A PKI-based Framework for Establishing Efficient MPC Channels

被引:1
|
作者
Masny, Daniel [1 ]
Watson, Gaven [1 ]
机构
[1] VISA Res, Palo Alto, CA 94306 USA
关键词
MPC; PKI; Oblivious Transfer; Authentication; UC; UNIVERSALLY COMPOSABLE SECURITY; OBLIVIOUS TRANSFER;
D O I
10.1145/3460120.3484806
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Transport Layer Security (TLS) protocol is a fundamental building block for ensuring security on Internet. It provides an easy to use framework for the purposes of establishing an authenticated and secure channel between two parties that have never physically met. Nevertheless, TLS only provides a simple cryptographic functionality compared to more advanced protocols such as protocols for secure multiparty computation (MPC). In this work, we provide a framework for efficiently establishing channels for MPC over the Internet. We focus on MPC protocols in the oblivious transfer (OT) hybrid model such that it is sufficient to establish OT correlations for such a channel. We revisit and combine different notions of UC security proposed in both the MPC and authenticated key exchange settings. Through this work, we show how an OT protocol can be composed with a secure authenticator to ensure the authenticity of messages sent during the OT. In addition, we adapt and analyse non-interactive OTs based on dense key encapsulation mechanisms (KEMs) in the random oracle model, where the first message, i.e. public key, can be reused. These KEMs can be instantiated based on CDH, RSA and LWE and after a performance and security evaluation, it turns out that the resulting OT protocols are very competitive with the state of the art and are able to leverage existing PKIs.
引用
收藏
页码:1961 / 1980
页数:20
相关论文
共 50 条
  • [21] PKI-based mutual connections constrained with discrepancy of trust domains
    Zhu, Pengfei
    Dai, Yingxia
    Bao, Xuhua
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2006, 43 (10): : 1804 - 1809
  • [22] Extending BAN Logic for Reasoning with Modern PKI-based Protocols
    Sufatrio
    Yap, Roland H. C.
    2008 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2008, : 190 - +
  • [23] PKI-based trust management in inter-domain scenarios
    Lopez Millan, Gabriel
    Gil Perez, Manuel
    Martinez Perez, Gregorio
    Gomez Skarmeta, Antonio F.
    COMPUTERS & SECURITY, 2010, 29 (02) : 278 - 290
  • [24] Design on PKI-Based Anonymous Mobile Agent Security in E-Commerce
    MENG Xiangsong
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1907 - 1910
  • [25] Readers Behaving Badly Reader Revocation in PKI-Based RFID Systems
    Nithyanand, Rishab
    Tsudik, Gene
    Uzun, Ersin
    COMPUTER SECURITY-ESORICS 2010, 2010, 6345 : 19 - 36
  • [26] Design and implementation of a PKI-based electronic documents protection management system
    Liu, Jin-Bao
    Hu, Xian-Qing
    Li, Qiong
    Niu, Xia-Mu
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 87 - +
  • [27] A Forward Secure PKI-based UMTS-AKA with Tunneling Authentication
    Aminmoghadam, Emad
    Mirghadri, Abdolrasol
    2015 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION, NETWORKING, AND WIRELESS COMMUNICATIONS (DINWC), 2015, : 55 - 60
  • [28] A probabilistic model for evaluating the operational cost of PKI-based financial transactions
    Platis, A
    Lambrinoudakis, C
    Leros, A
    PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2004, 3093 : 149 - 159
  • [29] Performance of PKI-based security mechanisms in mobile ad hoc networks
    Schwingenschlögl, C
    Eichler, S
    Müller-Rathgeber, B
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2006, 60 (01) : 20 - 24
  • [30] PKI-Based Security Enhancement for IoT in 5G Networks
    Khan, Nayeem Ahmad
    INVENTIVE COMPUTATION AND INFORMATION TECHNOLOGIES, ICICIT 2021, 2022, 336 : 217 - 225