Removing Erasures with Explainable Hash Proof Systems
نویسندگان
چکیده
An important problem in secure multi-party computation is the design of protocols that can tolerate adversaries that are capable of corrupting parties dynamically and learning their internal states. In this paper, we make significant progress in this area in the context of password-authenticated key exchange (PAKE) and oblivious transfer (OT) protocols. More precisely, we first revisit the notion of projective hash proofs and introduce a new feature that allows us to explain any message sent by the simulator in case of corruption, hence the notion of Explainable Projective Hashing. Next, we demonstrate that this new tool generically leads to efficient PAKE and OT protocols that are secure against semi-adaptive adversaries without erasures in the Universal Composability (UC) framework. We then show how to make these protocols secure even against adaptive adversaries, using non-committing encryption, in a much more efficient way than generic conversions from semi-adaptive to adaptive security. Finally, we provide concrete instantiations of explainable projective hash functions that lead to the most efficient PAKE and OT protocols known so far, with UC-security against adaptive adversaries, with or without erasures, in the single global CRS setting. As an important side contribution, we also propose a new commitment scheme based on DDH, which leads to the construction of the first one-round PAKE adaptively secure under plain DDH without pairing, assuming reliable erasures, and also improves previous constructions of OT and twoor three-round PAKE schemes.
منابع مشابه
An Efficient Multiple-Errors and Multiple-Erasures Decoding Algorithm for Multitrack Magnetic Recording Channels
This paper presents a simple and practical error control mechanism that allows multiple-errors and multiple-erasures correction for multitrack magnetic recording systems. The proposed mechanism is based on using a simple and fast hash function to locate erroneous tracks in magnetic tape and exploit the MDS property of array codes to correct these tracks as erasures. The mechanism enables MDS ar...
متن کاملEfficient Password Authenticated Key Exchange via Oblivious Transfer
We present a new framework for constructing efficient password authenticated key exchange (PAKE) protocols based on oblivious transfer (OT). Using this framework, we obtain: – an efficient and simple UC-secure PAKE protocol that is secure against adaptive corruptions without erasures. – efficient and simple PAKE protocols under the Computational DiffieHellman (CDH) assumption and the hardness o...
متن کاملروندهای فصلی و الگوهای قابل توجیه در دادههای کشوری نظام مراقبت بیماری سرخک: رویکردهای شناسایی و حذف
Background & Objectives: Knowledge of the presence of seasonal trends and other explainable patterns in the prediagnostic data sources and removing such patterns before applying outbreak detection methods seem very important. This study aimed to detect and remove the explainable patterns such as seasonality, day-of-week (DOW) and holiday effects of the daily counts of suspected cases of measles...
متن کاملThe case for generating URIs by hashing RDF content
In this paper we argue for using hashed URIs to represent RDF content. These URIs are generated by serializing the RDF facts which describe an Object, computing the hash of that serialization, and then using the computed hash as the Object’s URI. In this way, the hashed URI serves both as a short-hand notation for all the facts which describe it and as proof that the facts have not changed. Thi...
متن کاملSmooth Projective Hashing for Conditionally Extractable Commitments
The notion of smooth projective hash functions was proposed by Cramer and Shoup and can be seen as special type of zero-knowledge proof system for a language. Though originally used as a means to build efficient chosen-ciphertext secure public-key encryption schemes, some variations of the Cramer-Shoup smooth projective hash functions also found applications in several other contexts, such as p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2014 شماره
صفحات -
تاریخ انتشار 2014