【24h】

On Input Indistinguishable Proof Systems

机译:输入不可区分的证明系统

获取原文

摘要

We study Input Indistinguishable Computation (IIC), a security notion proposed by Micali, Pass, and Rosen in and recently considered also by Garg, Goyal, Jain and Sahai in. IIC aims at generalizing the notion of a Witness Indistinguishable (WI) proof system to general two-party functionalities and in its concurrent version (cIIC) also considers security against man-in-the-middle (MiM) attacks. In this paper, we focus on the proof system functionality and compare IIC with two other security notions for proof systems: WI and Non-Malleability (NM). We address the following two questions. 1. Since IIC is a generalization of WI from proof systems to general 2PC, are all WI proofs also IIC secure? 2. Are cIIC proofs also NM? We show, somewhat surprisingly, that both answers to the above questions are negative. Indeed, we show that there exists a WI proof system that is not IIC secure. We then show that a large class of WI proof systems, including the classical Blum's proof system for NP, are concurrently secure in the IIC sense. This answers the second question in the negative, since Blum's proofs are known to be malleable. The consequence of our results is three-fold. 1) IIC is a too stringent notion and this leaves the possibility of security notions weaker than IIC with a satisfying level of security. 2) For important functionalities, such as the proof system functionality, classical constructions like Blum's protocol are cIIC secure. 3) cIIC security should be carefully evaluated when used as a security guarantee to model real-world concurrent attacks to protocols, as our results show that cIIC security does not guarantee non-malleability of proof systems. In contrast, standard simulation-based security and concurrent non-malleable WI (a game-based security notion introduced by) are secure against MiM attacks (the latter even in constant rounds).
机译:我们研究输入不可区分计算(IIC),这是Micali,Pass和Rosen于2000年提出的安全概念,最近也被Garg,Goyal,Jain和Sahai纳入考虑。IIC旨在推广见证不可区分(WI)证明系统的概念。通用两方功能,并且在其并发版本(cIIC)中还考虑了针对中间人(MiM)攻击的安全性。在本文中,我们将重点放在证明系统的功能上,并将IIC与证明系统的其他两个安全概念进行比较:WI和Non-Malleability(NM)。我们解决以下两个问题。 1.由于IIC是从证明系统到通用2PC的WI的泛化,因此所有WI证明是否也IIC安全? 2. cIIC证明也是NM吗?我们出乎意料地表明,对以上问题的两个答案都是负面的。确实,我们表明存在一个IIC不安全的WI证明系统。然后,我们证明,在IIC的意义上,包括经典的Blum NP证明系统在内的大量WI证明系统是同时安全的。这回答了否定的第二个问题,因为已知百隆的证明是可延展的。我们结果的结果是三方面的。 1)IIC是一个过于严格的概念,这使安全性概念比具有令人满意的安全性的IIC弱一些。 2)对于重要功能,例如证明系统功能,经典构造(如Blum协议)是cIIC安全的。 3)当cIIC安全性用作对协议的现实世界并行攻击建模的安全性保证时,应仔细评估,因为我们的结果表明cIIC安全性不能保证证明系统的不可错误性。相比之下,基于标准仿真的安全性和并发的非恶意WI(一种基于游戏的安全性概念)可以抵御MiM攻击(即使是连续不断的攻击)。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号