Zur Kurzanzeige

dc.contributor.author
Kamath, Chethan
dc.contributor.author
Klein, Karen
dc.contributor.author
Pietrzak, Krzysztof
dc.contributor.author
Walter, Michael
dc.contributor.editor
Nissim, Kobbi
dc.contributor.editor
Waters, Brent
dc.date.accessioned
2021-11-09T07:52:36Z
dc.date.available
2021-11-08T15:50:28Z
dc.date.available
2021-11-09T07:52:36Z
dc.date.issued
2021
dc.identifier.isbn
978-3-030-90452-4
en_US
dc.identifier.isbn
978-3-030-90453-1
en_US
dc.identifier.issn
0302-9743
dc.identifier.issn
1611-3349
dc.identifier.other
10.1007/978-3-030-90453-1_19
en_US
dc.identifier.uri
http://hdl.handle.net/20.500.11850/514351
dc.description.abstract
The security of cryptographic primitives and protocols against adversaries that are allowed to make adaptive choices (e.g., which parties to corrupt or which queries to make) is notoriously difficult to establish. A broad theoretical framework was introduced by Jafargholi et al. [Crypto’17] for this purpose. In this paper we initiate the study of lower bounds on loss in adaptive security for certain cryptographic protocols considered in the framework. We prove lower bounds that almost match the upper bounds (proven using the framework) for proxy re-encryption, prefix-constrained PRFs and generalized selective decryption, a security game that captures the security of certain group messaging and broadcast encryption schemes. Those primitives have in common that their security game involves an underlying graph that can be adaptively built by the adversary. Some of our lower bounds only apply to a restricted class of black-box reductions which we term “oblivious” (the existing upper bounds are of this restricted type), some apply to the broader but still restricted class of non-rewinding reductions, while our lower bound for proxy re-encryption applies to all black-box reductions. The fact that some of our lower bounds seem to crucially rely on obliviousness or at least a non-rewinding reduction hints to the exciting possibility that the existing upper bounds can be improved by using more sophisticated reductions. Our main conceptual contribution is a two-player multi-stage game called the Builder-Pebbler Game. We can translate bounds on the winning probabilities for various instantiations of this game into cryptographic lower bounds for the above-mentioned primitives using oracle separation techniques.
en_US
dc.language.iso
en
en_US
dc.publisher
Springer
en_US
dc.subject
adaptive security
en_US
dc.subject
lower bounds
en_US
dc.subject
generalised selective decryption
en_US
dc.subject
group messaging
en_US
dc.subject
constrained pseudorandom function
en_US
dc.subject
proxy re-encryption
en_US
dc.title
The Cost of Adaptivity in Security Games on Graphs
en_US
dc.type
Conference Paper
dc.date.published
2021-11-04
ethz.book.title
Theory of Cryptography
en_US
ethz.journal.title
Lecture Notes in Computer Science
ethz.journal.volume
13043
en_US
ethz.journal.abbreviated
LNCS
ethz.pages.start
550
en_US
ethz.pages.end
581
en_US
ethz.event
19th International Conference on Theory of Cryptography (TCC 2021)
en_US
ethz.event.location
Raleigh, NC, USA
en_US
ethz.event.date
November 8-11, 2021
en_US
ethz.grant
Preparing Cryptography for Modern Applications
en_US
ethz.identifier.wos
ethz.publication.place
Cham
en_US
ethz.publication.status
published
en_US
ethz.leitzahl
ETH Zürich::00002 - ETH Zürich::00012 - Lehre und Forschung::00007 - Departemente::02150 - Dep. Informatik / Dep. of Computer Science::02643 - Institut für Theoretische Informatik / Inst. Theoretical Computer Science::09693 - Hofheinz, Dennis / Hofheinz, Dennis
en_US
ethz.leitzahl.certified
ETH Zürich::00002 - ETH Zürich::00012 - Lehre und Forschung::00007 - Departemente::02150 - Dep. Informatik / Dep. of Computer Science::02643 - Institut für Theoretische Informatik / Inst. Theoretical Computer Science::09693 - Hofheinz, Dennis / Hofheinz, Dennis
en_US
ethz.grant.agreementno
724307
ethz.grant.agreementno
724307
ethz.grant.fundername
EC
ethz.grant.fundername
EC
ethz.grant.funderDoi
10.13039/501100000780
ethz.grant.funderDoi
10.13039/501100000780
ethz.grant.program
H2020
ethz.grant.program
H2020
ethz.date.deposited
2021-11-08T15:50:41Z
ethz.source
FORM
ethz.eth
yes
en_US
ethz.availability
Metadata only
en_US
ethz.rosetta.installDate
2021-11-09T07:52:44Z
ethz.rosetta.lastUpdated
2022-03-29T15:54:40Z
ethz.rosetta.versionExported
true
ethz.COinS
ctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.atitle=The%20Cost%20of%20Adaptivity%20in%20Security%20Games%20on%20Graphs&rft.jtitle=Lecture%20Notes%20in%20Computer%20Science&rft.date=2021&rft.volume=13043&rft.spage=550&rft.epage=581&rft.issn=0302-9743&1611-3349&rft.au=Kamath,%20Chethan&Klein,%20Karen&Pietrzak,%20Krzysztof&Walter,%20Michael&rft.isbn=978-3-030-90452-4&978-3-030-90453-1&rft.genre=proceeding&rft_id=info:doi/10.1007/978-3-030-90453-1_19&rft.btitle=Theory%20of%20Cryptography
 Printexemplar via ETH-Bibliothek suchen

Dateien zu diesem Eintrag

DateienGrößeFormatIm Viewer öffnen

Zu diesem Eintrag gibt es keine Dateien.

Publikationstyp

Zur Kurzanzeige