首页> 外文会议>Annual International Cryptology Conference >Multi-prover Commitments Against Non-signaling Attacks
【24h】

Multi-prover Commitments Against Non-signaling Attacks

机译:针对非信令攻击的多人承诺

获取原文

摘要

We reconsider the concept of two-prover (and more generally: multi-prover) commitments, as introduced in the late eighties in the seminal work by Ben-Or et al. As was recently shown by Crepeau et al., the security of known two-prover commitment schemes not only relies on the explicit assumption that the two provers cannot communicate, but also depends on what their information processing capabilities are. For instance, there exist schemes that are secure against classical provers but insecure if the provers have quantum information processing capabilities, and there are schemes that resist such quantum attacks but become insecure when considering general so-called non-signaling provers, which are restricted solely by the requirement that no communication takes place. This poses the natural question whether there exists a two-prover commitment scheme that is secure under the sole assumption that no communication takes place, and that does not rely on any further restriction of the information processing capabilities of the dishonest provers; no such scheme is known. In this work, we give strong evidence for a negative answer: we show that any single-round two-prover commitment scheme can be broken by a non-signaling attack. Our negative result is as bad as it can get: for any candidate scheme that is (almost) perfectly hiding, there exists a strategy that allows the dishonest provers to open a commitment to an arbitrary bit (almost) as successfully as the honest provers can open an honestly prepared commitment, i.e., with probability (almost) 1 in case of a perfectly sound scheme. In the case of multi-round schemes, our impossibility result is restricted to perfectly hiding schemes. On the positive side, we show that the impossibility result can be circumvented by considering three provers instead: there exists a three-prover commitment scheme that is secure against arbitrary non-signaling attacks.
机译:我们重新考虑了两箴言(更普遍:多先报)承诺的概念,如八十年代末期的八十年代末期的介绍所引入的。正如最近由Crexeau等人所示的那样。,已知的双证致敬方案的安全性不仅依赖于两种普通不能沟通的明确假设,而且取决于他们的信息处理能力是什么。例如,存在对古典普通的普通普通保护的方案,但如果普通具有量子信息处理能力,并且存在抵抗这种量子攻击的方案,但在考虑一般所谓的非信号传导普通时,这是不安全的,这是完全限制的通过未发生沟通的要求。这造成了自然问题,无论是否存在两种先行承诺方案,这些方案是在没有发生沟通的唯一假设下是安全的,并且不依赖于不诚实普通的信息处理能力的进一步限制;没有已知这样的方案。在这项工作中,我们给出了否定答案的强有力证据:我们表明,任何单圆形双证明的承诺方案都可以通过非信令攻击进行打破。我们的负面结果与它可以获得的糟糕情况在完全合理的方案的情况下,打开诚实准备的承诺,即,概率(差不多)1。在多轮计划的情况下,我们不可能的结果仅限于完美隐藏的方案。在积极的方面,我们表明,通过考虑三个普通可以避免不影响的结果:存在三个先行承诺方案,这是针对任意非信令攻击的安全。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号