Algebraic Adversaries in the Universal Composability Framework
نویسندگان
چکیده
The algebraic-group model (AGM), which lies between the generic group and standard of computation, provides a means by to analyze security cryptosystems against so-called algebraic adversaries. We formalize AGM within framework universal composability, providing formal definitions for this setting proving an appropriate composition theorem. This extends applicability more-complex protocols, lays foundations analyzing adversaries in composable fashion. Our results also clarify meaning composing proofs with other they highlight natural form independence idealized groups that seems inherent has not been made before—these insights apply game-based AGM. show utility our several important protocols universally adversaries, specifically: (1) Chou-Orlandi protocol oblivious transfer, (2) SPAKE2 CPace password-based authenticated key exchange.
منابع مشابه
Error-Free Message Transmission in the Universal Composability Framework
This thesis introduces models for error-prone communication channels and functionalities for error-free communication in the Universal Composability framework. Realizing these functionalities enables protocols to make use of cryptographic errorcorrecting schemes which are more powerful than classical codes. First, we define new ideal functionalities TrCLOSE and FCWT to model error-prone communi...
متن کاملEvaluating Security of Voting Schemes in the Universal Composability Framework
In the literature, voting protocols are considered secure if they satisfy requirements such as privacy, accuracy, robustness, etc. It can be time consuming to evaluate a voting protocol with respect to all these requirements and it is not clear that the list of known requirements is complete. Perhaps because of this many papers on electronic voting do not offer any security proof at all. As a s...
متن کاملAdaptive Universal Composability Framework for Server-Aided Threshold Signature
The threshold signature scheme is a protocol that allows any subset of t parties out of n to generate a signature. Since the t members can cooperate together to compute the secret key, we introduce the server-aided threshold signature, which provides controllability for activating the signing function in a certain enhanced way. In this study, we present a server-aided threshold RSA signature pr...
متن کاملLecture 3,4: Universal Composability
3 Proof of the Composition Theorem Let A be any B-limited adversary that interacts with protocol QP in the real-life model. Our goal is to construct a B-limited adversary H that interacts with protocol Q in the f -hybrid model, such that no environment Z can tell the difference between the two interactions. We will construct H via the following three steps. 1. From A we construct an adversary A...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2021
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-030-92078-4_11