On the Impossibility of Tight Cryptographic Reduc:ons
Christoph Bader, Tibor Jager, Yong Li, Sven Schäge
Ruhr-University Bochum EUROCRYPT 2016
1
On the Impossibility of Tight Cryptographic Reduc:ons Christoph - - PowerPoint PPT Presentation
On the Impossibility of Tight Cryptographic Reduc:ons Christoph Bader, Tibor Jager, Yong Li, Sven Schge Ruhr-University Bochum EUROCRYPT 2016 1 Tight Cryptographic Reduc:ons 1. Define a security model 2. Prove: efficient a/acker A
Ruhr-University Bochum EUROCRYPT 2016
1
2
pk (m*,s*) Adversary A si mi Q :mes
3
Instance of P Solu:on pk (m*,s*) Adversary A Reduc:on R si mi Q :mes
4
Instance of P Solu:on pk (m*,s*) Adversary A Reduc:on R si mi Q :mes
5
6
7
Digital Signatures
Public-Key Encryp:on
(best paper)
Pseudorandom Func:ons
Iden:ty-based Encryp:on
Key Exchange
8
Digital Signatures
Public-Key Encryp:on
(best paper)
Pseudorandom Func:ons
Iden:ty-based Encryp:on
Key Exchange
9
Q :mes
* see also Kakvi and Kiltz, Eurocrypt 2012 ** generalized to re-randomizable signatures by Hoeeinz et al., PKC 2012
10
Q :mes
* see also Kakvi and Kiltz, Eurocrypt 2012 ** generalized to re-randomizable signatures by Hoeeinz et al., PKC 2012
11
Instance of P Solu:on Reduc:on R pk (m*,s*) si mi Q :mes
12
Instance of P Solu:on Reduc:on R Meta-Reduc:on M Instance of P Solu:on pk (m*,s*) si mi Q :mes Simula:on of Adversary A
13
Instance of P Solu:on Reduc:on R Meta-Reduc:on M Instance of P Solu:on pk (m*,s*) si mi Q :mes Simula:on of Adversary A
14
Instance of P Solu:on Reduc:on R Meta-Reduc:on M Instance of P Solu:on pk (m*,s*) si mi Q :mes Simula:on of Adversary A “Annoying term”
15
16
“Annoying term”
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
Reduc:on R Instance of P Solu:on
33
Reduc:on R
Instance of P Solu:on
34
Reduc:on R
Instance of P Solu:on
35
Reduc:on R Instance of P Instance of P Meta-Reduc:on M
36
Reduc:on R Instance of P Instance of P Meta-Reduc:on M
37
Reduc:on R Instance of P Instance of P Meta-Reduc:on M
38
Reduc:on R Instance of P Instance of P Meta-Reduc:on M Simula:on of Adversary A
39
Reduc:on R Instance of P Solu:on Instance of P Solu:on Meta-Reduc:on M Simula:on of Adversary A
40
(* In the paper: generalized to re-randomizable keys)
41
(* In the paper: generalized to re-randomizable keys)
42
43
Strengthened versions of [C02, KK12, HJK12] Mul:-user security with corrup:ons Security of non-interac:ve key exchange
44
45
46
47
48