46 research outputs found

    Nonmalleable Digital Lockers and Robust Fuzzy Extractors in the Plain Model

    Get PDF
    We give the first constructions in the plain model of 1) nonmalleable digital lockers (Canetti and Varia, TCC 2009) and 2) robust fuzzy extractors (Boyen et al., Eurocrypt 2005) that secure sources with entropy below 1/2 of their length. Constructions were previously only known for both primitives assuming random oracles or a common reference string (CRS). Along the way, we define a new primitive called a nonmalleable point function obfuscation with associated data. The associated data is public but protected from all tampering. We use the same paradigm to then extend this to digital lockers. Our constructions achieve nonmalleability over the output point by placing a CRS into the associated data and using an appropriate non-interactive zero-knowledge proof. Tampering is protected against the input point over low-degree polynomials and over any tampering to the output point and associated data. Our constructions achieve virtual black box security. These constructions are then used to create robust fuzzy extractors that can support low-entropy sources in the plain model. By using the geometric structure of a syndrome secure sketch (Dodis et al., SIAM Journal on Computing 2008), the adversary’s tampering function can always be expressed as a low-degree polynomial; thus, the protection provided by the constructed nonmalleable objects suffices

    Same Point Composable and Nonmalleable Obfuscated Point Functions

    Get PDF
    A point obfuscator is an obfuscated program that indicates if a user enters a previously stored password. A digital locker is stronger: outputting a key if a user enters a previously stored password. The real-or-random transform allows one to build a digital locker from a composable point obfuscator (Canetti and Dakdouk, Eurocrypt 2008). Ideally, both objects would be nonmalleable, detecting adversarial tampering. Appending a non-interactive zero knowledge proof of knowledge adds nonmalleability in the common random string (CRS) model. Komargodski and Yogev (Eurocrypt, 2018) built a nonmalleable point obfuscator without a CRS. We show a lemma in their proof is false, leaving security of their construction unclear. Bartusek, Ma, and Zhandry (Crypto, 2019) used similar techniques and introduced another nonmalleable point function; their obfuscator is not secure if the same point is obfuscated twice. Thus, there was no composable and nonmalleable point function to instantiate the real-or-random construction. Our primary contribution is a nonmalleable point obfuscator that can be composed any polynomial number of times with the same point (which must be known ahead of time). Security relies on the assumption used in Bartusek, Ma, and Zhandry. This construction enables a digital locker that is nonmalleable with respect to the input password. As a secondary contribution, we introduce a key encoding step to detect tampering on the key. This step combines nonmalleable codes and seed-dependent condensers. The seed for the condenser must be public and not tampered, so this can be achieved in the CRS model. The password distribution may depend on the condenser’s seed as long as it is efficiently sampleable. This construction is black box in the underlying point obfuscation. Nonmalleability for the password is ensured for functions that can be represented as low degree polynomials. Key nonmalleability is inherited from the class of functions prevented by the nonmalleable code

    Irreversible Investment and Optimal Fisheries Management: A Stochastic Analysis

    Get PDF
    In recent years, attention has been devoted to fishery management problems that arise because capital embodied in fishing fleets is often nonmalleable. having few if any alternative uses. This problem of irreversible investment was analyzed by Clark et al. (1979), using a deterministic model. In reality, however, most investment decisions must be made within an uncertain environment. This paper describes recent efforts to account for uncertainty in analyzing the problem of optimal fishery investment, where the uncertainty is caused by stochastic variability in the resource stock from year to year.Environmental Economics and Policy, International Development, Resource /Energy Economics and Policy, Risk and Uncertainty,

    Derby Fisheries, Individual Quotas, and Transition in the Fish Processing Industry

    Get PDF
    Processors adapt to the pulse of landings in derby fisheries by investing in large-scale facilities capable of preserving and storing fish products. In fisheries where the pulse of landings suppresses the ability of processors to meet consumer demand for fresh product, the imposition of individual quota (IQ) systems transforms the associated fish processing industry. The cost of fresh fish processing is generally lower and more malleable than that for preserved fish, and consumers may pay a price premium for fresh product, which creates an opportunity for entry by fresh-fish processors and results in higher equilibrium ex-vessel prices. Incumbent firms are likely to experience an economic dislocation due to a diminished value of nonmalleable capital used to preserve and store fish products. Our paper generalizes and provides a modeling framework for the observed changes in the British Columbian halibut harvester/processor industry complex following the introduction of an IQ system.Derby fishery, individual quotas, pulse of landings, fish processing, fresh fish, preserved fish, product forms, ex-vessel price, wholesale fish price, processing capital, malleability, Resource /Energy Economics and Policy, Q13, Q22,

    A Survey of Homomorphic Encryption for Nonspecialists

    Get PDF

    Concurrent-Secure Two-Party Computation in Two Rounds from Subexponential LWE

    Get PDF
    Very recently, two works were able to construct two-round secure multi-party computation (MPC) protocols in the plain model, without setup, relying on the superpolynomial simulation framework of Pass [Pas03]. The first work [ABG+21] achieves this relying on subexponential non-interactive witness indistinguishable arguments, the subexponential SXDH assumption, and the existence of a special type of non-interactive non-malleable commitment. The second work [FJK21] additionally achieves concurrent security, and relies on subexponential quantum hardness of the learning-with-errors (LWE) problem, subexponential classical hardness of SXDH, the existence of a subexponentially-secure (classically-hard) indistinguishablity obfuscation (iO) scheme, and time-lock puzzles. This paper focuses on the assumptions necessary to construct secure computation protocols in two rounds without setup, focusing on the subcase of two-party functionalities. In this particular case, we show how to build a two-round, concurrent-secure, two-party computation (2PC) protocol based on a single, standard, post-quantum assumption, namely subexponential hardness of the learning-with-errors (LWE) problem. We note that our protocol is the first two-round concurrent-secure 2PC protocol that does not require the existence of a one-round non-malleable commitment (NMC). Instead, we are able to use the two-round NMCs of [KS17a], which is instantiable from subexponential LWE

    A Review of Authentication Protocols

    Get PDF
    Authentication is a process that ensures and confirms a users identity. Authorization is the process of giving someone permissions to do or have something. There are different types of authentication methods such as local password authentication, server-based-password authentication, certificate-based authentication, two-factor authentication etc. Authentication protocol developed for Password Authentication Protocol (PAP), Challenge-Handshake Authentication Protocol (CHAP), and Extensible Authentication Protocol (EAP). There are different types of application for authentications are as follows: 1.protocols developed for PPP Point-to-Point Protocol 2. Authentication, Authorization and Accounting 3.Kerberos

    How can genetically-informed research help inform the next generation of interparental and parenting interventions?

    Get PDF
    There is robust evidence that the interparental relationship and parenting behaviors each have a significant influence on children's risk for emotional (internalizing) and behavioral (externalizing) problems. Indeed, interventions targeting the interparental relationship and parenting processes show significant intervention-related reductions in child internalizing and externalizing problems. However, most evidence-based parenting- and couple-focused interventions result in small to medium effects on children's emotional and behavior problems. It is proposed that there is opportunity to improve upon these interventions through incorporation of knowledge from quantitative genetic research. Three core recommendations are provided for practitioners engaging in intervention work with children and families. These recommendations are contextualized relative to what quantitative genetic studies can tell us about the role of the interparental relationship and parenting behaviors on child outcomes
    corecore