Paper 2017/1092
Universally Composable Secure Computation with Corrupted Tokens
Nishanth Chandran, Wutichai Chongchitmate, Rafail Ostrovsky, and Ivan Visconti
Abstract
We introduce the \emph{corrupted token model}. This model generalizes the \emph{tamper-proof token model} proposed by Katz (EUROCRYPT '07) relaxing the trust assumption on the honest behavior of tokens. Our model is motivated by the real-world practice of outsourcing hardware production to possibly corrupted manufacturers. We capture the malicious behavior of token manufacturers by allowing the adversary to corrupt the tokens of honest players at the time of their creation.
We show that under minimal complexity assumptions, i.e., the existence of one-way functions, it is possible to UC-securely realize (a variant of) the tamper-proof token functionality of Katz in the corrupted token model with
Metadata
- Available format(s)
-
PDF
- Category
- Cryptographic protocols
- Publication info
- Preprint. MINOR revision.
- Keywords
- tamper-proof tokencorruptiblesetup assumptionUC securityMPC
- Contact author(s)
- wutichai ch @ chula ac th
- History
- 2018-10-07: revised
- 2017-11-10: received
- See all versions
- Short URL
- https://ia.cr/2017/1092
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2017/1092, author = {Nishanth Chandran and Wutichai Chongchitmate and Rafail Ostrovsky and Ivan Visconti}, title = {Universally Composable Secure Computation with Corrupted Tokens}, howpublished = {Cryptology {ePrint} Archive, Paper 2017/1092}, year = {2017}, url = {https://eprint.iacr.org/2017/1092} }