Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. The Limits of Composable Crypto with Transferable Setup Devices
 
conference paper

The Limits of Composable Crypto with Transferable Setup Devices

Boureanu, Ioana
•
Ohkubo, Miyako
•
Vaudenay, Serge  
2015
Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
10th ACM Symposium on Information, Computer and Communications Security

UC security realized with setup devices imposes that single instances of these setups are used. In most cases, UC-realization relies further on other properties of the setups devices, like tamper-resistance. But what happens in stronger versions of the UC framework, like EUC or JUC, where multiple instances of these setups are allowed? Can we formalise what it is about setups like these which makes them sometimes hinder UC, JUC, EUC realizability? In this paper, we answer this question. As such, we formally introduce transferable setups, which can be viewed as setup devices that do not (publicly) disclose if they have been maliciously passed on. Further, we prove the general result that one cannot realize oblivious transfer (OT) or any "interesting" 2-party protocol using transferable setups in the EUC model. As a by-product, we show that physically unclonable functions (PUFs) themselves are transferable devices, which means that one cannot use PUFs as a global setups; this is interesting because non-transferability is a weaker requirement than locality, which until now was the property informally blamed for UC-impossibility results regarding PUFs as global setups. If setups are transferable (i.e., they can be passed on from one party to another without explicit disclosure of a malicious transfer), then they will not intrinsically leak if a relay attack takes place. Indeed, we further prove that if relay attacks are possible then oblivious transfer cannot be realized in the JUC model. Linked to the prevention of relaying, authenticated channels have historically been an essential building stone of the UC model. Related to this, we show how to strengthen some existing protocols UC-realized with PUFs, and render them not only UC-secure but also JUC-secure.

  • Files
  • Details
  • Metrics
Type
conference paper
DOI
10.1145/2714576.2714591
Author(s)
Boureanu, Ioana
Ohkubo, Miyako
Vaudenay, Serge  
Date Issued

2015

Publisher

ACM

Publisher place

New York, NY, USA

Published in
Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
Start page

381

End page

392

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
LASEC  
Event nameEvent placeEvent date
10th ACM Symposium on Information, Computer and Communications Security

Singapore, Singapore

April 14-17, 2015

Available on Infoscience
June 23, 2015
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/115336
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés