Fast Non-Malleable Commitments

被引:9
|
作者
Brenner, Hai [1 ]
Goyal, Vipul [2 ,3 ]
Richelson, Silas [3 ,4 ]
Rosen, Alon [1 ]
Vald, Margarita [5 ]
机构
[1] IDC Herzliya, Efi Arazi Sch Comp Sci, Herzliyya, Israel
[2] Microsoft Res, Bangalore, Karnataka, India
[3] IDC Herzliya, Herzliyya, Israel
[4] UCLA, Los Angeles, CA USA
[5] Tel Aviv Univ, Blavatnik Sch Comp Sci, Tel Aviv, Israel
基金
欧洲研究理事会;
关键词
Non-malleable Commitments; Elliptic Curve Cryptography; Protocols; Practical implementation;
D O I
10.1145/2810103.2813721
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The notion of non-malleability in cryptography refers to the setting where the adversary is a man-in-the-middle (MIM) who takes part in two or more protocol executions and tries to use information obtained in one, to violate the security of another. Despite two decades of research, non-malleable commitments (NMCs) have remained too inefficient to be implemented in practice, without some sort of trusted setup. In this work, we give a fast implementation of NMC in the plain model, based on the DDH assumption being hard over elliptic curve groups. Our main theoretical result is a new NMC scheme which can be thought of as a "high dimensional" generalization of the one in the recent work of [GRRV14]. Central to our efficiency improvements is a method of constraining challenges sent by the receiver. This new approach enables us to obtain dramatically improved parameters over those suggested in [GRRV14]. In particular, our work opens the door to implementations based on Elliptic Curves. Our prototype implementation gives evidence of our protocol's efficiency. Additionally, like the Elgamal commitment it is built on top of, our scheme allows for homomrphic operations on committed values, and is amenable to fast Schnorr proofs of knowledge. Thus, it will work well when used as a building block inside larger cryptographic protocols. As an example of its performance, our protocol allows a committer to commit to a 1.9-KB message using a scheme supporting 2 20 identities in less than one second.
引用
收藏
页码:1048 / 1057
页数:10
相关论文
共 50 条
  • [21] Unprovable Security of Perfect NIZK and Non-interactive Non-malleable Commitments
    Rafael Pass
    computational complexity, 2016, 25 : 607 - 666
  • [22] Unprovable Security of Perfect NIZK and Non-interactive Non-malleable Commitments
    Pass, Rafael
    THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 334 - 354
  • [23] Non-Malleable Extractors and Non-Malleable Codes: Partially Optimal Constructions
    Li, Xin
    34TH COMPUTATIONAL COMPLEXITY CONFERENCE (CCC 2019), 2019, 137
  • [24] Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable Commitments
    Dachman-Soled, Dana
    Malkin, Tal
    Raykova, Mariana
    Venkitasubramaniam, Muthuramakrishnan
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013, PT I, 2013, 8269 : 316 - 336
  • [25] Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments
    Cao, Zhenfu
    Visconti, Ivan
    Zhang, Zongyang
    PUBLIC KEY CRYPTOGRAPHY - PKC 2010, PROCEEDINGS, 2010, 6056 : 193 - +
  • [26] Non-Malleable Codes
    Dziembowski, Stefan
    Pietrzak, Krzysztof
    Wichs, Daniel
    JOURNAL OF THE ACM, 2018, 65 (04)
  • [27] Concurrent non-malleable commitments from any one-way function
    Lin, Huijia
    Pass, Rafael
    Venkitasubramaniam, Muthuramakrishnan
    THEORY OF CRYPTOGRAPHY, 2008, 4948 : 571 - 588
  • [28] Non-malleable Obfuscation
    Canetti, Ran
    Varia, Mayank
    THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 73 - +
  • [29] Improved Non-malleable Extractors, Non-malleable Codes and Independent Source Extractors
    Li, Xin
    STOC'17: PROCEEDINGS OF THE 49TH ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING, 2017, : 1144 - 1156
  • [30] Efficient ID-based non-malleable trapdoor commitments based on RSA and factoring
    Wu, Chunhui
    Li, Qin
    Long, Dongyang
    Journal of Communications, 2015, 10 (05): : 330 - 338