• Non ci sono risultati.

Secure Computation Under Network and Physical Attacks

N/A
N/A
Protected

Academic year: 2021

Condividi "Secure Computation Under Network and Physical Attacks"

Copied!
2
0
0

Testo completo

(1)

Secure Computation Under Network and Physical Attacks

Alessandra Scafuro

Abstract

This thesis proposes several protocols for achieving secure com- putation under concurrent and physical attacks. Secure computation allows many parties to compute a joint function of their inputs, while keeping the privacy of their input preserved. It is required that the pri- vacy one party’s input is preserved even if other parties participating in the protocol collude or deviate from the protocol.

In this thesis we focus on concurrent and physical attacks, where adversarial parties try to break the privacy of honest parties by ex- ploiting the network connection or physical weaknesses of the honest parties’ machine.

In the first part of the thesis we discuss how to construct proto- cols that are Universally Composable (UC for short) based on physical setup assumptions. We explore the use of Physically Uncloneable Func- tions (PUFs) as setup assumption for achieving UC-secure computa- tions. PUF are physical noisy source of randomness. The use of PUFs in the UC-framework has been proposed already in [14]. However, this work assumes that all PUFs in the system are trusted. This means that, each party has to trust the PUFs generated by the other parties.

In this thesis we focus on reducing the trust involved in the use of such PUFs and we introduce the Malicious PUFs model in which only PUFs generated by honest parties are assumed to be trusted. Thus the secu- rity of each party relies on its own PUF only and holds regardless of the goodness of the PUFs generated/used by the adversary. We are able to show that, under this more realistic assumption, one can achieve UC- secure computation, under computational assumptions. Moreover, we show how to achieve unconditional UC-secure commitments with (ma- licious) PUFs and with stateless tamper-proof hardware tokens. We discuss our contribution on this matter in Part I. These results are contained in papers [80] and [28].

In the second part of the thesis we focus on the concurrent setting, and we investigate on protocols achieving round optimality and black- box access to a cryptographic primitive. We study two fundamental

1

(2)

functionalities: commitment scheme and zero knowledge, and we focus on some of the round-optimal constructions and lower bounds con- cerning both functionalities. We find that such constructions present subtle issues. Hence, we provide new protocols that actually achieve the security guarantee promised by previous results.

Concerning physical attacks, we consider adversaries able to re- set the machine of the honest party. In a reset attack a machine is forced to run a protocol several times using the same randomness. In this thesis we provide the first construction of a witness indistinguish- able argument system that is simultaneous resettable and argument of knowledge. We discuss about this contribution in Part III, which is the content of the paper [24].

2

Riferimenti

Documenti correlati

In that case, the authors fitted the broadband spectrum of the source using the self-consistent models reflionx and xillver reproducing the spectrum; nev- ertheless, the authors

stati, e per la sua capacità di renderne miglior conto, è dunque da riconsiderare con assoluto favore l’ipotesi di un frammento di commedia ajrcai'a. 182 sulla base di

UVC irradiation was able to reverse biological ageing of titanium by greatly reducing the amount of carbon contamination present on the implant surface by up to 4 times, while

During the trials the following bedding materials were tested: flax straw, hemp litter, rice husk, coconut litter, wood chips.. Flax straw is a completely vegetable

I risultati qui ottenuti, se confrontati con i dati della biologia della pesca demersale, possono fornire importanti dati al fine di pianificare misure di gestione per le

In this work we report the experimental measurements of Gutmann AN of different ethylammonium alkanoate, EAX (ethylammonium methanoate, EAM; etylammonium propanoate,

As a consequence we predict that the scaling of the heating rate with axial magnetic field intensity B 0 , which depends on the spectral index of total energy for given loop

Infine si possono registrare carenze derivanti dal fenomeno di liquefazione del terreno (§2.1.1 del presente lavoro di tesi). In tal caso gli interventi devono riguardare un’area più