Limits of provable security from standard assumptions

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We show that the security of some well-known cryptographic protocols, primitives and assumptions (e.g., the Schnorr identification scheme, commitments secure under adaptive selective-decommitment, the 'one-more' discrete logarithm assumption) cannot be based on any standard assumption using a Turing (i.e., black-box) reduction. These results follow from a general result showing that Turing reductions cannot be used to prove security of constant-round sequentially witness-hiding special-sound protocols for unique witness relations, based on standard assumptions; we emphasize that this result holds even if the protocol makes non-black-box use of the underlying assumption.

Original languageEnglish
Title of host publicationSTOC'11 - Proceedings of the 43rd ACM Symposium on Theory of Computing
PublisherAssociation for Computing Machinery
Pages109-118
Number of pages10
ISBN (Print)9781450306911
DOIs
StatePublished - 2011
Externally publishedYes
Event43rd ACM Symposium on Theory of Computing, STOC 2011 - San Jose, United States
Duration: 6 Jun 20118 Jun 2011

Publication series

NameProceedings of the Annual ACM Symposium on Theory of Computing

Conference

Conference43rd ACM Symposium on Theory of Computing, STOC 2011
Country/TerritoryUnited States
CitySan Jose
Period6/06/118/06/11

Keywords

  • black-box separations
  • cryptography
  • intractability assumptions

All Science Journal Classification (ASJC) codes

  • Software

Fingerprint

Dive into the research topics of 'Limits of provable security from standard assumptions'. Together they form a unique fingerprint.

Cite this