SPHF-Friendly Non-interactive Commitments
2013, Lecture Notes in Computer Science
https://doi.org/10.1007/978-3-642-42033-7_12Abstract
In 2009, Abdalla et al. proposed a reasonably practical password-authenticated key exchange (PAKE) secure against adaptive adversaries in the universal composability (UC) framework. It exploited the Canetti-Fischlin methodology for commitments and the Cramer-Shoup smooth projective hash functions (SPHFs), following the Gennaro-Lindell approach for PAKE. In this paper, we revisit the notion of non-interactive commitments, with a new formalism that implies UC security. In addition, we provide a quite efficient instantiation. We then extend our formalism to SPHF-friendly commitments. We thereafter show that it allows a blackbox application to one-round PAKE and oblivious transfer (OT), still secure in the UC framework against adaptive adversaries, assuming reliable erasures and a single global common reference string, even for multiple sessions. Our instantiations are more efficient than the Abdalla et al. PAKE in Crypto 2009 and the recent OT protocol proposed by Choi et al. in PKC 2013. Furthermore, the new PAKE instantiation is the first one-round scheme achieving UC security against adaptive adversaries.
References (40)
- Abdalla, M., Benhamouda, F., Blazy, O., Chevalier, C., Pointcheval, D.: SPHF- friendly non-interactive commitments. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013
- Part I. LNCS, vol. 8269, pp. 214-234. Springer, Heidelberg (2013), Full version available on the Cryptology ePrint Archive as Report 2013/588
- Abdalla, M., Chevalier, C., Pointcheval, D.: Smooth projective hashing for con- ditionally extractable commitments. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 671-689. Springer, Heidelberg (2009)
- Barak, B., Canetti, R., Lindell, Y., Pass, R., Rabin, T.: Secure computation without authentication. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 361-377.
- Springer, Heidelberg (2005)
- Beaver, D.: Adaptive zero knowledge and computational equivocation (extended abstract). In: 28th ACM STOC, pp. 629-638. ACM Press (May 1996)
- Bellovin, S.M., Merritt, M.: Encrypted key exchange: Password-based protocols se- cure against dictionary attacks. In: 1992 IEEE Symposium on Security and Privacy, pp. 72-84. IEEE Computer Society Press (May 1992)
- Benhamouda, F., Blazy, O., Chevalier, C., Pointcheval, D., Vergnaud, D.: New techniques for SPHFs and efficient one-round PAKE protocols. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 449-475. Springer, Heidelberg (2013); full version available on the Cryptology ePrint Archive as re- ports 2013/034 and 2013/341
- Blazy, O., Pointcheval, D., Vergnaud, D.: Round-optimal privacy-preserving proto- cols with smooth projective hash functions. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 94-111. Springer, Heidelberg (2012)
- Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: 42nd FOCS, pp. 136-145. IEEE Computer Society Press (October 2001)
- Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. Cryptology ePrint Archive, Report 2000/067 (2005), http://eprint.iacr.org/
- Canetti, R., Fischlin, M.: Universally composable commitments. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 19-40. Springer, Heidelberg (2001)
- Canetti, R., Halevi, S., Katz, J., Lindell, Y., MacKenzie, P.: Universally composable password-based key exchange. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 404-421. Springer, Heidelberg (2005)
- Canetti, R., Krawczyk, H.: Universally composable notions of key exchange and secure channels. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 337-351. Springer, Heidelberg (2002)
- Canetti, R., Lindell, Y., Ostrovsky, R., Sahai, A.: Universally composable two- party and multi-party secure computation. In: 34th ACM STOC, pp. 494-503. ACM Press (May 2002)
- Canetti, R., Rabin, T.: Universal composition with joint state. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 265-281. Springer, Heidelberg (2003)
- Choi, S.G., Katz, J., Wee, H., Zhou, H.-S.: Efficient, adaptively secure, and com- posable oblivious transfer with a single, global CRS. In: Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. LNCS, vol. 7778, pp. 73-88. Springer, Heidelberg (2013)
- Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13-25. Springer, Heidelberg (1998)
- Canetti, R., Krawczyk, H.: Universally composable notions of key exchange and secure channels. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45-64. Springer, Heidelberg (2002)
- Dolev, D., Dwork, C., Naor, M.: Nonmalleable cryptography. SIAM Journal on Computing 30(2), 391-437 (2000)
- Fischlin, M., Libert, B., Manulis, M.: Non-interactive and re-usable universally composable string commitments with adaptive security. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 468-485. Springer, Heidelberg (2011)
- Gennaro, R., Lindell, Y.: A framework for password-based authenticated key ex- change. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 524-543.
- Springer, Heidelberg (2003), http://eprint.iacr.org/2003/032.ps.gz
- Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game, or a completeness theorem for protocols with honest majority. In: Aho, A. (ed.) 19th ACM STOC, pp. 218-229. ACM Press (May 1987)
- Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their va- lidity or all languages in NP have zero-knowledge proof systems. Journal of the ACM 38(3), 691-729 (1991)
- Groth, J., Sahai, A.: Efficient non-interactive proof systems for bilinear groups. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415-432. Springer, Heidelberg (2008)
- Haralambiev, K.: Efficient Cryptographic Primitives for Non-Interactive Zero- Knowledge Proofs and Applications. Ph.D. thesis, New York University (2011)
- Hofheinz, D., Müller-Quade, J.: Universally composable commitments using ran- dom oracles. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 58-76. Springer, Heidelberg (2004)
- Horvitz, O., Katz, J.: Universally-composable two-party computation in two rounds. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 111-129.
- Springer, Heidelberg (2007)
- Kalai, Y.T.: Smooth projective hashing and two-message oblivious transfer. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 78-95. Springer, Hei- delberg (2005)
- Katz, J.: Universally composable multi-party computation using tamper-proof hardware. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 115-128.
- Springer, Heidelberg (2007)
- Katz, J., Ostrovsky, R., Yung, M.: Efficient password-authenticated key exchange using human-memorable passwords. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 475-494. Springer, Heidelberg (2001)
- Katz, J., Vaikuntanathan, V.: Round-optimal password-based authenticated key exchange. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 293-310. Springer, Heidelberg (2011)
- Naor, M., Pinkas, B.: Efficient oblivious transfer protocols. In: 12th SODA, pp. 448-457. ACM-SIAM (January 2001)
- Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129-140.
- Springer, Heidelberg (1992)
- Peikert, C., Vaikuntanathan, V., Waters, B.: A framework for efficient and com- posable oblivious transfer. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 554-571. Springer, Heidelberg (2008)
- Rabin, M.O.: How to exchange secrets with oblivious transfer. Technical Report TR81, Harvard University (1981)