Publication:
Auditable Asymmetric Password Authenticated Public Key Establishment

dc.affiliation.dptoUC3M. Departamento de Matemáticases
dc.contributor.authorFaonio, Antonio
dc.contributor.authorGonzález Vasco, María Isabel
dc.contributor.authorSoriente, Claudio
dc.contributor.authorTruong, Hien Thi Thu
dc.contributor.funderMinisterio de Economía y Competitividad (España)es
dc.date.accessioned2023-12-13T11:17:49Z
dc.date.available2023-12-13T11:17:49Z
dc.date.issued2022-11
dc.descriptionProceedings of: 21st International Conference on Cryptology and Network Security (CANS 2022), 13-16 November 2022, Abu Dhabi, UAE.en
dc.description.abstractNon-interactive zero-knowledge (NIZK) arguments allow a prover to convince a verifier about the truthfulness of an N P-statement by sending just one message, without disclosing any additional information. In several practical scenarios, the Fiat-Shamir transform is used to convert an efficient constant-round public-coin honest-verifier zero-knowledge proof system into an efficient NIZK argument system. This approach is provably secure in the random oracle model, crucially requires the programmability of the random oracle and extraction works through rewinds. The works of Lindell [TCC 2015] and Ciampi et al. [TCC 2016] proposed efficient NIZK arguments with non-programmable random oracles along with a programmable common reference string. In this work we show an efficient NIZK argument with straight-line simulation and extraction that relies on features that alone are insufficient to construct NIZK arguments (regardless of efficiency). More specifically we consider the notion of quasi-polynomial time simulation proposed by Pass in [EUROCRYPT 2003] and combine it with simulation and extraction with non-programmable random oracles thus obtaining a NIZK argument of knowledge where neither the zero-knowledge simulator, nor the argument of knowledge extractor needs to program the random oracle. Still, both the simulator and the extractor are straightline. Our construction uses as a building block a modification of the Fischlin’s transform [CRYPTO 2005] and combines it with the concept of dense puzzles introduced by Baldimtsi et al. [ASIACRYPT 2016]. We also argue that our NIZK argument system inherits the efficiency features of Fischlin’s transform, which represents the main advantage of Fischlin’s protocol over existing schemes.en
dc.description.sponsorshipM.I.G. Vasco is supported by research grant PID2019-109379RB-100 from Spanish MINECO. Antonio Faonio is partially supported by the MESRI-BMBF French-German joint project named PROPOLIS (ANR-20-CYAL-0004-01).en
dc.format.extent21
dc.identifier.bibliographicCitationFaonio, A., Gonzalez Vasco, M. I., Soriente, C. & Truong, H. T. T. (2022). Auditable Asymmetric Password Authenticated Public Key Establishment. In Beresford, A. R., Patra, A., Bellini, E. (eds), Cryptology and Network Security. CANS 2022. Lecture Notes in Computer Science, 13641 (122–142). Springer, Cham.en
dc.identifier.doihttps://doi.org/10.1007/978-3-031-20974-1_6
dc.identifier.isbn978-3-031-20973-4
dc.identifier.publicationfirstpage122
dc.identifier.publicationlastpage142
dc.identifier.publicationtitleCryptology and Network Security: 21st International Conference, CANS 2022, Abu Dhabi, United Arab Emirates, November 13-16, 2022, Proceedingsen
dc.identifier.publicationvolume13641
dc.identifier.urihttps://hdl.handle.net/10016/39080
dc.identifier.uxxiCC/0000034118
dc.language.isoengen
dc.publisherSpringeren
dc.relation.eventdate2022-11-13
dc.relation.eventplaceEMIRATOS ARABES UNIDOSes
dc.relation.eventtitle21st International Conference on Cryptology and Network Security (CANS 2022)en
dc.relation.ispartofseriesLecture notes in computer scienceen
dc.relation.projectIDGobierno de España. PID2019-109379RB-100es
dc.rights© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG.en
dc.rights.accessRightsopen accessen
dc.subject.ecienciaInformáticaes
dc.subject.ecienciaMatemáticases
dc.subject.ecienciaTelecomunicacioneses
dc.subject.otherOblivious Pseudorandom Functionsen
dc.subject.otherPassword Authenticationen
dc.subject.otherPublic Key Cryptographyen
dc.subject.otherServer-Aided Key Generationen
dc.titleAuditable Asymmetric Password Authenticated Public Key Establishmenten
dc.typeconference proceedings*
dc.type.hasVersionAM*
dspace.entity.typePublication
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Auditable_CANS_2022_ps.pdf
Size:
567.59 KB
Format:
Adobe Portable Document Format