A Unified Approach to Constructing Black-box UC Protocols in Trusted Setup Models

Paper 2017/944

A Unified Approach to Constructing Black-box UC Protocols in Trusted Setup Models

Susumu Kiyoshima, Huijia Lin, and Muthuramakrishnan Venkitasubramaniam

Abstract

We present a unified framework for obtaining black-box constructions of Universal Composable (UC) protocol in trusted setup models. Our result is analogous to the unified framework of Lin, Pass, and Venkitasubramaniam [STOC'09, Asiacrypt'12] that, however, only yields non-black-box constructions of UC protocols. Our unified framework shows that to obtain black-box constructions of UC protocols, it suffices to implement a special purpose commitment scheme that is, in particular, concurrently extractable using a given trusted setup. Using our framework, we improve black-box constructions in the common reference string and tamper-proof hardware token models by weakening the underlying computational and setup assumptions.

Metadata
Available format(s)
PDF
Publication info
Published by the IACR in TCC 2017
Keywords
secure computationblack-box constructions
Contact author(s)
kiyoshima susumu @ lab ntt co jp
rachel lin @ cs ucsb edu
muthuv @ cs rochester edu
History
2017-09-27: received
Short URL
https://ia.cr/2017/944
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2017/944,
      author = {Susumu Kiyoshima and Huijia Lin and Muthuramakrishnan Venkitasubramaniam},
      title = {A Unified Approach to Constructing Black-box {UC} Protocols in Trusted Setup Models},
      howpublished = {Cryptology {ePrint} Archive, Paper 2017/944},
      year = {2017},
      url = {https://eprint.iacr.org/2017/944}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.