Provable and Practical Security: 14th International Conference, ProvSec 2020, Singapore, November 29 – December 1, 2020, Proceedings 9783030625757, 9783030625764

This book constitutes the refereed proceedings of the 14th International Conference on Provable Security, ProvSec 2020,

499 55 12MB

English Pages 423 [426] Year 2020

Report DMCA / Copyright

DOWNLOAD FILE

Provable and Practical Security: 14th International Conference, ProvSec 2020, Singapore, November 29 – December 1, 2020, Proceedings
 9783030625757, 9783030625764

Table of contents :
Preface
Organization
Contents
Signature Schemes
Group Signature Without Random Oracles from Randomizable Signatures
1 Introduction
2 Preliminaries
2.1 Bilinear Groups
2.2 Digital Signature
2.3 Computational Assumptions
3 Group Signature
4 Our Group Signature
4.1 The Construction
4.2 Security Results
5 Efficiency Comparison
6 Conclusion
References
Constant-Size Lattice-Based Group Signature with Forward Security in the Standard Model
1 Introduction
1.1 Our Contribution
1.2 Overview of the Building Blocks for Our Construction
1.3 Our Construction
2 Preliminaries
2.1 Lattices and Trapdoors
2.2 Delegation Functions
2.3 Evaluation Functions
2.4 Building Blocks for Our Construction
3 Forward-Secure Indexed Attribute-Based Signature Scheme from Lattices
3.1 Framework and Security Properties
3.2 Construction of FSI-ABS Scheme from Lattices
3.3 Security Proofs
4 Forward-Secure Group Signature Scheme
4.1 Forward-Secure Group Signature from Lattices
4.2 Security
References
A Lattice-Based Provably Secure Multisignature Scheme in Quantum Random Oracle Model
1 Introduction
1.1 Our Contribution
1.2 Future Works
2 Preliminaries
2.1 Quantum Computation
2.2 Quantum Random Oracle Model
2.3 Lattice
2.4 Multisignature Scheme
3 A Dilithium-Based Multisignature Scheme
3.1 Supporting Algorithms
3.2 Proposed Scheme
3.3 Security
References
Achieving Pairing-Free Aggregate Signatures using Pre-Communication between Signers
1 Introduction
1.1 Properties of Aggregate Signatures and Multi-signatures
1.2 Our Contributions
1.3 Difficulty and Our Techniques
1.4 Related Work
2 Preliminaries
2.1 Notation
2.2 Hardness Assumption
3 Aggregate Signatures with Pre-Communication
3.1 Definition
3.2 Our AS Scheme with PreCom (PCAS)
4 Performance Comparison among Aggregate Signature Scheme and Related Schemes
5 How to Avoid Drijvers et al.'s Impossibility
6 Conclusion
References
Short Lattice Signatures in the Standard Model with Efficient Tag Generation
1 Introduction
1.1 Background
1.2 Related Works
1.3 Contributions
2 Preliminaries
2.1 Digital Signatures
2.2 Security Classes
2.3 Lattice and Gaussian
2.4 Lattice Trapdoor
2.5 Trapdoor Commitments
3 Mildly Secure Scheme
3.1 Tags
3.2 Construction
3.3 Security Analysis
4 Fully Secure Scheme
4.1 Conditions of TCOM
4.2 Construction
4.3 Security Analysis
5 Reduction Loss
6 Conclusion
A Proof of Theorem 2
References
One-Time Delegation of Unlinkable Signing Rights and Its Application
1 Introduction
2 Preliminaries
3 One-Time Delegation of Okamoto-Schnorr Signing
3.1 Instantiating OS Signing OTP with Clouds
4 One-Time Multi-Run-Detectable Delegation Based on Anonymous Credentials
5 E-Cash Based on Signing OTPs
References
Watermarkable Signature with Computational Function Preserving
1 Introduction
1.1 Backgrounds
1.2 Our Contributions
1.3 Related Works
1.4 Road Map
1.5 Notations
2 Watermarkable Signature
3 Construction
3.1 Correctness and Security Proof
4 Relation with Previous Definitions of Watermarking
5 Conclusions
A Basic Cryptographic Primitives
A.1 Public Key Encryption
A.2 Digital Signature
B Watermarkable Signature in Previous Works
B.1 Definition by Goyal et al. ch7GKMsps19
B.2 Definition by Cohen et al. ch7CHNsps16
References
Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments
1 Introduction
1.1 Organization
2 Related Work
3 Preliminaries
3.1 Complexity Assumption
3.2 Secure Naming Scheme
4 Definitions of Our DV-PPAT
4.1 Syntax of DV-PPAT
4.2 Notions of Security for DV-PPAT
5 Our Construction
5.1 Security Results
6 Performance Evaluation
7 Conclusions
References
Encryption Schemes and NIZKs
Semi-Adaptively Secure Offline Witness Encryption from Puncturable Witness PRF
1 Introduction
2 Preliminaries
2.1 Pseudorandom Generator
2.2 Puncturable Pseudorandom Function
2.3 Symmetric Key Encryption
2.4 Puncturable Witness Pseudorandom Function
2.5 Offline Witness Encryption
2.6 Obfuscation
3 Construction: (Extractable) Offline Witness Encryption
4 Informal Description: (Extractable) Offline Functional Witness Encryption
5 Construction: Puncturable Witness(-Extractable) Pseudorandom Function
6 Conclusion
A Formal Proof of Theorem 3
References
Improved Indistinguishability for Searchable Symmetric Encryption
1 Introduction
2 Preliminaries
2.1 Leakage Function
2.2 SSE Security Model
2.3 Practical Attacks
3 Redefining SSE Indistinguishability
3.1 Security Goals
3.2 Adversary Models
3.3 Relation to Current Security Definitions
4 o o -B
4.1 IND-CKA by ALOA
4.2 Count Attack by AKDDA
5 o o -B with Cluster Padding
5.1 IND-CKA by AKFDA
5.2 File Injection Attack by ALOA
6 Conclusion
A L-security by ch10SECD:ChaseK10
B SSE Indistinguishability by ch10SSE:CurtmolaGKO06
C o o -B
D Result-Hiding o o -B
References
Receiver Selective Opening CCA Secure Public Key Encryption from Various Assumptions
1 Introduction
1.1 Background and Motivation
1.2 Our Contribution
1.3 Related Work
2 Preliminaries
2.1 Notations
2.2 Public Key Encryption
2.3 Receiver Non-committing Encryption
2.4 Signature
2.5 Commitment
2.6 Designated-Verifier Non-interactive Zero-Knowledge Arguments
3 Construction of One-Time Simulation Sound DV-NIZK
3.1 Description
3.2 Security Proof
4 Construction of RNC-CCA Secure RNCE
4.1 Description
4.2 Security Proof
References
A Practical NIZK Argument for Confidential Transactions over Account-Model Blockchain
1 Introduction
1.1 Our Contributions
1.2 Technical Overview
2 Preliminaries
2.1 Cryptographic Primitives
2.2 Zero Knowledge Proof
2.3 Smart Contracts for Payment over Blockchains
3 NIZK Argument and Its Application to CTSC
3.1 Definition of CTSC Scheme
3.2 Non-interactive Zero-Knowledge Argument
3.3 Construction of CTSC Scheme
4 Optimization and Evaluation
4.1 Optimization
4.2 Evaluation
A Missing Proof of Theorem 1
References
Secure Machine Learning and Multiparty Computation
Secure Cumulative Reward Maximization in Linear Stochastic Bandits
1 Introduction
2 Preliminaries
3 LinUCB-DS
4 Security Analysis
5 Experiments
6 Adaptability of LinUCB-DS
7 Conclusions
A Appendix: Security Proofs for Sect.4
References
Secure Transfer Learning for Machine Fault Diagnosis Under Different Operating Conditions
1 Introduction
2 Preliminaries
2.1 Fully Homomorphic Encryption
2.2 Neural Network Inference and Training
2.3 Transfer Learning
3 PrivGD: Secure Neural Network Training with FHE
3.1 Matrix Multiplications with Packed FHE Ciphertexts
3.2 Neural Network Training with FHE
3.3 Multi-class Classifier Training in FHE with Approximated Softmax
3.4 Current Challenges and Our Approach
4 Secure Transfer Learning for Personalized Machine Fault Diagnosis
4.1 The Machine Vibration Sensor Datasets
4.2 Network Model for Machine Fault Diagnosis
4.3 Secure Model Fine-Tuning Across Different Operating Conditions
4.4 Implementation of Secure Fine-Tuning Process
4.5 FHE Parameters Selection
5 Experiment Evaluation
5.1 Experiment Server Setup
5.2 Experiment Results
5.3 Running Performances of Fine-Tuning with FHE
6 Related Work
7 Conclusion
References
Private Decision Tree Evaluation with Constant Rounds via (Only) SS-3PC over Ring
1 Introduction
1.1 Backgrounds
1.2 Our Results
1.3 Related Work
2 Preliminaries
2.1 Notations
2.2 2-Out-of-3 Replicated Secret Sharing Scheme ((2,3)-RSS) and 2-Out-of-2 Additive Secret Sharing Scheme ((2,2)-ASS)
2.3 Secure Three-Party Computation with One Corruption over Ring
2.4 Structure of Decision Tree
2.5 Building Blocks of Three-Party Computation Protocol over Ring
3 Proposed Protocol in Feature Selection Phase
4 Proposed Protocol in Comparison Phase
5 Proposed Protocol in Path Evaluation Phase
6 Proposed Protocol of Private Decision Tree Evaluation
7 Security Proof
8 Conclusion
A Naive Construction of PDTE
References
Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses
1 Introduction
2 Preliminaries
3 New Security Model for Superposition Attacks
4 The Modified Honest-but-Curious Yao Protocol
4.1 Definitions for Symmetric Encryption Schemes
4.2 The Original Yao Protocol
4.3 Presentation of the Modified Yao Protocol
5 Analysis of Yao's Protocol with Superposition Access
5.1 Attacking the Modified Yao Protocol via Superpositions
5.2 Superposition-Resistant Yao Protocol
6 Conclusion
References
Secret Sharing Schemes
Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles
1 Introduction
1.1 Our Contributions
2 Definitions and Modelling
2.1 Secret Sharing
2.2 Rational Secret Sharing
2.3 Homomorphic TLPs
3 A Fair and Sound Non-simultaneous Rational Secret Sharing Scheme
3.1 Our Construction
3.2 A Concrete Instantiation
References
Optimal Threshold Changeable Secret Sharing with New Threshold Change Range
1 Introduction
2 Preliminaries
3 Constructions with New Threshold Change Range
3.1 Generic Construction
3.2 New Optimal Threshold Changeable Secret Sharing
3.3 Extending the Results to Universal Threshold Change
4 Completeness Results for Secret Sharing with Full Reconstruction
5 Conclusion
References
Security Analyses
Key Recovery Under Plaintext Checking Attack on LAC
1 Introduction
1.1 Our Contributions
1.2 Techniques
1.3 Related Work
1.4 Organization
2 Preliminaries
2.1 Mathematical Notations
2.2 KR-PCA Attack
2.3 LAC.CPA
3 KR-PCA Attack on LAC.CPA
3.1 Choosing Special m
3.2 Choosing m Randomly
3.3 Attack on LAC-256
3.4 Number of Queries and Probability of Success
4 Recovering Reused Key in LAC.KE
5 Conclusion
References
Security of Two NIST Candidates in the Presence of Randomness Reuse
1 Introduction
1.1 Our Contributions
1.2 Techniques
1.3 Related Work
1.4 Organization
2 Preliminaries
2.1 Mathematical Notations
2.2 RLWE Problem
2.3 Cryptographic Definitions
2.4 NewHope-CPA-PKE
2.5 LAC.CPA
3 A Meta-PKE Construction
4 A Feature of Meta-PKE
5 The Recovery of Reused Randomness in NewHope-CPA-KEM and LAC.KE
5.1 The Reused Randomness Recovery Game
5.2 Recovering Randomness in NewHope-CPA-KEM
5.3 Recovering Randomness in LAC.KE
5.4 Recovering the Shared Secret in Another Session
6 Conclusion
References
Author Index

Polecaj historie