首页> 外文会议>International conference on the theory and application of cryptology and information security >How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios
【24h】

How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios

机译:如何不自我证明:菲亚特-沙米尔启发法的陷阱及其在Helios中的应用

获取原文

摘要

The Fiat-Shamir transformation is the most efficient construction of non-interactive zero-knowledge proofs. This paper is concerned with two variants of the transformation that appear but have not been clearly delineated in existing literature. Both variants start with the prover making a commitment. The strong variant then hashes both the commitment and the statement to be proved, whereas the weak variant hashes only the commitment. This minor change yields dramatically different security guarantees: in situations where malicious provers can select their statements adaptively, the weak Fiat-Shamir transformation yields unsound/unextractable proofs. Yet such settings naturally occur in systems when zero-knowledge proofs axe used to enforce honest behavior. We illustrate this point by showing that the use of the weak Fiat-Shamir transformation in the Helios cryptographic voting system leads to several possible security breaches: for some standard types of elections, under plausible circumstances, malicious parties can cause the tallying procedure to run indefinitely and even tamper with the result of the election. On the positive side, we define a form of adaptive security for zero-knowledge proofs in the random oracle model (essentially simulation-sound extractability), and show that a variant which we call strong Fiat-Shamir yields secure non-interactive proofs. This level of security was assumed in previous works on Helios and our results axe then necessary for these analyses to be valid. Additionally, we show that strong proofs in Helios achieve non-malleable encryption and satisfy ballot privacy, improving on previous results that required CCA security.
机译:Fiat-Shamir变换是非交互式零知识证明的最有效构造。本文涉及已出现但尚未在现有文献中明确描述的两种变型。两种变体都始于证明者做出承诺。然后,强变体对承诺和要证明的陈述进行哈希处理,而弱变体仅对承诺进行哈希处理。这种微小的变化产生了截然不同的安全性保证:在恶意证明者可以自适应地选择其陈述的情况下,较弱的Fiat-Shamir转换会产生不可靠/无法提取的证据。然而,当零知识证明用于实施诚实行为时,此类设置自然会在系统中发生。我们通过证明在Helios密码投票系统中使用弱的Fiat-Shamir变换会导致一些可能的安全漏洞来说明这一点:对于某些标准类型的选举,在合理的情况下,恶意方可能会导致计数程序无限期地运行甚至篡改选举结果。在积极方面,我们为随机预言机模型中的零知识证明定义了一种自适应安全性(本质上是模拟声音可提取性),并证明了我们称为强菲亚特-沙米尔的变体可以产生安全的非交互性证明。在以前关于Helios的工作中假定了这种安全级别,然后我们的结果轴才是使这些分析有效的必要条件。此外,我们证明了Helios中的强大证明可以实现不可恶意的加密并满足投票的隐私要求,从而改善了要求CCA安全性的先前结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号