You are looking at a specific version 20200221:092926 of this paper. See the latest version.

Paper 2020/204

Cryptographic Reverse Firewalls for Interactive Proof Systems

Chaya Ganesh and Bernardo Magri and Daniele Venturi

Abstract

We study interactive proof systems (IPSes) in a strong adversarial setting where the machines of *honest parties* might be corrupted and under control of the adversary. Our aim is to answer the following, seemingly paradoxical, questions: - Can Peggy convince Vic of the veracity of an NP statement, without leaking any information about the witness even in case Vic is malicious and Peggy does not trust her computer? - Can we avoid that Peggy fools Vic into accepting false statements, even if Peggy is malicious and Vic does not trust her computer? At EUROCRYPT 2015, Mironov and Stephens-Davidowitz introduced cryptographic reverse firewalls (RFs) as an attractive approach to tackling such questions. Intuitively, a RF for Peggy/Vic is an external party that sits between Peggy/Vic and the outside world and whose scope is to sanitize Peggy's/Vic's incoming and outgoing messages in the face of subversion of her/his computer, e.g. in order to destroy subliminal channels. In this paper, we put forward several natural security properties for RFs in the concrete setting of IPSes. As our main contribution, we construct efficient RFs for different IPSes derived from a large class of Sigma protocols that we call malleable. A nice feature of our design is that it is completely transparent, in the sense that our RFs can be directly applied to already deployed IPSes, without the need to re-implement them.

Note: This updated version contains a fix to an error in the construction of the RF for the OR composition protocol in the previous version of this manuscript.

Metadata
Available format(s)
PDF
Category
Foundations
Publication info
Preprint. MINOR revision.
Keywords
subversionalgorithm substitution attackscryptographic reverse firewallsinteractive proofszero knowledgewitness indistinguishability
Contact author(s)
chaya ganesh @ gmail com,magri @ cs au dk,venturi @ di uniroma1 it
History
2020-08-31: last of 3 revisions
2020-02-19: received
See all versions
Short URL
https://ia.cr/2020/204
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.