Paper 2023/964
Lightweight Authentication of Web Data via Garble-Then-Prove
Abstract
Transport Layer Security (TLS) establishes an authenticated and confidential channel to deliver data for almost all Internet applications. A recent work (Zhang et al., CCS'20) proposed a protocol to prove the TLS payload to a third party, without any modification of TLS servers, while ensuring the privacy and originality of the data in the presence of malicious adversaries. However, it required maliciously secure Two-Party Computation (2PC) for generic circuits, leading to significant computational and communication overhead.
This paper proposes the garble-then-prove technique to achieve the same security requirement without using any heavy mechanism like generic malicious 2PC. Our end-to-end implementation shows 14
Metadata
- Available format(s)
-
PDF
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. Major revision. USENIX Security 2024
- Keywords
- Interactive Zero-Knowledge ProofsGarbled CircuitsTLS
- Contact author(s)
-
xiexiangiscas @ gmail com
yangk @ sklc org
wangxiao @ northwestern edu
yuyu @ cs sjtu edu cn - History
- 2024-02-24: last of 6 revisions
- 2023-06-20: received
- See all versions
- Short URL
- https://ia.cr/2023/964
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2023/964, author = {Xiang Xie and Kang Yang and Xiao Wang and Yu Yu}, title = {Lightweight Authentication of Web Data via Garble-Then-Prove}, howpublished = {Cryptology {ePrint} Archive, Paper 2023/964}, year = {2023}, url = {https://eprint.iacr.org/2023/964} }