iUC: Flexible Universal Composability Made Simple

被引:11
作者
Camenisch, Jan [1 ]
Krenn, Stephan [2 ]
Kuesters, Ralf [3 ]
Rausch, Daniel [3 ]
机构
[1] Dfinity, Zurich, Switzerland
[2] AIT Austrian Inst Technol GmbH, Vienna, Austria
[3] Univ Stuttgart, Stuttgart, Germany
来源
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT III | 2019年 / 11923卷
关键词
Universal Composability; Foundations; SECURITY;
D O I
10.1007/978-3-030-34618-8_7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Proving the security of complex protocols is a crucial and very challenging task. A widely used approach for reasoning about such protocols in a modular way is universal composability. A perfect model for universal composability should provide a sound basis for formal proofs and be very flexible in order to allow for modeling a multitude of different protocols. It should also be easy to use, including useful design conventions for repetitive modeling aspects, such as corruption, parties, sessions, and subroutine relationships, such that protocol designers can focus on the core logic of their protocols. While many models for universal composability exist, including the UC, GNUC, and IITM models, none of them has achieved this ideal goal yet. As a result, protocols cannot be modeled faithfully and/or using these models is a burden rather than a help, often even leading to under-specified protocols and formally incorrect proofs. Given this dire state of affairs, the goal of this work is to provide a framework for universal composability which combines soundness, flexibility, and usability in an unmatched way. Developing such a security framework is a very difficult and delicate task, as the long history of frameworks for universal composability shows. We build our framework, called iUC, on top of the IITM model, which already provides soundness and flexibility while lacking sufficient usability. At the core of iUC is a single simple template for specifying essentially arbitrary protocols in a convenient, formally precise, and flexible way. We illustrate the main features of our framework with example functionalities and realizations.
引用
收藏
页码:191 / 221
页数:31
相关论文
共 25 条
[1]  
[Anonymous], 1993, 97983 ISOIEC IS
[2]  
[Anonymous], 2011, IACR CRYPTOLOGY EPRI
[3]   Universal Composition with Responsive Environments [J].
Camenisch, Jan ;
Enderlein, Robert R. ;
Krenn, Stephan ;
Kuesters, Ralf ;
Rausch, Daniel .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 :807-840
[4]  
Camenisch Krenn S., 2019, 20191073 CRYPT EPRIN
[5]   Universally composable security: A new paradigm for cryptographic protocols [J].
Canetti, R .
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, :136-145
[6]  
Canetti R, 2003, LECT NOTES COMPUT SC, V2729, P265
[7]  
Canetti R, 2002, LECT NOTES COMPUT SC, V2332, P337
[8]   Analyzing security protocols using time-bounded Task-PIOAs [J].
Canetti, Ran ;
Cheung, Ling ;
Kaynar, Dilsun ;
Liskov, Moses ;
Lynch, Nancy ;
Pereira, Olivier ;
Segala, Roberto .
DISCRETE EVENT DYNAMIC SYSTEMS-THEORY AND APPLICATIONS, 2008, 18 (01) :111-159
[9]  
Canetti R, 2007, LECT NOTES COMPUT SC, V4392, P61
[10]   A Universally Composable Treatment of Network Time [J].
Canetti, Ran ;
Hogan, Kyle ;
Malhotra, Aanchal ;
Varia, Mayank .
2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, :360-375