Secure Computation Without Authentication

被引:0
|
作者
Boaz Barak
Ran Canetti
Yehuda Lindell
Rafael Pass
Tal Rabin
机构
[1] Microsoft Research New England,Department of Computer Science
[2] Tel-Aviv University,Department of Computer Science
[3] Bar-Ilan University,undefined
[4] Cornell University,undefined
[5] IBM T.J. Watson,undefined
来源
Journal of Cryptology | 2011年 / 24卷
关键词
Multiparty computations; Unauthenticated channels; Man-in-the-middle attacks; Universal composability (UC); Password authentication; Partially-authenticated networks;
D O I
暂无
中图分类号
学科分类号
摘要
Research on secure multiparty computation has mainly concentrated on the case where the parties can authenticate each other and the communication between them. This work addresses the question of what security can be guaranteed when authentication is not available. We consider a completely unauthenticated setting, where all messages sent by the parties may be tampered with and modified by the adversary without the uncorrupted parties being able to detect this fact. In this model, it is not possible to achieve the same level of security as in the authenticated-channel setting. Nevertheless, we show that meaningful security guarantees can be provided: Essentially, all the adversary can do is to partition the network into disjoint sets, where in each set the computation is secure in of itself, and also independent of the computation in the other sets. In this setting we provide, for the first time, nontrivial security guarantees in a model with no setup assumptions whatsoever. We also obtain similar results while guaranteeing universal composability, in some variants of the common reference string model. Finally, our protocols can be used to provide conceptually simple and unified solutions to a number of problems that were studied separately in the past, including password-based authenticated key exchange and nonmalleable commitments. As an application of our results, we study the question of constructing secure protocols in partially authenticated networks, where some of the links are authenticated, and some are not (as is the case in most networks today).
引用
收藏
页码:720 / 760
页数:40
相关论文
共 50 条
  • [1] Secure computation without authentication
    Barak, B
    Canetti, R
    Lindell, Y
    Pass, R
    Rabin, T
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2005, PROCEEDINGS, 2005, 3621 : 361 - 377
  • [2] Secure Computation Without Authentication
    Barak, Boaz
    Canetti, Ran
    Lindell, Yehuda
    Pass, Rafael
    Rabin, Tal
    [J]. JOURNAL OF CRYPTOLOGY, 2011, 24 (04) : 720 - 760
  • [3] Secure computation without computers
    D'Arco, Paolo
    De Prisco, Roberto
    [J]. THEORETICAL COMPUTER SCIENCE, 2016, 651 : 11 - 36
  • [4] Secure computation without agreement
    Goldwasser, S
    Lindell, Y
    [J]. DISTRIBUTED COMPUTING, PROCEEDINGS, 2002, 2508 : 17 - 32
  • [5] A secure dynamic remote user authentication without any secure channel
    Saxena, Ashutosh
    [J]. NEW TECHNOLOGIES, MOBILITY AND SECURITY, 2007, : 617 - 617
  • [6] Secure Computation for Privacy Preserving Biometric Data Retrieval and Authentication
    Sy, Bon
    [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2008, 5376 : 143 - 154
  • [7] Characterization of Secure Multiparty Computation Without Broadcast
    Cohen, Ran
    Haitner, Iftach
    Omri, Eran
    Rotem, Lior
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT I, 2016, 9562 : 596 - 616
  • [8] Characterization of Secure Multiparty Computation Without Broadcast
    Ran Cohen
    Iftach Haitner
    Eran Omri
    Lior Rotem
    [J]. Journal of Cryptology, 2018, 31 : 587 - 609
  • [9] Four Round Secure Computation Without Setup
    Brakerski, Zvika
    Halevi, Shai
    Polychroniadou, Antigoni
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2017, PT I, 2017, 10677 : 645 - 677
  • [10] Characterization of Secure Multiparty Computation Without Broadcast
    Cohen, Ran
    Haitner, Iftach
    Omri, Eran
    Rotem, Lior
    [J]. JOURNAL OF CRYPTOLOGY, 2018, 31 (02) : 587 - 609