A PKI-based Framework for Establishing Efficient MPC Channels

被引:1
|
作者
Masny, Daniel [1 ]
Watson, Gaven [1 ]
机构
[1] VISA Res, Palo Alto, CA 94306 USA
关键词
MPC; PKI; Oblivious Transfer; Authentication; UC; UNIVERSALLY COMPOSABLE SECURITY; OBLIVIOUS TRANSFER;
D O I
10.1145/3460120.3484806
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Transport Layer Security (TLS) protocol is a fundamental building block for ensuring security on Internet. It provides an easy to use framework for the purposes of establishing an authenticated and secure channel between two parties that have never physically met. Nevertheless, TLS only provides a simple cryptographic functionality compared to more advanced protocols such as protocols for secure multiparty computation (MPC). In this work, we provide a framework for efficiently establishing channels for MPC over the Internet. We focus on MPC protocols in the oblivious transfer (OT) hybrid model such that it is sufficient to establish OT correlations for such a channel. We revisit and combine different notions of UC security proposed in both the MPC and authenticated key exchange settings. Through this work, we show how an OT protocol can be composed with a secure authenticator to ensure the authenticity of messages sent during the OT. In addition, we adapt and analyse non-interactive OTs based on dense key encapsulation mechanisms (KEMs) in the random oracle model, where the first message, i.e. public key, can be reused. These KEMs can be instantiated based on CDH, RSA and LWE and after a performance and security evaluation, it turns out that the resulting OT protocols are very competitive with the state of the art and are able to leverage existing PKIs.
引用
收藏
页码:1961 / 1980
页数:20
相关论文
共 50 条
  • [1] A PKI-based authentication framework next generation mobile Internet
    Gu, J
    Park, S
    Song, O
    Lee, J
    WEB AND COMMUNICATION TECHNOLOGIES AND INTERNET-RELATED SOCIAL ISSUES - HSI 2003, 2003, 2713 : 34 - 43
  • [2] A static analysis of PKI-based systems
    Aziz, B
    Gray, D
    Hamilton, G
    THEORETICAL COMPUTER SCIENCE, PROCEEDINGS, 2005, 3701 : 51 - 65
  • [3] A PKI-based lightweight workflow model
    Zhang, J
    Sun, JG
    Li, NY
    Hu, CQ
    Li, ZH
    2005 International Conference on Control and Automation (ICCA), Vols 1 and 2, 2005, : 1062 - 1067
  • [4] An open, PKI-based mobile payment system
    Hassinen, Marko
    Hypponen, Konstantin
    Haataja, Keijo
    EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 2006, 3995 : 86 - 100
  • [5] Design and Implementation of PKI-based Certification Authority
    Zheng Ying
    Bai Qinghai
    Zhao Linna
    Chun Hua
    Chen Jing
    SIXTH INTERNATIONAL CONFERENCE ON ELECTRONICS AND INFORMATION ENGINEERING, 2015, 9794
  • [6] A PKI-based secure audit web service
    Xu, Wensheng
    Chadwick, David
    Otenko, Sassa
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORK, AND INFORMATION SECURITY, 2005, : 106 - 110
  • [7] PKI-Based authentication mechanisms in grid systems
    Zhao, Shushan
    Aggarwal, Akshai
    Kent, Robert D.
    INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, PROCEEDINGS, 2007, : 83 - +
  • [8] Computationally efficient PKI-Based single sign-on protocol PKASSO for mobile devices
    Park, Ki-Woong
    Lim, Sang Seok
    Park, Kyu Ho
    IEEE TRANSACTIONS ON COMPUTERS, 2008, 57 (06) : 821 - 834
  • [9] Mobile PKI: A PKI-based authentication ftamework for the next generation mobile communications
    Gu, JB
    Park, S
    Song, O
    Lee, J
    Nah, JH
    Sohn, SW
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2003, 2727 : 180 - 191
  • [10] Design of PKI-based mobile bank security system
    Yin Can-ju
    Wei Zu-kuan
    ASGIS 2007: 5TH ASIAN SYMPOSIUM ON GEOGRAPHIC INFORMATION SYSTEMS, 2007, : 381 - 385