5 research outputs found
Watermarkable public key encryption with efficient extraction under standard assumptions
The current state of the art in watermarked public-key encryption schemes under standard cryptographic assumptions suggests that extracting the embedded message requires either linear time in the number of marked keys or the a-priori knowledge of the marked key employed in the decoder. We present the first scheme that obviates these restrictions in the secret-key marking model, i.e., the setting where extraction is performed using a private extraction key. Our construction offers constant time extraction complexity with constant size keys and ciphertexts and is secure under standard assumptions, namely the Decisional Composite Residuosity Assumption [Eurocrypt’99] and the Decisional Diffie Hellman in prime order subgroups of square higher order residues
Watermarking Public-key Cryptographic Functionalities and Implementations
A watermarking scheme for a public-key cryptographic functionality enables the embedding of a mark in the instance of the secret-key algorithm such that the functionality of the original scheme is maintained, while it is infeasible for an adversary to remove the mark (unremovability) or mark a fresh object without the marking key (unforgeability). Cohen et al. [STOC\u2716] has provided constructions for watermarking arbitrary cryptographic functionalities; the resulting schemes rely on indistinguishability obfuscation (iO) and leave two important open questions: (i) the realization of both unremovability and unforgeability, and (ii) schemes the security of which reduces to simpler hardness assumptions than iO.
In this paper we provide a new definitional framework that distinguishes between watermarking cryptographic functionalities and implementations (think of ElGamal encryption being an implementation of the encryption functionality), while at the same time provides a
meaningful relaxation of the watermarking model that enables both unremovability and unforgeability under minimal hardness assumptions.
In this way we can answer questions regarding the ability to watermark a given implementation of a cryptographic functionality which is more refined compared to the question of whether a watermarked implementation functionality exists. Taking advantage of our new formulation we present the first constructions for watermarking public key encryption that achieve both unremovability and unforgeability under minimal hardness assumptions. Our first construction enables the watermarking of any public-key encryption implementation assuming only the existence of one-way functions for private key detection. Our second construction is at the functionality level and uses a stronger assumption (existence of identity-based encryption (IBE)) but supports public detection of the watermark
Watermarkable Public key Encryption With Efficient Extraction Under Standard Assumptions
The current state of the art in watermarked public-key encryption schemes under standard cryptographic assumptions suggests that extracting the embedded message requires either linear time in the number of marked keys or the a-priori knowledge of the marked key employed in the decoder.
We present the first scheme that obviates these restrictions in the secret-key marking model, i.e., the setting where extraction is performed using a private extraction key. Our construction offers constant time extraction complexity with constant size keys and ciphertexts and is secure under standard assumptions, namely the Decisional Composite Residuosity Assumption [Eurocrypt \u2799] and the Decisional Diffie Hellman in prime order subgroups of square higher order residues
On the Practicality of a Smart Contract PKI
Public key infrastructures (PKIs) are one of the main building blocks
for securing communications over the Internet. Currently, PKIs are under
the control of centralized authorities, which is problematic as
evidenced by numerous incidents where they have been compromised. The
distributed, fault tolerant log of transactions provided by blockchains
and more recently, smart contract platforms, constitutes a powerful tool
for the decentralization of PKIs. To verify the validity of identity
records, blockchain-based identity systems store on chain either all
identity records, or, a small (or even constant) sized amount of data to
verify identity records stored off chain. However, as most of these
systems have never been implemented, there is little information
regarding the practical implications of each design’s tradeoffs.
In this work, we first implement and evaluate the only provably secure,
smart contract based PKI of [1] on top of Ethereum. This construction
incurs constant-sized storage at the expense of computational
complexity. To explore this tradeoff, we propose and implement a second
construction which, eliminates the need for trusted setup, preserves the
security properties of [1] and, as illustrated through our evaluation,
is the only version with constant-sized state that can be deployed on
the live chain of Ethereum. Furthermore, we compare these two systems
with the simple approach of most prior works, e.g., the Ethereum Name
Service, where all identity records are stored on the smart contract’s
state, to illustrate several shortcomings of Ethereum and its cost
model. We propose several modifications for fine tuning the model, which
would be useful to be considered for any smart contract platform like
Ethereum so that it reaches its full potential to support arbitrary
distributed applications
Energy Communities: How Tools Can Facilitate Their Enhancement
This workshop brought together a selection of H2020 EU-funded projects to offer an overview of different tools used for the optimization of local energy networks and demonstrate how to facilitate grid interaction from the perspective of technology leaders representing four H2020 projects. This session offered a unique opportunity to discuss different approaches and compare the frameworks, practices, and tools used by different energy communities