryptographic Protocols∗
    Universally Composable Security: A New Paradigm for Cryptographic Protocols∗ Ran Canettiy February 11, 2020 Abstract We present a general framework for describing cryptographic protocols and analyzing their security. The framework allows specifying the security requirements of practically any crypto- graphic task in a unified and systematic way. Furthermore, in this framework the security of protocols is preserved under a general composition operation, called universal composition. The proposed framework with its security-preserving composition operation allows for mod- ular design and analysis of complex cryptographic protocols from simpler building blocks. More- over, within this framework, protocols are guaranteed to maintain their security in any context, even in the presence of an unbounded number of arbitrary protocol sessions that run concur- rently in an adversarially controlled manner. This is a useful guarantee, which allows arguing about the security of cryptographic protocols in complex and unpredictable environments such as modern communication networks. Keywords: cryptographic protocols, security analysis, protocol composition, universal composi- tion. ∗An extended abstract of this work appears in the proceedings of the 42nd Foundations of Computer Science conference, 2001. This is an updated version. While the overall spirit and the structure of the definitions and results in this paper has remained the same, many important details have changed. We point out and motivate the main differences as we go along. Earlier versions of this work appeared in December 2018, July 2013, Decem- ber and January 2005, and October 2001, under the same title, and in December 2000 under the title \A unified framework for analyzing security of protocols". These earlier versions can be found at the ECCC archive, TR 01-16 (http://eccc.uni-trier.de/eccc-reports/2001/TR01-016); however they are not needed for understanding this work and have only historic significance.
    [Show full text]
  • Careful with Composition: Limitations of Indifferentiability and Universal Composability
    A preliminary version of this paper appeared in: T. Ristenpart, H. Shacham, and T. Shrimpton. Careful with Composition: Limitations of the Indifferentia- bility Framework. Advances in Cryptology – EUROCRYPT ’11, LNCS vol. 6632, pp. 487–506, Kenneth Paterson ed., Springer, 2011. Careful with Composition: Limitations of Indifferentiability and Universal Composability Thomas Ristenpart∗ Hovav Shachamy Thomas Shrimptonz June 22, 2011 Abstract We exhibit a hash-based storage auditing scheme which is provably secure in the random-oracle model (ROM), but easily broken when one instead uses typical indifferentiable hash constructions. This contradicts the widely accepted belief that the indifferentiability composition theorem applies to any cryptosystem. We characterize the uncovered limitation of the indifferentiability framework by show- ing that the formalizations used thus far implicitly exclude security notions captured by experiments that have multiple, disjoint adversarial stages. Examples include deterministic public-key encryption (PKE), password-based cryptography, hash function nonmalleability, key-dependent message security, and more. We formalize a stronger notion, reset indifferentiability, that enables an indifferentiability- style composition theorem covering such multi-stage security notions, but then show that practical hash constructions cannot be reset indifferentiable. We discuss how these limitations also affect the universal composability framework. We finish by showing the chosen-distribution attack security (which requires a multi-stage game) of some important public-key encryption schemes built using a hash construction paradigm introduced by Dodis, Ristenpart, and Shrimpton. 1 Introduction The indifferentiability framework of Maurer, Renner, and Holenstein (MRH) [51] supports modular proofs of security for cryptosystems. It can be viewed, informally, as a special case of the Universal Composition (UC) framework [27, 53], which inspired it.
    [Show full text]
  • Universally Composable RFID Identification and Authentication
    Universally Composable RFID Identification and Authentication Protocols MIKE BURMESTER Florida State University, Tallahassee TRI VAN LE and BRENO DE MEDEIROS Google, Inc. 1600 Amphitheatre, Parkway Mountain View and GENE TSUDIK University of California, Irvine As the number of RFID applications grows and RFID tags begin to enter many aspects of everyday life, concerns about their security and privacy become greatly amplified. At the same time, the acutely restricted and cost-sensitive nature of RFID tags rules out simple re-use of existing traditional security/privacy solutions and calls for a new generation of extremely lightweight identification and authentication protocols. This paper describes a universally composable security framework tuned especially for RFID applications. By making RFID-specific setup, communication, and concurrency assumptions, we arrive at a model that guarantees strong security, privacy and availability properties, while per- mitting the design of practical RFID protocols. The framework supports modular deployment, which is most appropriate for ubiquitous applications. As an instantiation of the proposed frame- work, this paper describes a set of simple, efficient, secure and anonymous (untraceable) RFID identification and authentication protocols. These protocols involve minimal interaction between a tag and a reader and place only a small computational load on the tag. They also impose little computational burden on the back-end server. We show that our protocols are provably secure within the proposed universally composable framework. Categories and Subject Descriptors: K.6.5 [Management of Computing and Information Systems]: Security and Protection—Authentication; K.6.5 [Management of Computing and Information Systems]: Miscellaneous—Security; C.3 [Special-Purpose and Application- Based Systems]: Real-time and embedded systems General Terms: Design, Security, Theory Additional Key Words and Phrases: RFID Security, Authentication and Key-Exchange Protocols, Universal Composability 1.
    [Show full text]
  • Hawk: the Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts
    Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts Ahmed Kosba∗, Andrew Miller∗, Elaine Shiy, Zikai Weny, Charalampos Papamanthou∗ ∗University of Maryland and yCornell University fakosba, [email protected], frs2358, [email protected], [email protected] Abstract—Emerging smart contract systems over decentralized privacy. Such a blockchain provides a powerful abstraction for cryptocurrencies allow mutually distrustful parties to transact the design of distributed protocols. safely without trusted third parties. In the event of contrac- The blockchain’s expressive power is further enhanced by tual breaches or aborts, the decentralized blockchain ensures that honest parties obtain commensurate compensation. Existing the fact that blockchains naturally embody a discrete notion systems, however, lack transactional privacy. All transactions, of time, i.e., a clock that increments whenever a new block including flow of money between pseudonyms and amount is mined. The existence of such a trusted clock is crucial transacted, are exposed on the blockchain. for attaining financial fairness in protocols. In particular, We present Hawk, a decentralized smart contract system that malicious contractual parties may prematurely abort from a does not store financial transactions in the clear on the block- chain, thus retaining transactional privacy from the public’s view. protocol to avoid financial payment. However, with a trusted A Hawk programmer can write a private smart contract in an clock, timeouts can be employed to make such aborts evident, intuitive manner without having to implement cryptography, and such that the blockchain can financially penalize aborting our compiler automatically generates an efficient cryptographic parties by redistributing their collateral deposits to honest, protocol where contractual parties interact with the blockchain, non-aborting parties.
    [Show full text]
  • Theoretical Computer Science a Note on Universal Composable
    Theoretical Computer Science 410 (2009) 1099–1108 Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs A note on universal composable zero-knowledge in the common reference string modelI Andrew C.C. Yao a, Frances F. Yao b, Yunlei Zhao c,∗ a Institute for Theoretical Computer Science, Tsinghua University, Beijing, China b Department of Computer Science, City University of Hong Kong, China c Software School, Fudan University, Shanghai, China article info a b s t r a c t Keywords: Pass observed that universal composable zero-knowledge (UCZK) protocols in the common Cryptographic protocols reference string (CRS) model lose deniability that is a natural security property and Universal composability implication of the ZK functionality in accordance with the UC framework. An open problem Zero-knowledge Proof of knowledge (or, natural query) raised in the literature is: are there any other essential security Common reference string properties, other than the well-known deniability property, that could be lost by UCZK in the CRS model, in comparison with the ZK functionality in accordance with the UC framework? In this work, we answer this open question (or, natural query), by showing that when running concurrently with other protocols UCZK in the CRS model can lose proof of knowledge (POK) property that is very essential and core security implication of the ZK functionality. This is demonstrated by concrete attack against naturally existing UCZK protocols in the CRS model. Then, motivated by our attack, we make further clarifications of the underlying reasons beneath the concrete attack, and investigate the precise security guarantee of UC with CRS.
    [Show full text]
  • Universally Composable Protocols with Relaxed Set-Up Assumptions ¡ Boaz Barak Ran Canetti Jesper Buus Nielsen Rafael Pass Inst
    Universally Composable Protocols with Relaxed Set-up Assumptions ¡ Boaz Barak Ran Canetti Jesper Buus Nielsen Rafael Pass Inst. for Advanced Study IBM Research ETH Zurich¨ MIT [email protected] [email protected] [email protected] [email protected] Abstract of instances of the protocol, as well as arbitrary other pro- tocols. Indeed, it has been demonstrated time and again A desirable goal for cryptographic protocols is to guar- that adversarially-coordinated interactions between differ- antee security when the protocol is composed with other ent protocol instances can compromise the security of pro- protocol instances. Universally Composable (UC) protocols tocols that were demonstrated to be secure when run in provide this guarantee in a strong sense: A protocol re- isolation (see, e.g., [GK90, DDN00, KSW97, DNS98]). A nat- mains secure even when composed concurrently with an un- ural way for guaranteeing security of protocols in such bounded number of instances of arbitrary protocols. How- complex execution environments is to require that pro- ever, UC protocols for carrying out general tasks are known tocols satisfy a notion of security that provides a gen- to exist only if a majority of the participants are honest, or eral secure composability guarantee. That is, it should in the common reference string (CRS) model where all par- be guaranteed that a secure protocol maintains its se- ties are assumed to have access to a common string that curity even when composed with (i.e., runs alongside) is drawn from some pre-defined distribution. Furthermore, arbitrary other protocols. Such a general notion of secu- carrying out many interesting tasks in a UC manner and rity is provided by the universally composable (UC) security without honest majority or set-up assumptions is impos- framework [C01], which provides a very general com- sible, even if ideally authenticated communication is pro- posability property: A secure protocol is guaranteed to vided.
    [Show full text]
  • New Notions of Security: Achieving Universal Composability Without Trusted Setup
    New Notions of Security: Achieving Universal Composability without Trusted Setup Manoj Prabhakaran∗ Amit Sahai† Princeton University Princeton University June 12, 2004 Preliminary Version Abstract We propose a modification to the framework of Universally Composable (UC) security [3]. Our new notion, involves comparing the protocol executions with an ideal execution involving ideal functionalities (just as in UC-security), but allowing the environment and adversary access to some super-polynomial computational power. We argue the meaningfulness of the new notion, which in particular subsumes many of the traditional notions of security. We generalize the Universal Composition theorem of [3] to the new setting. Then under new com- putational assumptions, we realize secure multi-party computation (for static adversaries) without a common reference string or any other set-up assumptions, in the new framework. This is known to be impossible under the UC framework. 1 Introduction Over the last two decades, there has been tremendous success in placing cryptography on a sound theoretical foundation, and building an amazingly successful theory out of it. The key elements in this Modern Cryp- tographic Theory are the definitions capturing the intuitive, yet elusive notions of security in the various cryptographic settings. The definitions of early 80’s proved to be extremely successful in this regard. But with time, as the theory started addressing more and more complex concerns, further notions of security had to be introduced. One of the most important concerns theory ventured into is of complex environments where the different parties are communicating with each other concurrently in many different protocols. The original definitions turned out to be inadequate to handle this.
    [Show full text]
  • Universally Composable Key-Management Steve Kremer, Robert Kunnemann, Graham Steel
    Universally Composable Key-Management Steve Kremer, Robert Kunnemann, Graham Steel To cite this version: Steve Kremer, Robert Kunnemann, Graham Steel. Universally Composable Key-Management. 2012. hal-00686535 HAL Id: hal-00686535 https://hal.inria.fr/hal-00686535 Preprint submitted on 10 Apr 2012 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Universally Composable Key-Management Steve Kremer1, Robert Kunnemann¨ 2, and Graham Steel2 1 LORIA & INRIA Nancy { Grand-Est 2 LSV & INRIA Saclay { ^Ile-de-France Abstract. We present the first key-management functionality in the Universal Composability (UC) framework. It allows the enforcement of a wide range of security policies and can be extended by diverse key usage operations with no need to repeat the security proof. We illustrate its use by proving an implementation of a Security API secure with respect to arbitrary key-usage operations and explore a proof technique that allows the storage of cryptographic keys externally, a novel development in the UC framework. Keywords: Key management, Security APIs, Universal Composability Table of Contents Universally Composable Key-Management ::::::::::::::::::::::::::: 1 Steve Kremer, Robert Kunnemann,¨ and Graham Steel 1 Introduction...................................................2 2 A key-management functionality .
    [Show full text]
  • Adaptive Universal Composability Framework for Server-Aided Threshold Signature
    Research Journal of Applied Sciences, Engineering and Technology 5(1): 270-274, 2013 ISSN: 2040-7459; e-ISSN: 2040-7467 © Maxwell Scientific Organization, 2013 Submitted: June 02, 2012 Accepted: June 23, 2012 Published: January 01, 2013 Adaptive Universal Composability Framework for Server-Aided Threshold Signature Xuan Hong and Luqun Li Department of Computer Science and Technology, Shanghai Normal University, Shanghai 200234, China Abstract: The threshold signature scheme is a protocol that allows any subset of t parties out of n to generate a signature. Since the t members can cooperate together to compute the secret key, we introduce the server-aided threshold signature, which provides controllability for activating the signing function in a certain enhanced way. In this study, we present a server-aided threshold RSA signature protocol against the adaptive attacks. We give the universally composable secure model for the server-aided threshold signature primitive and prove that the proposed protocol is claimed to be well-formed, correct and unforgeability. As a separate contribution we also prove that it is also secure in the adaptive universal composability framework. After the discussion about the security and the performance, we claim that the protocol is practical and efficient. Keywords: Adaptive security, server-aided, threshold signature, universal composability framework INTRODUCTION that the password is divided into several pieces which are shared among a group of members. Only at least t A threshold signature scheme is a protocol that members together have the privilege to access the allows any subset of t parties out of n to generate a classified file. However, when some t members are signature.
    [Show full text]
  • A Framework for Practical Universally Composable Zero-Knowledge Protocols?
    A Framework for Practical Universally Composable Zero-Knowledge Protocols? Jan Camenisch1, Stephan Krenn2, and Victor Shoup3 1 IBM Research { Zurich, R¨uschlikon, Switzerland [email protected] 2 Bern University of Applied Sciences, Biel-Bienne, Switzerland, and University of Fribourg, Switzerland [email protected] 3 Department of Computer Science, New York University, USA [email protected] Abstract. Zero-knowledge proofs of knowledge (ZK-PoK) for discrete logarithms and related problems are indispensable for practical crypto- graphic protocols. Recently, Camenisch, Kiayias, and Yung provided a specification language (the CKY-language) for such protocols which al- lows for a modular design and protocol analysis: for every zero-knowledge proof specified in this language, protocol designers are ensured that there exists an efficient protocol which indeed proves the specified statement. However, the protocols resulting from their compilation techniques only satisfy the classical notion of ZK-PoK, which is not retained are when they used as building blocks for higher-level applications or composed with other protocols. This problem can be tackled by moving to the Universal Composability (UC) framework, which guarantees retention of security when composing protocols in arbitrary ways. While there exist generic transformations from Σ-protocols to UC-secure protocols, these transformation are often too inefficient for practice. In this paper we introduce a specification language akin to the CKY- language and a compiler such that the resulting protocols are UC-secure and efficient. To this end, we propose an extension of the UC-framework addressing the issue that UC-secure zero-knowledge proofs are by defini- tion proofs of knowledge, and state a special composition theorem which allows one to use the weaker { but more efficient and often sufficient { notion of proofs of membership in the UC-framework.
    [Show full text]
  • Key Confirmation and Adaptive Corruptions in the Protocol Security
    Key confirmation and adaptive corruptions in the protocol security logic Prateek Gupta and Vitaly Shmatikov The University of Texas at Austin Abstract. Cryptographic security for key exchange and secure session estab- lishment protocols is often defined in the so called “adaptive corruptions” model. Even if the adversary corrupts one of the participants in the middle of the proto- col execution and obtains the victim’s secrets such as the private signing key, the victim must be able to detect this and abort the protocol. This is usually achieved by adding a key confirmation message to the protocol. Conventional symbolic methods for protocol analysis assume unforgeability of digital signatures, and thus cannot be used to reason about security in the adaptive corruptions model. We present a symbolic protocol logic for reasoning about authentication and key confirmation in key exchange protocols. The logic is cryptographically sound: a symbolic proof of authentication and secrecy implies that the protocol is secure in the adaptive corruptions model. We illustrate our method by formally proving security of an authenticated Diffie-Hellman protocol with key confirmation. 1 Introduction The two dominant models for analysis of security protocols are the conventional cryptographic model, which aims to prove that the protocol is secure against any efficient adversarial algorithm, and the so called “Dolev-Yao” model, in which proofs are carried out in a symbolic logic or a process calculus. For many (but by no means all) cryptographic primitives, the Dolev-Yao abstraction is computationally sound, that is, symbolic proofs of security for protocols in which the primitive is replaced by its Dolev-Yao abstraction imply cryptographic security.
    [Show full text]