138 research outputs found
The chaining lemma and its application
We present a new information-theoretic result which we call the Chaining Lemma. It considers a so-called “chain” of random variables, defined by a source distribution X(0)with high min-entropy and a number (say, t in total) of arbitrary functions (T1,…, Tt) which are applied in succession to that source to generate the chain (Formula presented). Intuitively, the Chaining Lemma guarantees that, if the chain is not too long, then either (i) the entire chain is “highly random”, in that every variable has high min-entropy; or (ii) it is possible to find a point j (1 ≤ j ≤ t) in the chain such that, conditioned on the end of the chain i.e. (Formula presented), the preceding part (Formula presented) remains highly random. We think this is an interesting information-theoretic result which is intuitive but nevertheless requires rigorous case-analysis to prove. We believe that the above lemma will find applications in cryptography. We give an example of this, namely we show an application of the lemma to protect essentially any cryptographic scheme against memory tampering attacks. We allow several tampering requests, the tampering functions can be arbitrary, however, they must be chosen from a bounded size set of functions that is fixed a prior
Privacy-Preserving Trust Management Mechanisms from Private Matching Schemes
Cryptographic primitives are essential for constructing privacy-preserving
communication mechanisms. There are situations in which two parties that do not
know each other need to exchange sensitive information on the Internet. Trust
management mechanisms make use of digital credentials and certificates in order
to establish trust among these strangers. We address the problem of choosing
which credentials are exchanged. During this process, each party should learn
no information about the preferences of the other party other than strictly
required for trust establishment. We present a method to reach an agreement on
the credentials to be exchanged that preserves the privacy of the parties. Our
method is based on secure two-party computation protocols for set intersection.
Namely, it is constructed from private matching schemes.Comment: The material in this paper will be presented in part at the 8th DPM
International Workshop on Data Privacy Management (DPM 2013
Estimating Gaps in Martingales and Applications to Coin-Tossing: Constructions and Hardness
Consider designing a distributed coin-tossing protocol for n processors such
that the probability of heads is X0 in [0,1], and an adversary can reset one
processor to change the distribution of the final outcome. For X0=1/2, in the
non-cryptographic setting, Blum's majority protocol is
insecure. For computationally bounded adversaries and any X0 in [0,1], the
protocol of Moran,Naor,Segev (2009) is only O(1/n) insecure. In this paper, we
study discrete-time martingales (X0,X1,..,Xn) such that Xi in [0,1], for all i
in {0,..,n}, and Xn in {0,1}. In particular, for any X0 in [0,1], we construct
martingales that yield insecure
coin-tossing protocols with n-bit communication; irrespective of the number of
bits required to represent the output distribution. Note that for sufficiently
small X0, we achieve higher security than Moran et al's protocol even against
computationally unbounded adversaries. For X0=1/2, our protocol requires only
40% of the processors to obtain the same security as the majority protocol. We
introduce a new inductive technique that uses geometric transformations to
estimate the large gaps in these martingales. For any X0 in [0,1], we show that
there exists a stopping time such that
. The
inductive technique also constructs martingales that demonstrate the optimality
of our bound - we construct optimal martingales such that any
has. Our
lower-bound holds for all X0 in [0,1]; while the previous bound of
Cleve,Impagliazzo (1993) exists only for positive constant X0. Our approach
only employs elementary techniques and avoids the complex probabilistic tools
inherent to the approaches of Cleve,Impagliazzo (1993) and
Beimel,Haitner,Makriyannis,Omri (2018)
Non-malleable codes for space-bounded tampering
Non-malleable codes—introduced by Dziembowski, Pietrzak and Wichs at ICS 2010—are key-less coding schemes in which mauling attempts to an encoding of a given message, w.r.t. some class of tampering adversaries, result in a decoded value that is either identical or unrelated to the original message. Such codes are very useful for protecting arbitrary cryptographic primitives against tampering attacks against the memory. Clearly, non-malleability is hopeless if the class of tampering adversaries includes the decoding and encoding algorithm. To circumvent this obstacle, the majority of past research focused on designing non-malleable codes for various tampering classes, albeit assuming that the adversary is unable to decode. Nonetheless, in many concrete settings, this assumption is not realistic
Reversible Proofs of Sequential Work
Proofs of sequential work (PoSW) are proof systems where a prover, upon receiving a statement and a time parameter computes a proof which is efficiently and publicly verifiable. The proof can be computed in sequential steps, but not much less, even by a malicious party having large parallelism. A PoSW thus serves as a proof that units of time have passed since was received.
PoSW were introduced by Mahmoody, Moran and Vadhan [MMV11], a simple and practical construction
was only recently proposed by Cohen and Pietrzak [CP18].
In this work we construct a new simple PoSW in the random permutation model which is almost as simple and efficient as [CP18] but conceptually very different.
Whereas the structure underlying [CP18] is a hash tree, our construction is based on skip lists and
has the interesting property that computing the PoSW is a reversible computation.
The fact that the construction is reversible can potentially be used for new applications like constructing \emph{proofs of replication}. We also show how to ``embed the sloth function of Lenstra and Weselowski [LW17] into our PoSW to get a PoSW where one additionally can verify correctness of the output much more efficiently than recomputing it (though recent constructions of ``verifiable delay functions subsume most of the applications this construction was aiming at)
Reversible Proofs of Sequential Work
Proofs of sequential work (PoSW) are proof systems where a prover, upon receiving a statement and a time parameter computes a proof which is efficiently and publicly verifiable. The proof can be computed in sequential steps, but not much less, even by a malicious party having large parallelism. A PoSW thus serves as a proof that units of time have passed since was received.
PoSW were introduced by Mahmoody, Moran and Vadhan [MMV11], a simple and practical construction
was only recently proposed by Cohen and Pietrzak [CP18].
In this work we construct a new simple PoSW in the random permutation model which is almost as simple and efficient as [CP18] but conceptually very different.
Whereas the structure underlying [CP18] is a hash tree, our construction is based on skip lists and
has the interesting property that computing the PoSW is a reversible computation.
The fact that the construction is reversible can potentially be used for new applications like constructing \emph{proofs of replication}. We also show how to ``embed the sloth function of Lenstra and Weselowski [LW17] into our PoSW to get a PoSW where one additionally can verify correctness of the output much more efficiently than recomputing it (though recent constructions of ``verifiable delay functions subsume most of the applications this construction was aiming at)
Reversible Proofs of Sequential Work
Proofs of sequential work (PoSW) are proof systems where a prover, upon receiving a statement and a time parameter computes a proof which is efficiently and publicly verifiable. The proof can be computed in sequential steps, but not much less, even by a malicious party having large parallelism. A PoSW thus serves as a proof that units of time have passed since was received.
PoSW were introduced by Mahmoody, Moran and Vadhan [MMV11], a simple and practical construction
was only recently proposed by Cohen and Pietrzak [CP18].
In this work we construct a new simple PoSW in the random permutation model which is almost as simple and efficient as [CP18] but conceptually very different.
Whereas the structure underlying [CP18] is a hash tree, our construction is based on skip lists and
has the interesting property that computing the PoSW is a reversible computation.
The fact that the construction is reversible can potentially be used for new applications like constructing \emph{proofs of replication}. We also show how to ``embed the sloth function of Lenstra and Weselowski [LW17] into our PoSW to get a PoSW where one additionally can verify correctness of the output much more efficiently than recomputing it (though recent constructions of ``verifiable delay functions subsume most of the applications this construction was aiming at)
Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious
An -fair coin-tossing protocol allows a set of mutually distrustful
parties to generate a uniform bit, such that no efficient adversary can bias
the output bit by more than . Cleve [STOC 1986] has shown that if half
of the parties can be corrupted, then, no -round coin-tossing protocol is
-fair. For over two decades the best known -party protocols,
tolerating up to corrupted parties, were only
-fair.
In a surprising result,
Moran, Naor, and Segev [TCC 2009] constructed an -round two-party
-fair coin-tossing protocol, i.e., an optimally fair protocol.
Beimel, Omri, and Orlov [Crypto 2010] extended the results of Moran et al.~to
the {\em multiparty setting} where strictly fewer than 2/3 of the parties are
corrupted. They constructed a -fair -round -party protocol,
tolerating up to corrupted parties.
Recently, in a breakthrough result, Haitner and Tsfadia [STOC 2014]
constructed an -fair (almost optimal) three-party coin-tossing
protocol. Their work brings forth a combination of novel techniques for coping
with the difficulties of constructing fair coin-tossing protocols. Still, the
best coin-tossing protocols for the case where more than 2/3 of the parties
may be corrupted (and even when , where ) were
-fair.
We construct an -fair -party coin-tossing protocol,
tolerating up to corrupted parties, whenever is constant and
On Pseudorandom Encodings
We initiate a study of pseudorandom encodings: efficiently computable and decodable encoding functions that map messages from a given distribution to a random-looking distribution. For instance, every distribution that can be perfectly and efficiently compressed admits such a pseudorandom encoding. Pseudorandom encodings are motivated by a variety of cryptographic applications, including password-authenticated key exchange, “honey encryption” and steganography. The main question we ask is whether every efficiently samplable distribution admits a pseudorandom encoding. Under different cryptographic assumptions, we obtain positive and negative answers for different flavors of pseudorandom encodings, and relate this question to problems in other areas of cryptography. In particular, by establishing a twoway relation between pseudorandom encoding schemes and efficient invertible sampling algorithms, we reveal a connection between adaptively secure multiparty computation for randomized functionalities and questions in the domain of steganography
Private Identity Agreement for Private Set Functionalities
Private set intersection and related functionalities are among the most prominent real-world applications of secure multiparty computation. While such protocols have attracted significant attention from the research community, other functionalities are often required to support a PSI application in practice. For example, in order for two parties to run a PSI over the unique users contained in their databases, they might first invoke on a support functionality to agree on the primary keys to represent their users.
This paper studies a secure approach to agreeing on primary keys. We introduce and realize a functionality that computes a common set of identifiers based on incomplete information held by two parties, which we refer to as private identity agreement. We explain the subtleties in designing such a functionality that arise from privacy requirements when intending to compose securely with PSI protocols. We also argue that the cost of invoking this functionality can be amortized over a large number of PSI sessions, and that for applications that require many repeated PSI executions, this represents an improvement over a PSI protocol that directly uses incomplete or fuzzy matches
- …