Trapdoor Commitment Schemes and Their Applications

Trapdoor Commitment Schemes and Their Applications

Trapdoor Commitment Schemes and Their Applications Dissertation zur Erlangung des Doktorgrades der Naturwissenschaften G Fachbereich Mathematik Johann Wolfgang Goethe-Universit¨at Frankfurt am Main Marc Fischlin Frankfurt am Main 2001 Vom Fachbereich Mathematik der Johann Wolfgang Goethe-Universit¨at als Dissertation angenommen. Dekan: Dr. J. Baumeister Gutachter: Dr. C. Schnorr Dr. M. Sieveking Datum der Disputation: 17. Dezember 2001 Look, matey, I know a dead parrot when I see one, and I'm looking at one right now. | Monty Python, The Parrot Sketch Preface There are certainly one or two things about cryptography I have learned during my Ph.D. time. One thing I have noticed is that trapdoor commitments are a remarkable catalyst for the design of provably secure cryptographic protocols. The thesis reflects this. It is the result of my Ph.D. time at Professor Schnorr's group at the Johann Wolfgang Goethe-University of Frankfurt, Germany, from July 1997 till December 2001, suspended due to my community service from March 1998 till April 1999. Introduction Informally, commitment schemes can be described by lockable steely boxes. In the commitment phase, the sender puts a message into the box, locks the box and hands it over to the receiver. On one hand, the receiver does not learn anything about the message. On the other hand, the sender cannot change the message in the box anymore. In the decommitment phase the sender gives the receiver the key, and the receiver then opens the box and retrieves the message. One application of such schemes are digital auctions where each participant places his secret bid into a box and submits it to the auctioneer. In this thesis we investigate trapdoor commitment schemes. Following the abstract viewpoint of lockable boxes, a trapdoor commitment is a box with a tiny secret door. If someone knows the secret door, then this person is still able to change the committed message in the box, even after the commitment phase. Such trapdoors turn out to be very useful for the design of secure cryptographic protocols involving commitment schemes. v vi Preface Overview In the first part of the thesis, we formally introduce trapdoor commitments and extend the notion to identity-based trapdoors, where trapdoors can only be used in connection with certain identities. We then recall the most popular construc- tions of ordinary trapdoor protocols and present new solutions for identity-based trapdoors. In the second part of the thesis, we show the usefulness of trapdoors in commit- ment schemes. Deploying trapdoors we construct efficient non-malleable commit- ment schemes which basically guarantee indepency of commitments. Furthermore, applying (identity-based) trapdoor commitments we secure well-known identifica- tion protocols against a new kind of attack. And finally, by means of trapdoors, we show how to construct composable commitment schemes that can be securely executed as subprotocols within complex protocols. About This Thesis The first part of the thesis mainly uses known facts to guide the reader to trapdoor commitments. Still, we also introduce the new notion of identity-based trapdoor commitments and present previously unpublished constructions of such trapdoors. The second part, exemplifying how to apply trapdoor commitments in order to devise secure protocols, is based on three papers done during my Ph.D. time: Chapter 4 about non-malleable commitment schemes is taken from a joint work with Roger Fischlin [FF00], published at Crypto 2000. The secure reset- table identification part, Chapter 5, is extracted from a joint paper [BFGM01] with Mihir Bellare, Shafi Goldwasser and Silvio Micali presented at Eurocrypt 2001. The part here has been added to the earlier proposal of Bellare, Goldwasser and Micali how to achieve secure resettable identification with other techniques. Fi- nally, Chapter 6 about universally composable commitments is almost a verbatim copy of the extended version of a paper with Ran Canetti [CF01] appearing at Crypto 2001. The other papers published during (or before) my Ph.D. time do not resurrect in this thesis. Most of the papers deal with the design of efficient cryptographic protocols [F97a, F97b, F99, F01a, FF02] and some discuss more theoretical stuff [F97c, F01b, F00, F02]. Although [FF02] partly deals with trapdoor commit- ments, too, due to space reasons only the construction of a trapdoor commitment scheme in that paper is briefly presented here. Acknowledgments A lot of people have contributed to this thesis, either directly or more sub- liminal. On the indirect side, I have to mention especially those people that kept bugging me by asking when I would finish this thesis. You finally made me do Preface vii it. Although they did not give scientific support I owe Stefanie, my parents, my brother Roger and all my friends a big thank-you. During my Ph.D. years, I had the opportunity to attend quite a few conferences and workshops all over world. The places include countries like the United States, Finnland or Australia. For example, parts of the introduction were written at a Starbucks in Kyoto, Japan, in December 2000 (sorry guys, but the Caramel Frappuccino in Manhatten is much better). I also spent an amazing time in New York in July/August 2000, visiting the crypto group at IBM T.J. Watson; thanks to Alon, Eyal, Nick, Ran, Rosario, Shai and Tal. I am grateful to all people and organizations supporting these trips, the University of Frankfurt, Professor Claus Schnorr, IBM, IACR and all the conference chairs and workshop organizers, the Willkomm and the Leibniz foundation and anyone else supporting me. I got in contact with a lot of researchers supporting me, sometimes it even ended up in a joint work. I would like to thank (in alphabetical order): Mihir Bellare, Stefan Brands, Ran Canetti, Cynthia Dwork, Roger Fischlin, Rosario Gennaro, Shafi Goldwasser, Shai Halevi, Yehuda Lindell, Silvio Micali, Daniele Micciancio, Tal Rabin, Omer Reingold, Alon Rosen, Dan Simon, Claus Schnorr, Berry Schoenmakers, all anonymous reviewers, and anyone else I intended to men- tion but forgot. Finally, I thank Claus Schnorr and Malte Sieveking for discussions and remarks to preliminary drafts of this thesis. I am especially grateful to Professor Sieveking for suggesting the translations for the German summery, and for inspiring me how to write that summery. In addition to Professor Schnorr and Professor Sieveking, I thank Professor Kersting and Professor Wolfart for serving on the committee of my defense. Enjoy. Marc Fischlin December 2001 Contents Chapter 1. Introduction 1 1. Commitment Schemes 1 x 2. Trapdoor Commitment Schemes 2 x 3. Trapdoor Commitments in Cryptography 4 x 4. Organization of Thesis 5 x Chapter 2. Definitions 7 1. Notations 7 x 2. Cryptographic Primitives and Assumptions 9 x 3. Interactive Protocols 12 x 4. Commitment Schemes 14 x 5. Trapdoor Commitment Schemes 20 x 6. Identity-Based Trapdoor Commitments 23 x Chapter 3. Constructions of Trapdoor Commitment Schemes 27 1. Number-Theoretic Constructions 27 x 2. Complexity-Based Constructions 31 x 3. Identity-Based Trapdoor Commitments 35 x Chapter 4. Efficient Non-Malleable Commitment Schemes 41 1. Introduction 41 x 2. Non-Malleability 44 x 3. On the Relationship of Non-Malleability Notions 49 x 4. Discrete-Logarithm-Based Non-Malleable Commitments 53 x ix x Contents 5. Non-Malleable Commitments Based on RSA 67 x 6. Non-Malleable Commitments via Random Oracles 71 x Chapter 5. Identification Protocols Secure Against Reset Attacks 73 1. Introduction 73 x 2. Definitions 77 x 3. Secure Identification in the CR1 Setting 81 x 4. Secure Identification in the CR2 Setting 87 x Chapter 6. Universally Composable Commitments 93 1. Introduction 93 x 2. Defining Universally Composable Commitments 99 x 3. Impossibility of UC Commitments in the Plain Model 107 x 4. UC Commitment Schemes in the crs Model 109 x 5. Application to Zero-Knowledge 126 x Bibliography 131 Index 139 Zusammenfassung 141 Chapter 1 Introduction The classical issue in cryptography is encryption: how do I privately send a mes- sage to another person? At the present time we indeed know satisfactory solu- tions for this challenging task. But modern cryptography also supplies reliable constructions to many other areas, like digital signatures, identification, message authentication, electronic cash, electronic voting etc. Among others, commitment schemes make up an important building block for these solutions. 1. Commitment Schemes Instructively, one can describe a commitment scheme with a lockable steely box. In the so-called commitment phase, one party, the sender, puts a message into a box, locks the box and gives it to the other party, the receiver. On one hand, the receiver cannot open the box to learn the message, and on the other side, the sender cannot change the message anymore. The former property is called secrecy, the latter unambiguity or binding property. In the decommitment phase, the sender gives the key to the receiver to open the box and to disclose the message. An obvious application of commitment schemes are sealed-bid auctions. Each participant puts his bid into his box and submits the box to the auctioneer. After having collected all bids the auctioneer requests the keys from the participants, opens the boxes publicly and announces the winner. The important aspects of commitment schemes, secrecy and unambiguity, are reflected in this example: the actual bid should be kept secret until the bidding phase is over, and no bidder should be able to change his value after seeing a previously disclosed opponent's bid. The auction case reveals another, more subtle requirement a commitment schemes must have in this setting. This requirement is not covered by secrecy and unambiguity and is not immediate if one visualizes commitment schemes as solid boxes. Namely, it should be infeasible for a bidder to \build" an appropriate box containing a bid b + 1 after seeing the locked box with an unknown bid b 1 2 1.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    158 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us