Optimal-Rate Non-Committing Encryption in a CRS Model

نویسندگان

  • Ran Canetti
  • Oxana Poburinnaya
  • Mariana Raykova
چکیده

Non-committing encryption (NCE) implements secure channels under adaptive corruptions in situations when data erasures are not trustworthy. In this paper we are interested in the rate of NCE, i.e. in how many bits the sender and receiver need to send per plaintext bit. In initial constructions (e.g. Canetti, Feige, Goldreich and Naor, STOC 96) the length of both the receiver message, namely the public key, and the sender message, namely the ciphertext, is m · poly(λ) for an m-bit message, where λ is the security parameter. Subsequent works improve efficiency significantly, achieving rate poly log(λ). We construct the first constant-rate NCE. In fact, our scheme has rate 1+ o(1), which is comparable to the rate of plain semantically secure encryption. Our scheme operates in the common reference string (CRS) model. Our CRS has size poly(m · λ), but it is reusable for an arbitrary polynomial number of m-bit messages. In addition, it is the first NCE protocol with perfect correctness. We assume one way functions and indistinguishability obfuscation for circuits. As an essential step in our construction, we develop a technique for dealing with adversaries that modify the inputs to the protocol adaptively depending on a public key or CRS that contains obfuscated programs, while assuming only standard (polynomial) hardness of the obfuscation mechanism. This technique may well be useful elsewhere. ∗This work was done [in part] while the authors were visiting the Simons Institute for the Theory of Computing, supported by the Simons Foundation and by the DIMACS/Simons Collaboration in Cryptography through NSF grant #CNS-1523467. †Tel-Aviv University and Boston University. [email protected]. Supported in addition by the Check Point Institute for Information Security and NSF Algorithmic Foundations grant 1218461, NSF grant 1421102. ‡Boston University. [email protected]. Supported in addition by the Check Point Institute for Information Security and NSF Algorithmic Foundations grant 1218461, NSF grant 1421102. §SRI, Yale University. [email protected]. Supported by NSF grant 1421102

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Adaptively Secure Multiparty Computation with a Short CRS

In the setting of multiparty computation, a set of mutually distrusting parties wish to securely compute a joint function of their private inputs. A protocol is adaptively secure if honest parties might get corrupted after the protocol has started. Recently (TCC 2015) three constant-round adaptively secure protocols were presented [CGP15, DKR15, GP15]. All three constructions assume that the pa...

متن کامل

Non-Committing Encryption is Too Easy in the Random Oracle Model

The non-committing encryption problem arises in the setting of adaptively secure cryptographic protocols, as the task of implementing secure channels. We prove that in the random oracle model, where the parties have oracle access to a uniformly random function, non-committing encryption can be implemented efficiently using any trapdoor permutation. We also prove that no matter how the oracle is...

متن کامل

Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case

We show that there exists a natural protocol problem which has a simple solution in the random-oracle (RO) model and which has no solution in the complexity-theoretic (CT) model, namely the problem of constructing a non-interactive communication protocol secure against adaptive adversaries a.k.a. non-interactive non-committing encryption. This separation between the models is due to the so-call...

متن کامل

Improved Non-committing Encryption Schemes Based on a General Complexity Assumption

Non-committing encryption enables the construction of multiparty com-putation protocols secure against an adaptive adversary in the computationalsetting where private channels between players are not assumed. While anynon-committing encryption scheme must be secure in the ordinary seman-tic sense, the converse is not necessarily true. We propose a constructionof non-committi...

متن کامل

Committing Encryption and Publicly-Verifiable SignCryption

Encryption is often conceived as a committing process, in the sense that the ciphertext may serve as a commitment to the plaintext. But this does not follow from the standard definitions of secure encryption. We define and construct symmetric and asymmetric committing encryption schemes, enabling publicly verifiable non-repudiation. Committing encryption eliminates key-spoofing attacks and has ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2016  شماره 

صفحات  -

تاریخ انتشار 2016