Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/978-3-031-22963-3_22guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

YOLO YOSO: Fast and Simple Encryption and Secret Sharing in the YOSO Model

Published: 25 January 2023 Publication History

Abstract

Achieving adaptive (or proactive) security in cryptographic protocols is notoriously difficult due to the adversary’s power to dynamically corrupt parties as the execution progresses. Inspired by the work of Benhamouda et al. in TCC 2020, Gentry et al. in CRYPTO 2021 introduced the YOSO (You Only Speak Once) model for constructing adaptively (or proactively) secure protocols in massively distributed settings (e.g. blockchains). In this model, instead of having all parties execute an entire protocol, smaller anonymous committees are randomly chosen to execute each individual round of the protocol. After playing their role, parties encrypt protocol messages towards the next anonymous committee and erase their internal state before publishing their ciphertexts. However, a big challenge remains in realizing YOSO protocols: efficiently encrypting messages towards anonymous parties selected at random without learning their identities, while proving the encrypted messages are valid with respect to the protocol. In particular, the protocols of Benhamouda et al. and of Gentry et al. require showing ciphertexts contain valid shares of secret states. We propose concretely efficient methods for encrypting a protocol’s secret state towards a random anonymous committee. We start by proposing a very simple and efficient scheme for encrypting messages towards randomly and anonymously selected parties. We then show constructions of publicly verifiable secret (re-)sharing (PVSS) schemes with concretely efficient proofs of (re-)share validity that can be generically instantiated from encryption schemes with certain linear homomorphic properties. In addition, we introduce a new PVSS with proof of sharing consisting of just two field elements, which as far as we know is the first achieving this, and may be of independent interest. Finally, we show that our PVSS schemes can be efficiently realized from our encryption scheme.

References

[1]
Benhamouda F et al. Pass R, Pietrzak K, et al. Can a public blockchain keep a secret? Theory of Cryptography 2020 Cham Springer 260-290
[2]
Boudot F and Traoré J Varadharajan V and Mu Y Efficient publicly verifiable secret sharing schemes with fast or delayed recovery Information and Communication Security 1999 Heidelberg Springer 87-102
[3]
Boyle E, Klein S, Rosen A, and Segev G Catalano D and De Prisco R Securing Abe’s mix-net against malicious verifiers via witness indistinguishability Security and Cryptography for Networks 2018 Cham Springer 274-291
[4]
Camenisch J and Lysyanskaya A Franklin M Signature schemes and anonymous credentials from bilinear maps Advances in Cryptology – CRYPTO 2004 2004 Heidelberg Springer 56-72
[5]
Campanelli, M., David, B., Khoshakhlagh, H., Konring, A., Nielsen, J.B.: Encryption to the future: a paradigm for sending secret messages to future (anonymous) committees. Cryptology ePrint Archive, Report 2021/1423 (2021). https://eprint.iacr.org/2021/1423
[6]
Cascudo I and David B Gollmann D, Miyaji A, and Kikuchi H SCRAPE: scalable randomness attested by public entities Applied Cryptography and Network Security 2017 Cham Springer 537-556
[7]
Cascudo I and David B Moriai S and Wang H ALBATROSS: publicly AttestabLe BATched randomness based on secret sharing Advances in Cryptology – ASIACRYPT 2020 2020 Cham Springer 311-341
[8]
Cascudo, I., David, B., Garms, L., Konring, A.: YOLO YOSO: fast and simple encryption and secret sharing in the YOSO model. Cryptology ePrint, Report 2022/242 (2022). https://eprint.iacr.org/2022/242
[9]
Chase M and Lysyanskaya A Dwork C On signatures of knowledge Advances in Cryptology - CRYPTO 2006 2006 Heidelberg Springer 78-96
[10]
David B, Gaži P, Kiayias A, and Russell A Nielsen JB and Rijmen V Ouroboros Praos: an adaptively-secure, semi-synchronous proof-of-stake blockchain Advances in Cryptology – EUROCRYPT 2018 2018 Cham Springer 66-98
[11]
Fujisaki E and Okamoto T Nyberg K A practical and provably secure scheme for publicly verifiable secret sharing and its applications Advances in Cryptology — EUROCRYPT’98 1998 Heidelberg Springer 32-46
[12]
Gentry C et al. Malkin T, Peikert C, et al. YOSO: you only speak once - secure MPC with stateless ephemeral roles Advances in Cryptology – CRYPTO 2021 2021 Cham Springer 64-93
[13]
Gentry, C., Halevi, S., Lyubashevsky, V.: Practical non-interactive publicly verifiable secret sharing with thousands of parties. Cryptology ePrint Archive, Report 2021/1397 (2021). https://eprint.iacr.org/2021/1397
[14]
Gentry C, Halevi S, Magri B, Nielsen JB, and Yakoubov S Nissim K and Waters B Random-index PIR and applications Theory of Cryptography 2021 Cham Springer 32-61
[15]
Goyal R and Goyal V Kalai Y and Reyzin L Overcoming cryptographic impossibility results using blockchains Theory of Cryptography 2017 Cham Springer 529-561
[16]
Heidarvand S and Villar JL Avanzi RM, Keliher L, and Sica F Public verifiability from pairings in secret sharing schemes Selected Areas in Cryptography 2009 Heidelberg Springer 294-308
[17]
Kolby, S., Ravi, D., Yakoubov, S.: Towards efficient YOSO MPC without setup. Cryptology ePrint Archive, Report 2022/187 (2022). https://eprint.iacr.org/2022/187
[18]
Liu JK, Wei VK, and Wong DS Wang H, Pieprzyk J, and Varadharajan V Linkable spontaneous anonymous group signature for ad hoc groups Information Security and Privacy 2004 Heidelberg Springer 325-335
[19]
Rivest RL, Shamir A, and Tauman Y Boyd C How to leak a secret Advances in Cryptology — ASIACRYPT 2001 2001 Heidelberg Springer 552-565
[20]
Ruiz, A., Villar, J.L.: Publicly verifiable secret sharing from Paillier’s cryptosystem. In: Western European Workshop on Research in Cryptology 2005 (2005)
[21]
Schoenmakers B Wiener M A simple publicly verifiable secret sharing scheme and its application to electronic voting Advances in Cryptology — CRYPTO’ 99 1999 Heidelberg Springer 148-164
[22]
Stadler M Maurer U Publicly verifiable secret sharing Advances in Cryptology — EUROCRYPT ’96 1996 Heidelberg Springer 190-199

Cited By

View all
  • (2024)MUSEN: Aggregatable Key-Evolving Verifiable Random Functions and ApplicationsSecurity and Cryptography for Networks10.1007/978-3-031-71073-5_15(317-337)Online publication date: 11-Sep-2024
  • (2024)Publicly Verifiable Secret Sharing Over Class Groups and Applications to DKG and YOSOAdvances in Cryptology – EUROCRYPT 202410.1007/978-3-031-58740-5_8(216-248)Online publication date: 26-May-2024
  • (2024)On Information-Theoretic Secure Multiparty Computation with Local RepairabilityPublic-Key Cryptography – PKC 202410.1007/978-3-031-57722-2_7(205-239)Online publication date: 15-Apr-2024

Index Terms

  1. YOLO YOSO: Fast and Simple Encryption and Secret Sharing in the YOSO Model
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      Advances in Cryptology – ASIACRYPT 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5–9, 2022, Proceedings, Part I
      Dec 2022
      845 pages
      ISBN:978-3-031-22962-6
      DOI:10.1007/978-3-031-22963-3
      • Editors:
      • Shweta Agrawal,
      • Dongdai Lin

      Publisher

      Springer-Verlag

      Berlin, Heidelberg

      Publication History

      Published: 25 January 2023

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 10 Oct 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)MUSEN: Aggregatable Key-Evolving Verifiable Random Functions and ApplicationsSecurity and Cryptography for Networks10.1007/978-3-031-71073-5_15(317-337)Online publication date: 11-Sep-2024
      • (2024)Publicly Verifiable Secret Sharing Over Class Groups and Applications to DKG and YOSOAdvances in Cryptology – EUROCRYPT 202410.1007/978-3-031-58740-5_8(216-248)Online publication date: 26-May-2024
      • (2024)On Information-Theoretic Secure Multiparty Computation with Local RepairabilityPublic-Key Cryptography – PKC 202410.1007/978-3-031-57722-2_7(205-239)Online publication date: 15-Apr-2024

      View Options

      View options

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media