ZK Proofs (cntd.) Composition ZK Proofs (cntd.) Composition - - PowerPoint PPT Presentation

zk proofs cntd composition zk proofs cntd composition
SMART_READER_LITE
LIVE PREVIEW

ZK Proofs (cntd.) Composition ZK Proofs (cntd.) Composition - - PowerPoint PPT Presentation

ZK Proofs (cntd.) Composition ZK Proofs (cntd.) Composition Lecture 16 An Example RECALL An Example RECALL Graph Isomorphism An Example RECALL Graph Isomorphism (G 0 ,G 1 ) in L iff there exists an isomorphism such that (G 0 )=G 1


slide-1
SLIDE 1

ZK Proofs (cntd.) Composition

slide-2
SLIDE 2

ZK Proofs (cntd.) Composition

Lecture 16

slide-3
SLIDE 3

An Example

RECALL

slide-4
SLIDE 4

An Example

Graph Isomorphism

RECALL

slide-5
SLIDE 5

An Example

Graph Isomorphism

(G0,G1) in L iff there exists an isomorphism σ such that σ(G0)=G1

RECALL

slide-6
SLIDE 6

An Example

Graph Isomorphism

(G0,G1) in L iff there exists an isomorphism σ such that σ(G0)=G1

IP protocol: send σ

RECALL

slide-7
SLIDE 7

An Example

Graph Isomorphism

(G0,G1) in L iff there exists an isomorphism σ such that σ(G0)=G1

IP protocol: send σ ZK protocol

RECALL

slide-8
SLIDE 8

An Example

Graph Isomorphism

(G0,G1) in L iff there exists an isomorphism σ such that σ(G0)=G1

IP protocol: send σ ZK protocol

Bob sees only
 b, π* and G* s.t.
 π*(Gb) = G*

RECALL

slide-9
SLIDE 9

G* := π(G1) (random π)

An Example

Graph Isomorphism

(G0,G1) in L iff there exists an isomorphism σ such that σ(G0)=G1

IP protocol: send σ ZK protocol

Bob sees only
 b, π* and G* s.t.
 π*(Gb) = G*

RECALL

slide-10
SLIDE 10

G* := π(G1) (random π)

An Example

Graph Isomorphism

(G0,G1) in L iff there exists an isomorphism σ such that σ(G0)=G1

IP protocol: send σ ZK protocol

Bob sees only
 b, π* and G* s.t.
 π*(Gb) = G* G*

RECALL

slide-11
SLIDE 11

G* := π(G1) (random π)

An Example

Graph Isomorphism

(G0,G1) in L iff there exists an isomorphism σ such that σ(G0)=G1

IP protocol: send σ ZK protocol

Bob sees only
 b, π* and G* s.t.
 π*(Gb) = G* G*

random bit b RECALL

slide-12
SLIDE 12

G* := π(G1) (random π)

An Example

Graph Isomorphism

(G0,G1) in L iff there exists an isomorphism σ such that σ(G0)=G1

IP protocol: send σ ZK protocol

Bob sees only
 b, π* and G* s.t.
 π*(Gb) = G* G*

random bit b

b

RECALL

slide-13
SLIDE 13

G* := π(G1) (random π)

An Example

Graph Isomorphism

(G0,G1) in L iff there exists an isomorphism σ such that σ(G0)=G1

IP protocol: send σ ZK protocol

Bob sees only
 b, π* and G* s.t.
 π*(Gb) = G* G*

random bit b

b

if b=1, π* := π if b=0, π* := πoσ RECALL

slide-14
SLIDE 14

G* := π(G1) (random π)

An Example

Graph Isomorphism

(G0,G1) in L iff there exists an isomorphism σ such that σ(G0)=G1

IP protocol: send σ ZK protocol

Bob sees only
 b, π* and G* s.t.
 π*(Gb) = G* G*

random bit b

b

if b=1, π* := π if b=0, π* := πoσ

π*

RECALL

slide-15
SLIDE 15

G* := π(G1) (random π)

An Example

Graph Isomorphism

(G0,G1) in L iff there exists an isomorphism σ such that σ(G0)=G1

IP protocol: send σ ZK protocol

Bob sees only
 b, π* and G* s.t.
 π*(Gb) = G* G*

random bit b

b

if b=1, π* := π if b=0, π* := πoσ G*=π*(Gb)?

π*

RECALL

slide-16
SLIDE 16

The Legend of William Tell

A Side Story

slide-17
SLIDE 17

The Legend of William Tell

A Side Story

Bob: William Tell is a great marksman!

slide-18
SLIDE 18

The Legend of William Tell

A Side Story

Bob: William Tell is a great marksman! Charlie: How do you know?

slide-19
SLIDE 19

The Legend of William Tell

A Side Story

Bob: William Tell is a great marksman! Charlie: How do you know? Bob: I just saw him shoot an apple placed on his son’s head! See this!

slide-20
SLIDE 20

The Legend of William Tell

A Side Story

Bob: William Tell is a great marksman! Charlie: How do you know? Bob: I just saw him shoot an apple placed on his son’s head! See this!

slide-21
SLIDE 21

The Legend of William Tell

A Side Story

Bob: William Tell is a great marksman! Charlie: How do you know? Bob: I just saw him shoot an apple placed on his son’s head! See this! Charlie: That apple convinced you? Anyone could have made it up!

slide-22
SLIDE 22

The Legend of William Tell

A Side Story

Bob: William Tell is a great marksman! Charlie: How do you know? Bob: I just saw him shoot an apple placed on his son’s head! See this! Charlie: That apple convinced you? Anyone could have made it up! Bob: But I saw him shoot it...

slide-23
SLIDE 23

The Legend of William Tell

A Side Story

Bob: William Tell is a great marksman! Charlie: How do you know? Bob: I just saw him shoot an apple placed on his son’s head! See this! Charlie: That apple convinced you? Anyone could have made it up! Bob: But I saw him shoot it...

slide-24
SLIDE 24

The Legend of William Tell

A Side Story

Bob: G0 and G1 are isomorphic! Bob: William Tell is a great marksman! Charlie: How do you know? Bob: I just saw him shoot an apple placed on his son’s head! See this! Charlie: That apple convinced you? Anyone could have made it up! Bob: But I saw him shoot it...

slide-25
SLIDE 25

The Legend of William Tell

A Side Story

Bob: G0 and G1 are isomorphic! Charlie: How do you know? Bob: William Tell is a great marksman! Charlie: How do you know? Bob: I just saw him shoot an apple placed on his son’s head! See this! Charlie: That apple convinced you? Anyone could have made it up! Bob: But I saw him shoot it...

slide-26
SLIDE 26

The Legend of William Tell

A Side Story

Bob: G0 and G1 are isomorphic! Charlie: How do you know? Bob: Alice just proved it to me! See this: Bob: William Tell is a great marksman! Charlie: How do you know? Bob: I just saw him shoot an apple placed on his son’s head! See this! Charlie: That apple convinced you? Anyone could have made it up! Bob: But I saw him shoot it...

slide-27
SLIDE 27

The Legend of William Tell

A Side Story

Bob: G0 and G1 are isomorphic! Charlie: How do you know? Bob: Alice just proved it to me! See this: G*, b, π* s.t. G*=π*(Gb) Bob: William Tell is a great marksman! Charlie: How do you know? Bob: I just saw him shoot an apple placed on his son’s head! See this! Charlie: That apple convinced you? Anyone could have made it up! Bob: But I saw him shoot it...

slide-28
SLIDE 28

The Legend of William Tell

A Side Story

Bob: G0 and G1 are isomorphic! Charlie: How do you know? Bob: Alice just proved it to me! See this: G*, b, π* s.t. G*=π*(Gb) Charlie: That convinced you? Anyone could have made it up! Bob: William Tell is a great marksman! Charlie: How do you know? Bob: I just saw him shoot an apple placed on his son’s head! See this! Charlie: That apple convinced you? Anyone could have made it up! Bob: But I saw him shoot it...

slide-29
SLIDE 29

The Legend of William Tell

A Side Story

Bob: G0 and G1 are isomorphic! Charlie: How do you know? Bob: Alice just proved it to me! See this: G*, b, π* s.t. G*=π*(Gb) Charlie: That convinced you? Anyone could have made it up! Bob: But I picked b at random and she had no trouble answering me... Bob: William Tell is a great marksman! Charlie: How do you know? Bob: I just saw him shoot an apple placed on his son’s head! See this! Charlie: That apple convinced you? Anyone could have made it up! Bob: But I saw him shoot it...

slide-30
SLIDE 30

Zero-Knowledge Proofs

slide-31
SLIDE 31

Zero-Knowledge Proofs

Interactive Proof

slide-32
SLIDE 32

Zero-Knowledge Proofs

Interactive Proof

Complete and Sound

slide-33
SLIDE 33

Zero-Knowledge Proofs

Interactive Proof

Complete and Sound

ZK Property:

slide-34
SLIDE 34

Zero-Knowledge Proofs

Interactive Proof

Complete and Sound

ZK Property:

slide-35
SLIDE 35

Zero-Knowledge Proofs

Interactive Proof

Complete and Sound

ZK Property:

slide-36
SLIDE 36

Ah, got it! 42

Zero-Knowledge Proofs

Interactive Proof

Complete and Sound

ZK Property:

slide-37
SLIDE 37

Ah, got it! 42

Zero-Knowledge Proofs

Interactive Proof

Complete and Sound

ZK Property:

slide-38
SLIDE 38

Ah, got it! 42

Zero-Knowledge Proofs

Interactive Proof

Complete and Sound

ZK Property:

Verifier’s view could have been “simulated”

slide-39
SLIDE 39

Ah, got it! 42

Zero-Knowledge Proofs

Interactive Proof

Complete and Sound

ZK Property:

Verifier’s view could have been “simulated”

slide-40
SLIDE 40

Ah, got it! 42

Zero-Knowledge Proofs

Interactive Proof

Complete and Sound

ZK Property:

Verifier’s view could have been “simulated”

slide-41
SLIDE 41

Ah, got it! 42

Zero-Knowledge Proofs

Interactive Proof

Complete and Sound

ZK Property:

Verifier’s view could have been “simulated”

x i n L

slide-42
SLIDE 42

Ah, got it! 42

Zero-Knowledge Proofs

Interactive Proof

Complete and Sound

ZK Property:

Verifier’s view could have been “simulated”

x i n L

Ah, got it! 42

slide-43
SLIDE 43

Ah, got it! 42

Zero-Knowledge Proofs

Interactive Proof

Complete and Sound

ZK Property:

Verifier’s view could have been “simulated” For every adversarial strategy, there exists a simulation strategy

x i n L

Ah, got it! 42

slide-44
SLIDE 44

ZK Property (in other pict’ s)

proto proto

Env REAL

i’face

Env IDEAL

F

R

x,w x Secure (and correct) if: ∀ ∃ s.t. ∀

  • utput of

is distributed identically in REAL and IDEAL x

slide-45
SLIDE 45

ZK Property (in other pict’ s)

proto proto

Env REAL

i’face

Env IDEAL

F

R

x,w x Secure (and correct) if: ∀ ∃ s.t. ∀

  • utput of

is distributed identically in REAL and IDEAL x

slide-46
SLIDE 46

ZK Property (in other pict’ s)

proto proto

Env REAL

i’face

Env IDEAL

F

R

x,w x Secure (and correct) if: ∀ ∃ s.t. ∀

  • utput of

is distributed identically in REAL and IDEAL x

slide-47
SLIDE 47

ZK Property (in other pict’ s)

proto proto

Env REAL

i’face

Env IDEAL

F

R

Classical definition uses simulation

  • nly for corrupt receiver;

x,w x Secure (and correct) if: ∀ ∃ s.t. ∀

  • utput of

is distributed identically in REAL and IDEAL x

slide-48
SLIDE 48

ZK Property (in other pict’ s)

proto proto

Env REAL

i’face

Env IDEAL

F

R

Classical definition uses simulation

  • nly for corrupt receiver;

and uses only standalone security: Environment gets only a transcript at the end x,w x Secure (and correct) if: ∀ ∃ s.t. ∀

  • utput of

is distributed identically in REAL and IDEAL x

slide-49
SLIDE 49

SIM ZK

proto proto

Env REAL

i’face

Env IDEAL

F

R

x,w x Secure (and correct) if: ∀ ∃ s.t. ∀

  • utput of

is distributed identically in REAL and IDEAL x

slide-50
SLIDE 50

SIM ZK

proto proto

Env REAL

i’face

Env IDEAL

F

R

x,w x

  • SIM-ZK would require simulation also when prover is corrupt

Secure (and correct) if: ∀ ∃ s.t. ∀

  • utput of

is distributed identically in REAL and IDEAL x

slide-51
SLIDE 51

SIM ZK

proto proto

Env REAL

i’face

Env IDEAL

F

R

x,w x

  • SIM-ZK would require simulation also when prover is corrupt
  • Then simulator is a witness extractor

Secure (and correct) if: ∀ ∃ s.t. ∀

  • utput of

is distributed identically in REAL and IDEAL x

slide-52
SLIDE 52

SIM ZK

proto proto

Env REAL

i’face

Env IDEAL

F

R

x,w x

  • SIM-ZK would require simulation also when prover is corrupt
  • Then simulator is a witness extractor
  • Adding this (in standalone setting) makes it a Proof of Knowledge

Secure (and correct) if: ∀ ∃ s.t. ∀

  • utput of

is distributed identically in REAL and IDEAL x

slide-53
SLIDE 53

A ZK Proof for Graph Colorability

slide-54
SLIDE 54

A ZK Proof for Graph Colorability

G,coloring

slide-55
SLIDE 55

Uses a commitment protocol as a subroutine

A ZK Proof for Graph Colorability

G,coloring

F

slide-56
SLIDE 56

Uses a commitment protocol as a subroutine

A ZK Proof for Graph Colorability

Use random colors

G,coloring

F

slide-57
SLIDE 57

Uses a commitment protocol as a subroutine

A ZK Proof for Graph Colorability

Use random colors

G,coloring

F

committed

slide-58
SLIDE 58

Uses a commitment protocol as a subroutine

A ZK Proof for Graph Colorability

pick random edge Use random colors

edge G,coloring

F

committed

slide-59
SLIDE 59

Uses a commitment protocol as a subroutine

A ZK Proof for Graph Colorability

pick random edge Use random colors

edge G,coloring

F

reveal edge committed

slide-60
SLIDE 60

Uses a commitment protocol as a subroutine

A ZK Proof for Graph Colorability

pick random edge distinct colors? Use random colors

edge G,coloring

F

reveal edge committed

slide-61
SLIDE 61

Uses a commitment protocol as a subroutine

A ZK Proof for Graph Colorability

pick random edge distinct colors? Use random colors

edge G,coloring OK

F

reveal edge committed

slide-62
SLIDE 62

Uses a commitment protocol as a subroutine At least 1/m probability of catching a wrong proof

A ZK Proof for Graph Colorability

pick random edge distinct colors? Use random colors

edge G,coloring OK

F

reveal edge committed

slide-63
SLIDE 63

Uses a commitment protocol as a subroutine At least 1/m probability of catching a wrong proof Soundness amplification: Repeat say mk times
 (with independent color permutations)

A ZK Proof for Graph Colorability

pick random edge distinct colors? Use random colors

edge G,coloring OK

F

reveal edge committed

slide-64
SLIDE 64

A Commitment Protocol

slide-65
SLIDE 65

Using a OWP f and a hardcore predicate for it B

A Commitment Protocol

slide-66
SLIDE 66

Using a OWP f and a hardcore predicate for it B Satisfies only classical (IND) security, in terms of hiding and binding

A Commitment Protocol

slide-67
SLIDE 67

Using a OWP f and a hardcore predicate for it B Satisfies only classical (IND) security, in terms of hiding and binding

A Commitment Protocol

b

slide-68
SLIDE 68

Using a OWP f and a hardcore predicate for it B Satisfies only classical (IND) security, in terms of hiding and binding

A Commitment Protocol

random x

b

slide-69
SLIDE 69

Using a OWP f and a hardcore predicate for it B Satisfies only classical (IND) security, in terms of hiding and binding

A Commitment Protocol

random x

f(x), b ⊕ B(x) b

slide-70
SLIDE 70

Using a OWP f and a hardcore predicate for it B Satisfies only classical (IND) security, in terms of hiding and binding

A Commitment Protocol

random x

f(x), b ⊕ B(x) b committed

slide-71
SLIDE 71

Using a OWP f and a hardcore predicate for it B Satisfies only classical (IND) security, in terms of hiding and binding

A Commitment Protocol

random x

f(x), b ⊕ B(x) b committed

slide-72
SLIDE 72

Using a OWP f and a hardcore predicate for it B Satisfies only classical (IND) security, in terms of hiding and binding

A Commitment Protocol

random x

f(x), b ⊕ B(x) b committed reveal

slide-73
SLIDE 73

Using a OWP f and a hardcore predicate for it B Satisfies only classical (IND) security, in terms of hiding and binding

A Commitment Protocol

random x

f(x), b ⊕ B(x) b x,b committed reveal

slide-74
SLIDE 74

Using a OWP f and a hardcore predicate for it B Satisfies only classical (IND) security, in terms of hiding and binding

A Commitment Protocol

consistent? random x

f(x), b ⊕ B(x) b x,b committed reveal

slide-75
SLIDE 75

Using a OWP f and a hardcore predicate for it B Satisfies only classical (IND) security, in terms of hiding and binding

A Commitment Protocol

consistent? random x

f(x), b ⊕ B(x) b b x,b committed reveal

slide-76
SLIDE 76

Using a OWP f and a hardcore predicate for it B Satisfies only classical (IND) security, in terms of hiding and binding Perfectly binding because
 f is a permutation

A Commitment Protocol

consistent? random x

f(x), b ⊕ B(x) b b x,b committed reveal

slide-77
SLIDE 77

Using a OWP f and a hardcore predicate for it B Satisfies only classical (IND) security, in terms of hiding and binding Perfectly binding because
 f is a permutation Hiding because B(x) is pseudorandom given f(x)

A Commitment Protocol

consistent? random x

f(x), b ⊕ B(x) b b x,b committed reveal

slide-78
SLIDE 78

ZK Results

slide-79
SLIDE 79

ZK Results

IP and ZK defined [GMR’85]

slide-80
SLIDE 80

ZK Results

IP and ZK defined [GMR’85] ZK for all NP languages [GMW’86]

slide-81
SLIDE 81

ZK Results

IP and ZK defined [GMR’85] ZK for all NP languages [GMW’86] Assuming one-way functions exist

slide-82
SLIDE 82

ZK Results

IP and ZK defined [GMR’85] ZK for all NP languages [GMW’86] Assuming one-way functions exist ZK for all of IP [BGGHKMR’88]

slide-83
SLIDE 83

ZK Results

IP and ZK defined [GMR’85] ZK for all NP languages [GMW’86] Assuming one-way functions exist ZK for all of IP [BGGHKMR’88] Everything that can be proven can be proven in zero- knowledge! (Assuming OWF)

slide-84
SLIDE 84

ZK Results

IP and ZK defined [GMR’85] ZK for all NP languages [GMW’86] Assuming one-way functions exist ZK for all of IP [BGGHKMR’88] Everything that can be proven can be proven in zero- knowledge! (Assuming OWF) Variants (known for NP)

slide-85
SLIDE 85

ZK Results

IP and ZK defined [GMR’85] ZK for all NP languages [GMW’86] Assuming one-way functions exist ZK for all of IP [BGGHKMR’88] Everything that can be proven can be proven in zero- knowledge! (Assuming OWF) Variants (known for NP) ZKPoK, Statistical ZK Arguments, Non-Interactive ZK (using a common random string), Witness-Indistinguishable Proofs, …

slide-86
SLIDE 86

ZK Proofs: What for?

slide-87
SLIDE 87

Authentication

ZK Proofs: What for?

slide-88
SLIDE 88

Authentication

Using ZK Proof of Knowledge

ZK Proofs: What for?

slide-89
SLIDE 89

Authentication

Using ZK Proof of Knowledge

Canonical use: As a tool in larger protocols

ZK Proofs: What for?

slide-90
SLIDE 90

Authentication

Using ZK Proof of Knowledge

Canonical use: As a tool in larger protocols

To enforce “honest behavior” in protocols

ZK Proofs: What for?

slide-91
SLIDE 91

Authentication

Using ZK Proof of Knowledge

Canonical use: As a tool in larger protocols

To enforce “honest behavior” in protocols At each step prove in ZK it was done as prescribed

ZK Proofs: What for?

slide-92
SLIDE 92

Authentication

Using ZK Proof of Knowledge

Canonical use: As a tool in larger protocols

To enforce “honest behavior” in protocols At each step prove in ZK it was done as prescribed

ZK Proofs: What for?

x1

slide-93
SLIDE 93

Authentication

Using ZK Proof of Knowledge

Canonical use: As a tool in larger protocols

To enforce “honest behavior” in protocols At each step prove in ZK it was done as prescribed

ZK Proofs: What for?

x1

Prove to me x1 is what you should have sent me now

slide-94
SLIDE 94

Authentication

Using ZK Proof of Knowledge

Canonical use: As a tool in larger protocols

To enforce “honest behavior” in protocols At each step prove in ZK it was done as prescribed

ZK Proofs: What for?

x1

Prove to me x1 is what you should have sent me now

slide-95
SLIDE 95

Authentication

Using ZK Proof of Knowledge

Canonical use: As a tool in larger protocols

To enforce “honest behavior” in protocols At each step prove in ZK it was done as prescribed

ZK Proofs: What for?

x1

Prove to me x1 is what you should have sent me now OK

slide-96
SLIDE 96

Authentication

Using ZK Proof of Knowledge

Canonical use: As a tool in larger protocols

To enforce “honest behavior” in protocols At each step prove in ZK it was done as prescribed

ZK Proofs: What for?

x1 y1

Prove to me x1 is what you should have sent me now OK

slide-97
SLIDE 97

Prove y1 is what...

Authentication

Using ZK Proof of Knowledge

Canonical use: As a tool in larger protocols

To enforce “honest behavior” in protocols At each step prove in ZK it was done as prescribed

ZK Proofs: What for?

x1 y1

Prove to me x1 is what you should have sent me now OK

slide-98
SLIDE 98

Prove y1 is what...

Authentication

Using ZK Proof of Knowledge

Canonical use: As a tool in larger protocols

To enforce “honest behavior” in protocols At each step prove in ZK it was done as prescribed

ZK Proofs: What for?

x1 y1

Prove to me x1 is what you should have sent me now OK

slide-99
SLIDE 99

Prove y1 is what...

Authentication

Using ZK Proof of Knowledge

Canonical use: As a tool in larger protocols

To enforce “honest behavior” in protocols At each step prove in ZK it was done as prescribed

ZK Proofs: What for?

x1 y1

Prove to me x1 is what you should have sent me now OK OK

slide-100
SLIDE 100

Prove y1 is what...

Authentication

Using ZK Proof of Knowledge

Canonical use: As a tool in larger protocols

To enforce “honest behavior” in protocols At each step prove in ZK it was done as prescribed

ZK Proofs: What for?

x1 y1 x2

Prove to me x1 is what you should have sent me now OK OK

slide-101
SLIDE 101

Prove y1 is what...

Authentication

Using ZK Proof of Knowledge

Canonical use: As a tool in larger protocols

To enforce “honest behavior” in protocols At each step prove in ZK it was done as prescribed

ZK Proofs: What for?

x1 y1 x2

Prove to me x1 is what you should have sent me now Prove x2 is what... OK OK

slide-102
SLIDE 102

Does it fit in?

x1 y1 x2

slide-103
SLIDE 103

Does the proof stay ZK in the big picture?

Does it fit in?

x1 y1 x2

slide-104
SLIDE 104

Does the proof stay ZK in the big picture?

Composition

Does it fit in?

x1 y1 x2

slide-105
SLIDE 105

Does the proof stay ZK in the big picture?

Composition

Several issues: auxiliary information from previous runs, concurrency issues, malleability/man-in-the- middle

Does it fit in?

x1 y1 x2

slide-106
SLIDE 106

Does the proof stay ZK in the big picture?

Composition

Several issues: auxiliary information from previous runs, concurrency issues, malleability/man-in-the- middle

In general, to allow composition more complicated protocols

Does it fit in?

x1 y1 x2

slide-107
SLIDE 107

GM1 vs. Hacker Hacker vs. GM2

Composition Issues

slide-108
SLIDE 108

GM1 vs. Hacker Hacker vs. GM2

Multiple executions provide new

  • pportunities for the hacker

Composition Issues

slide-109
SLIDE 109

GM1 vs. Hacker Hacker vs. GM2

Will not lose against both! Play the GM’s against each other

Multiple executions provide new

  • pportunities for the hacker

Composition Issues

slide-110
SLIDE 110

GM1 vs. Hacker Hacker vs. GM2

Will not lose against both! Play the GM’s against each other

Multiple executions provide new

  • pportunities for the hacker

Person-in-the-middle attack

Composition Issues

slide-111
SLIDE 111

Multiple executions provide new

  • pportunities for the hacker

Person-in-the-middle attack Simulability of a single execution doesn’t imply simulation for multiple executions

Composition Issues

slide-112
SLIDE 112

x1 in L x3 in L x4 in L x2 in L wR1,wR2,wR3

Multiple executions provide new

  • pportunities for the hacker

Person-in-the-middle attack Simulability of a single execution doesn’t imply simulation for multiple executions

Composition Issues

slide-113
SLIDE 113

x1 in L x3 in L x4 in L x2 in L wR1,wR2,wR3

Multiple executions provide new

  • pportunities for the hacker

Person-in-the-middle attack Simulability of a single execution doesn’t imply simulation for multiple executions

Composition Issues

Or when run along with other protocols

slide-114
SLIDE 114

Universal Composition

slide-115
SLIDE 115

Universal Composition

A security guarantee

slide-116
SLIDE 116

Universal Composition

A security guarantee that can be given for a “composed system”

slide-117
SLIDE 117

Universal Composition

A security guarantee that can be given for a “composed system” such that security for each component separately implies security for the entire system

slide-118
SLIDE 118

Universal Composition

A security guarantee that can be given for a “composed system” such that security for each component separately implies security for the entire system and is meaningful! (otherwise, “everything is secure” is composable)

slide-119
SLIDE 119

Universal Composition

A security guarantee that can be given for a “composed system” such that security for each component separately implies security for the entire system and is meaningful! (otherwise, “everything is secure” is composable) Will use SIM security