Affiliation:
1. Shandong University
2. Northwestern University
3. Shanghai Qizhi Institute & PADO Labs
4. Shanghai Jiao Tong University
Abstract
Multi-user (mu) security considers large-scale attackers that, given access to a number of cryptosystem instances, attempt to compromise at least one of them. We initiate the study of mu security of the so-called GGM tree that stems from the pseudorandom generator to pseudorandom function transformation of Goldreich, Goldwasser, and Micali, with a goal to provide references for its recently popularized use in applied cryptography. We propose a generalized model for GGM trees and analyze its
mu prefix-constrained pseudorandom function
security in the random oracle model. Our model allows to derive concrete bounds and improvements for various protocols, and we showcase on the Bitcoin-Improvement-Proposal standard
Bip32
hierarchical wallets and function secret sharing protocols. In both scenarios, we propose improvements with better performance and concrete security bounds at the same time. Compared with the state-of-the-art designs, our
SHACAL3
- and
Keccak
-p-based
Bip32
variants reduce the communication cost of MPC-based implementations by 73.3% to 93.8%, whereas our
AES
-based function secret sharing substantially improves mu security while reducing computations by 50%.
Funder
National Key Research and Development Program of China
National Natural Science Foundation of China
Taishan Scholars Program
NSF
Major Program of Guangdong Basic and Applied Research
Publisher
Association for Computing Machinery (ACM)
Subject
Safety, Risk, Reliability and Quality,General Computer Science
Reference52 articles.
1. Nabil Alkeilani Alkadri, Poulami Das, Andreas Erwig, Sebastian Faust, Juliane Krämer, Siavash Riahi, and Patrick Struck. 2020. Deterministic wallets in a quantum world. In Proceedings of the ACM Conference on Computer and Communications Security (CCS’20). ACM, New York, NY, 1017–1031.
2. Myrto Arapinis Andriana Gkaniatsou Dimitris Karakostas and Aggelos Kiayias. 2019. A formal treatment of hardware wallets. In Financial Cryptography and Data Security . Lecture Notes in Computer Science Vol. 11598. Springer 426–445.
3. A Survey of ECDSA Threshold Signing;Aumasson Jean-Philippe;Report 2020/1390,2020
4. Carsten Baum Alex J. Malozemoff Marc B. Rosen and Peter Scholl. 2021. Mac’n’Cheese: Zero-knowledge proofs for boolean and arithmetic circuits with nested disjunctions. In Advances in Cryptology—CRYPTO 2021 . Lecture Notes in Computer Science Vol. 12828. Springer 92–122.
5. Mihir Bellare Daniel J. Bernstein and Stefano Tessaro. 2016. Hash-function based PRFs: AMAC and its multi-user security. In Advances in Cryptology—EUROCRYPT 2016 . Lecture Notes in Computer Science Vol. 9665. Springer 566–595.