Title :
From Unprovability to Environmentally Friendly Protocols
Author :
Canetti, Rafael ; Huijia Lin ; Pass, Rafael
Author_Institution :
Boston Univ. & Tel Aviv Univ., Boston, MA, USA
Abstract :
An important security concern for crypto-graphic protocols is the extent to which they adversely affect the security of the systems in which they run. In particular, can we rule out the possibility that introducing a new protocol to a system might, as a "side effect", break the security of unsuspecting protocols in that system? Universally Composable (UC) security rules out such adverse side effects. However, many functionalities of interest provably cannot be realized with UC security unless the protocol participants are willing to put some trust in external computational entities. We propose a notion of security that: (a) allows realizing practically any functionality by protocols in the plain model without putting trust in any external entity; (b) guarantees that secure protocols according to this notion have no adverse side-effects on existing protocols in the system -- as long as the security of these existing protocols is proven via the traditional methodology of black box reduction to a game-based cryptographic hardness assumption with bounded number of rounds. Our security notion builds on the angel-based security notion of Prabhakaran and Sahai. A key part in our analysis is to come up with a CCA-secure commitment scheme that (a) cannot be proven secure via a black box reduction to a game-based assumption, but (b) can be proven secure using a non-black-box reduction. To the best of our knowledge, this is the first time that the interplay between black-box provability and unprovability is used to demonstrate security properties of protocols.
Keywords :
cryptographic protocols; game theory; CCA-secure commitment scheme; UC security; angel-based security notion; black box reduction; black-box unprovability; chosen-commitment-attack secure commitment scheme; crypto-graphic protocols; environmentally friendly protocols; external computational entities; game-based cryptographic hardness assumption; plain model; protocol security properties; secure protocols; universally composable security; Awards activities; Cryptography; Educational institutions; Games; Polynomials; Protocols; Angel-Based Security; Black-Box Unprovability; Cryptography; Environmentally Friendliness;
Conference_Titel :
Foundations of Computer Science (FOCS), 2013 IEEE 54th Annual Symposium on
Conference_Location :
Berkeley, CA
DOI :
10.1109/FOCS.2013.16