CryptoDB
Amir Herzberg
Publications
Year
Venue
Title
2021
CRYPTO
MoSS: Modular Security Specifications Framework
📺
Abstract
Applied cryptographic protocols have to meet a rich set of security requirements under diverse environments and against diverse adversaries. However, currently used security specifications, based on either simulation (e.g., `ideal functionality' in UC) or games, are monolithic, combining together different aspects of protocol requirements, environment and assumptions. Such security specifications are complex, error-prone, and foil reusability, modular analysis and incremental
design.
We present the Modular Security Specifications (MoSS) framework, which cleanly separates the security requirements (goals) which a protocol should achieve, from the models (assumptions) under which each requirement should be ensured. This modularity allows us to reuse individual models and requirements across different protocols and tasks, and to compare
protocols for the same task, either under different assumptions or satisfying different sets of requirements. MoSS is flexible and extendable, e.g., it can support both asymptotic and concrete definitions for security. So far, we confirmed the applicability of MoSS to two applications: secure broadcast protocols and PKI schemes.
2019
PKC
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup
Abstract
With the recent emergence of efficient zero-knowledge (ZK) proofs for general circuits, while efficient zero-knowledge proofs of algebraic statements have existed for decades, a natural challenge arose to combine algebraic and non-algebraic statements. Chase et al. (CRYPTO 2016) proposed an interactive ZK proof system for this cross-domain problem. As a use case they show that their system can be used to prove knowledge of a RSA/DSA signature on a message m with respect to a publicly known Pedersen commitment $$g^m h^r$$. One drawback of their system is that it requires interaction between the prover and the verifier. This is due to the interactive nature of garbled circuits, which are used in their construction. Subsequently, Agrawal et al. (CRYPTO 2018) proposed an efficient non-interactive ZK (NIZK) proof system for cross-domains based on SNARKs, which however require a trusted setup assumption.In this paper, we propose a NIZK proof system for cross-domains that requires no trusted setup and is efficient both for the prover and the verifier. Our system constitutes a combination of Schnorr based ZK proofs and ZK proofs for general circuits by Giacomelli et al. (USENIX 2016). The proof size and the running time of our system are comparable to the approach by Chase et al. Compared to Bulletproofs (SP 2018), a recent NIZK proofs system on committed inputs, our techniques achieve asymptotically better performance on prover and verifier, thus presenting a different trade-off between the proof size and the running time.
Program Committees
- PKC 2014
- PKC 2009
Coauthors
- Michael Backes (1)
- Ray Bird (1)
- Carlo Blundo (1)
- Ran Canetti (2)
- Marc Fischlin (1)
- Inder S. Gopal (1)
- Shai Halevi (1)
- Lucjan Hanzlik (1)
- Amir Herzberg (11)
- Philippe A. Janson (1)
- Stanislaw Jarecki (1)
- Aniket Kate (1)
- Hugo Krawczyk (1)
- Shay Kutten (2)
- Hemi Leibowitz (1)
- Michael Luby (1)
- Refik Molva (1)
- Hod Bin Noon (1)
- Shlomit S. Pinter (1)
- Ivan Pryvalov (1)
- Alfredo De Santis (1)
- Haya Shulman (1)
- Ewa Syta (1)
- Ugo Vaccaro (1)
- Sara Wrotniak (1)
- Igal Yoffe (1)
- Moti Yung (3)