Composable Long-Term Security with Rewinding

被引:0
|
作者
Berger, Robin [1 ]
Broadnax, Brandon
Klooss, Michael [2 ]
Mechler, Jeremias [1 ]
Mueller-Quade, Joern [1 ]
Ottenhues, Astrid [1 ]
Raiber, Markus [1 ]
机构
[1] Karlsruhe Inst Technol, KASTEL Secur Res Labs, Karlsruhe, Germany
[2] Aalto Univ, Espoo, Finland
来源
关键词
D O I
10.1007/978-3-031-48624-1_19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Long-term security, a variant of Universally Composable (UC) security introduced by Muller-Quade and Unruh (TCC '07, JoC '10), allows to analyze the security of protocols in a setting where all hardness assumptions no longer hold after the protocol execution has finished. Such a strict notion is highly desirable when properties such as input privacy need to be guaranteed for a long time, e.g. with zero-knowledge proofs for secure electronic voting. Strong impossibility results rule out socalled long-term-revealing setups, e.g. a common reference string (CRS), to achieve long-term security, with known constructions for long-term security requiring hardware assumptions, e.g. signature cards. We circumvent these impossibility results with new techniques, enabling rewinding-based simulation in a way that universal composability is achieved. This allows us to construct a long-term-secure composable commitment scheme in the CRS-hybrid model, which is provably impossible in the notion of Muller-Quade and Unruh. We base our construction on a statistically hiding commitment scheme in the CRS-hybrid model with CCA-like properties. To provide a CCA oracle, we cannot rely on super-polynomial extraction techniques and instead extract the value committed to via rewinding. To this end, we incorporate rewinding-based commitment extraction into the UC framework via a helper in analogy to Canetti, Lin and Pass (FOCS 2010), allowing both adversary and environment to extract statistically hiding commitments. Our new framework provides the first setting in which a commitment scheme that is both statistically hiding and universally composable can be constructed from standard polynomial-time hardness assumptions and a CRS only. We also prove that our CCA oracle is k-robust extractable. This asserts that extraction is possible without rewinding a concurrently executed k-round protocol. Consequently any k-round (standard) UC-secure protocol remains secure in the presence of our helper. Finally, we prove that building long-term-secure oblivious transfer (and thus general two-party computations) from long-term-revealing setups remains impossible in our setting. Still, our long-term-secure commitment scheme suffices for natural applications, such as long-term secure and composable (commit-and-prove) zero-knowledge arguments of knowledge.
引用
收藏
页码:510 / 541
页数:32
相关论文
共 50 条
  • [1] Long-Term Security and Universal Composability
    Jörn Müller-Quade
    Dominique Unruh
    Journal of Cryptology, 2010, 23 : 594 - 671
  • [2] THE LONG-TERM SAFETY AND SECURITY OF REPOSITORIES
    EHRLICH, D
    ROTHEMEYER, H
    STIERFRIEDLAND, G
    THOMAUSKE, B
    ATOMWIRTSCHAFT-ATOMTECHNIK, 1986, 31 (05): : 231 - 236
  • [3] Perspectives for cryptographic long-term security
    Buchmann, Johannes
    May, Alexander
    Vollmer, Ulrich
    COMMUNICATIONS OF THE ACM, 2006, 49 (09) : 50 - +
  • [4] Long-Term Security and Universal Composability
    Mueller-Quade, Joern
    Unruh, Dominique
    JOURNAL OF CRYPTOLOGY, 2010, 23 (04) : 594 - 671
  • [5] Long-term security and universal composability
    Mueller-Quade, Jorn
    Unruh, Dominique
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2007, 4392 : 41 - +
  • [6] LONG-TERM SECURITY OF INTERNAL JUGULAR CATHETERS
    TINGEY, WR
    FARQUHARSON, S
    ANAESTHESIA, 1975, 30 (02) : 234 - 235
  • [7] Long-term Safety and Security of Repositories.
    Ehrlich, D.
    Roethemeyer, H.
    Stier-Friedland, G.
    Thomauske, B.
    Atw. Atomwirtschaft, Atomtechnik, 1986, 31 (05): : 231 - 236
  • [8] Long-Term Uncertainty and Social Security Systems
    Ferreiro, Jesus
    Serrano, Felipe
    NEW ECONOMICS AS MAINSTREAM ECONOMICS, 2011, : 154 - 189
  • [9] DEFINITION OF A SECURITY - LONG-TERM PROMISSORY NOTES
    MURRAY, CW
    LOUISIANA LAW REVIEW, 1975, 35 (02): : 570 - 575
  • [10] Education as a Long-Term Strategy for Cyber Security
    Pale, P.
    CYBER SECURITY AND RESILIENCY POLICY FRAMEWORK, 2014, 38 : 127 - 134