On the (In)security of Fischlin's Paradigm
نویسندگان
چکیده
The Fiat-Shamir paradigm was proposed as a way to remove interaction from 3-round proof of knowledge protocols and derive secure signature schemes. This generic transformation leads to very efficient schemes and has thus grown quite popular. However, this transformation is proven secure only in the random oracle model. In FOCS 2003, Goldwasser and Kalai showed that this transformation is provably insecure in the standard model by presenting a counterexample of a 3-round protocol, the Fiat-Shamir transformation of which is (although provably secure in the random oracle model) insecure in the standard model, thus showing that the random oracle is uninstantiable. In particular, for every hash function that is used to replace the random oracle, the resulting signature scheme is existentially forgeable. This result was shown by relying on the non-black-box techniques of Barak (FOCS 2001). An alternative to the Fiat-Shamir paradigm was proposed by Fischlin in Crypto 2005. Fischlin’s transformation can be applied to any so called 3-round “Fiat-Shamir proof of knowledge’’ and can be used to derive non-interactive zero-knowledge proofs of knowledge as well as signature schemes. An attractive property of this transformation is that it provides online extractability (i.e., the extractor works without having to rewind the prover). Fischlin remarks that in comparison to the Fiat-Shamir transformation, his construction tries to “decouple the hash function from the protocol flow” and hence, the counterexample in the work of Goldwaaser and Kalai does not seem to carry over to this setting. In this work, we show a counterexample to the Fischlin’s transformation. In particular, we construct a 3-round Fiat-Shamir proof of knowledge (on which Fischlin’s transformation is applicable), and then, present an adversary against both the soundness of the resulting non-interactive zero-knowledge, as well as the unforegeability of the resulting signature scheme. Our attacks are successful except with negligible probability for any hash function, that is used to instantiate the random oracle, provided that there is an apriori (polynomial) bound on the running time of the hash function. By choosing the right bound, secure instantiation of Fischlin transformation with most practical cryptographic hash functions can be ruled out. The techniques used in our work are quite unrelated to the ones used in the work of Goldwasser and Kalai. Our primary technique is to bind the protocol flow with the hash function if the code of the hash function is available. We believe that our ideas are of independent interest and maybe applicable in other related settings.
منابع مشابه
Multifunctional Agriculture: Agriculture Renewal as a Modern Paradigm for Agriculture and Rural Development
Multifunctional agriculture (MFA) has emerged as a key concept in science and politics with respect to the future of agriculture and rural development in the recent decade. Overall, MFA implies that in addition to their main function in production and support of rural livelihood, the agricultural activities have some other advantages for the environment including the conservation of water and s...
متن کاملDeveloping a grounded-based model of tranquility in contemporary apartments in Urmia City
Introduction: Stressful life and lack of tranquility in modern society, have been serious problems for human life. Environmental psychology has shown that physical and architectural environments play an important role in this, and since the home is one of the most important environments, they try to offer solutions. This study tries to identify the factors that play an effective role in creatin...
متن کاملPrivacy and Security of Big Data in THE Cloud
Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...
متن کاملPrivacy and Security of Big Data in THE Cloud
Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...
متن کاملبررسی اثر TOM و اثر نیمه اول و دوم هر ماه بر روی بازدهی و حجم معاملات در بورس اوراق بهادار تهران
Several anomalies have been documented indicating that capital markets do not behave as rational as “modern portfolio theory” states in other words a set of emotional, psychological and irrational behaviors are common in capital markets. Several tests have been conducted to address this issue. A large number of these tests have justified the effect of behavioral factors on securities prices. On...
متن کاملIdentifying and designing a complementary sustainable livelihood approach in rural areas of Afghanistan Case: Andar district in Ghazni province
Introduction The world’s population has been growing rapidly in recent decades, and statistics show that most of the added population belongs to development countries. The majority of this population live in rural areas which has an unfavorable standard of living and livelihood compared to international standard. The basis of human and economic development is based on livelihood; livelihoods i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2012 شماره
صفحات -
تاریخ انتشار 2012