We seek constructions of general-purpose immunizers that take arbitrary cryptographic primitives, and transform them into ones that withstand a powerful “malicious but proud” adversary, who attempts to break security by possibly subverting the implementation of all algorithms (including the immunizer itself!), while trying not to be detected. This question is motivated by the recent evidence of cryptographic schemes being intentionally weakened, or designed together with hidden backdoors, e.g., with the scope of mass surveillance. Our main result is a subversion-secure immunizer in the plain model (assuming collision-resistant hashing), that works for a fairly large class of deterministic primitives, i.e., cryptoschemes where a secret (but tamperable) random source is used to generate the keys and the public parameters, whereas all other algorithms are deterministic. The immunizer relies on an additional independent source of public randomness, which is used to sample a public seed. While the public source is untamperable, the subversion of all other algorithms is allowed to depend on it. Previous work in the area only obtained subversion-secure immunization for very restricted classes of primitives, often in weaker models of subversion and relying on random oracles, or by leveraging a higher number of independent random sources.

Public immunization against complete subversion without random oracles / Ateniese, G.; Francati, D.; Magri, B.; Venturi, D.. - 11464:(2019), pp. 465-485. (Intervento presentato al convegno 17th International Conference on Applied Cryptography and Network Security, ACNS 2019 tenutosi a Bogota; Colombia) [10.1007/978-3-030-21568-2_23].

Public immunization against complete subversion without random oracles

Venturi D.
2019

Abstract

We seek constructions of general-purpose immunizers that take arbitrary cryptographic primitives, and transform them into ones that withstand a powerful “malicious but proud” adversary, who attempts to break security by possibly subverting the implementation of all algorithms (including the immunizer itself!), while trying not to be detected. This question is motivated by the recent evidence of cryptographic schemes being intentionally weakened, or designed together with hidden backdoors, e.g., with the scope of mass surveillance. Our main result is a subversion-secure immunizer in the plain model (assuming collision-resistant hashing), that works for a fairly large class of deterministic primitives, i.e., cryptoschemes where a secret (but tamperable) random source is used to generate the keys and the public parameters, whereas all other algorithms are deterministic. The immunizer relies on an additional independent source of public randomness, which is used to sample a public seed. While the public source is untamperable, the subversion of all other algorithms is allowed to depend on it. Previous work in the area only obtained subversion-secure immunization for very restricted classes of primitives, often in weaker models of subversion and relying on random oracles, or by leveraging a higher number of independent random sources.
2019
17th International Conference on Applied Cryptography and Network Security, ACNS 2019
immunization; subversion; algorithm-substitution attacks
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
Public immunization against complete subversion without random oracles / Ateniese, G.; Francati, D.; Magri, B.; Venturi, D.. - 11464:(2019), pp. 465-485. (Intervento presentato al convegno 17th International Conference on Applied Cryptography and Network Security, ACNS 2019 tenutosi a Bogota; Colombia) [10.1007/978-3-030-21568-2_23].
File allegati a questo prodotto
File Dimensione Formato  
Ateniese_Immunization_2019.pdf

solo gestori archivio

Tipologia: Documento in Post-print (versione successiva alla peer review e accettata per la pubblicazione)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 691.97 kB
Formato Adobe PDF
691.97 kB Adobe PDF   Contatta l'autore

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1356468
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 47
  • ???jsp.display-item.citation.isi??? 6
social impact