Limits of Provable Security From Standard Assumptions

被引:0
|
作者
Pass, Rafael [1 ]
机构
[1] Cornell Univ, Dept Comp Sci, Ithaca, NY 14853 USA
关键词
Cryptography; Black-box separations; Intractability assumptions;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We show that the security of some well-known cryptographic protocols, primitives and assumptions (e.g., the Schnorr identification scheme, commitments secure under adaptive selective-decommitment, the "one-more" discrete logarithm assumption) cannot be based on any standard assumption using a Turing (i.e., black-box) reduction. These results follow from a general result showing that Turing reductions cannot be used to prove security of constant-round sequentially witness-hiding special-sound protocols for unique witness relations, based on standard assumptions; we emphasize that this result holds even if the protocol makes non-black-box use of the underlying assumption.
引用
收藏
页码:109 / 118
页数:10
相关论文
共 50 条
  • [1] Limits in the Provable Security of ECDSA Signatures
    Hartmann, Dominik
    Kiltz, Eike
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2023, PT IV, 2023, 14372 : 279 - 309
  • [2] Limits of Provable Security for Homomorphic Encryption
    Bogdanov, Andrej
    Lee, Chin Ho
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT I, 2013, 8042 : 111 - 128
  • [3] New Limits of Provable Security and Applications to ElGamal Encryption
    Schage, Sven
    [J]. ADVANCES IN CRYPTOLOGY, PT IV, EUROCRYPT 2024, 2024, 14654 : 255 - 285
  • [4] Certificateless Provable Data Possession Scheme With Provable Security in the Standard Model Suitable for Cloud Storage
    Deng, Lunzhi
    Wang, Bo
    Wang, Tao
    Feng, Shuai
    Li, Siwei
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (06) : 3986 - 3998
  • [5] ADAPTIVE HARDNESS AND COMPOSABLE SECURITY IN THE PLAIN MODEL FROM STANDARD ASSUMPTIONS
    Canetti, Ran
    Lin, Huijia
    Pass, Rafael
    [J]. SIAM JOURNAL ON COMPUTING, 2016, 45 (05) : 1793 - 1834
  • [6] Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions
    Canetti, Ran
    Lin, Huijia
    Pass, Rafael
    [J]. 2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2010, : 541 - 550
  • [7] New key encapsulation mechanism scheme with provable security in the standard model
    Wang, Zecheng
    Wang, Xiu
    [J]. Journal of Information and Computational Science, 2013, 10 (08): : 2291 - 2301
  • [8] Theoretical Limits of Provable Security Against Model Extraction by Efficient Observational Defenses
    Karchmer, Ari
    [J]. 2023 IEEE CONFERENCE ON SECURE AND TRUSTWORTHY MACHINE LEARNING, SATML, 2023, : 605 - 621
  • [9] New provable security CL-PKE encryption scheme in the standard model
    Yang, Yong
    Xu, Qiu-Liang
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2010, 39 (06): : 906 - 910
  • [10] Certificateless encryption scheme with provable security in the standard model suitable for mobile devices
    Deng, Lunzhi
    Feng, Shuai
    Chen, Zhiwei
    [J]. INFORMATION SCIENCES, 2022, 613 : 228 - 238