Basing Cryptographic Protocols on Tamper-Evident Seals View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2005

AUTHORS

Tal Moran , Moni Naor

ABSTRACT

In this paper we attempt to formally study two very intuitive physical models: sealed envelopes and locked boxes, often used as illustrations for common cryptographic operations. We relax the security properties usually required from locked boxes (such as in bit-commitment protocols) and require only that a broken lock or torn envelope be identifiable to the original sender. Unlike the completely impregnable locked box, this functionality may be achievable in real life, where containers having this property are called “tamper-evident seals”. Another physical object with this property is the “scratch-off card”, often used in lottery tickets. We show that scratch-off cards can be used to implement bit-commitment and coin flipping, but not oblivious transfer. Of particular interest, we give a strongly-fair coin flipping protocol with bias bounded by O(1/r) (where r is the number of rounds), beating the best known bias in the standard model even with cryptographic assumptions. More... »

PAGES

285-297

Book

TITLE

Automata, Languages and Programming

ISBN

978-3-540-27580-0
978-3-540-31691-6

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/11523468_24

DOI

http://dx.doi.org/10.1007/11523468_24

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1015897667


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0802", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computation Theory and Mathematics", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot, Israel", 
          "id": "http://www.grid.ac/institutes/grid.13992.30", 
          "name": [
            "Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot, Israel"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Moran", 
        "givenName": "Tal", 
        "id": "sg:person.012022173111.00", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012022173111.00"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot, Israel", 
          "id": "http://www.grid.ac/institutes/grid.13992.30", 
          "name": [
            "Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot, Israel"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Naor", 
        "givenName": "Moni", 
        "id": "sg:person.07776170271.83", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07776170271.83"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2005", 
    "datePublishedReg": "2005-01-01", 
    "description": "In this paper we attempt to formally study two very intuitive physical models: sealed envelopes and locked boxes, often used as illustrations for common cryptographic operations. We relax the security properties usually required from locked boxes (such as in bit-commitment protocols) and require only that a broken lock or torn envelope be identifiable to the original sender. Unlike the completely impregnable locked box, this functionality may be achievable in real life, where containers having this property are called \u201ctamper-evident seals\u201d. Another physical object with this property is the \u201cscratch-off card\u201d, often used in lottery tickets. We show that scratch-off cards can be used to implement bit-commitment and coin flipping, but not oblivious transfer. Of particular interest, we give a strongly-fair coin flipping protocol with bias bounded by O(1/r) (where r is the number of rounds), beating the best known bias in the standard model even with cryptographic assumptions.", 
    "editor": [
      {
        "familyName": "Caires", 
        "givenName": "Lu\u00eds", 
        "type": "Person"
      }, 
      {
        "familyName": "Italiano", 
        "givenName": "Giuseppe F.", 
        "type": "Person"
      }, 
      {
        "familyName": "Monteiro", 
        "givenName": "Lu\u00eds", 
        "type": "Person"
      }, 
      {
        "familyName": "Palamidessi", 
        "givenName": "Catuscia", 
        "type": "Person"
      }, 
      {
        "familyName": "Yung", 
        "givenName": "Moti", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/11523468_24", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-540-27580-0", 
        "978-3-540-31691-6"
      ], 
      "name": "Automata, Languages and Programming", 
      "type": "Book"
    }, 
    "keywords": [
      "common cryptographic operations", 
      "cryptographic operations", 
      "tamper-evident seals", 
      "security properties", 
      "cryptographic protocols", 
      "cryptographic assumptions", 
      "oblivious transfer", 
      "original sender", 
      "physical objects", 
      "coin flipping protocol", 
      "real life", 
      "cards", 
      "scratch", 
      "coin flipping", 
      "protocol", 
      "sender", 
      "objects", 
      "functionality", 
      "box", 
      "tickets", 
      "physical model", 
      "model", 
      "operation", 
      "standard model", 
      "lock", 
      "flipping", 
      "interest", 
      "containers", 
      "illustration", 
      "particular interest", 
      "assumption", 
      "lottery tickets", 
      "properties", 
      "envelope", 
      "transfer", 
      "life", 
      "bias", 
      "seals", 
      "paper", 
      "locked boxes", 
      "intuitive physical model", 
      "broken lock", 
      "fair coin flipping protocol", 
      "flipping protocol"
    ], 
    "name": "Basing Cryptographic Protocols on Tamper-Evident Seals", 
    "pagination": "285-297", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1015897667"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/11523468_24"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/11523468_24", 
      "https://app.dimensions.ai/details/publication/pub.1015897667"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-01-01T19:20", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/chapter/chapter_35.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/11523468_24"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/11523468_24'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/11523468_24'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/11523468_24'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/11523468_24'


 

This table displays all metadata directly associated to this object as RDF triples.

131 TRIPLES      23 PREDICATES      70 URIs      63 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/11523468_24 schema:about anzsrc-for:08
2 anzsrc-for:0802
3 schema:author Nb9cf5a9535244feaa1f3eeede933af3b
4 schema:datePublished 2005
5 schema:datePublishedReg 2005-01-01
6 schema:description In this paper we attempt to formally study two very intuitive physical models: sealed envelopes and locked boxes, often used as illustrations for common cryptographic operations. We relax the security properties usually required from locked boxes (such as in bit-commitment protocols) and require only that a broken lock or torn envelope be identifiable to the original sender. Unlike the completely impregnable locked box, this functionality may be achievable in real life, where containers having this property are called “tamper-evident seals”. Another physical object with this property is the “scratch-off card”, often used in lottery tickets. We show that scratch-off cards can be used to implement bit-commitment and coin flipping, but not oblivious transfer. Of particular interest, we give a strongly-fair coin flipping protocol with bias bounded by O(1/r) (where r is the number of rounds), beating the best known bias in the standard model even with cryptographic assumptions.
7 schema:editor Nb06021cdd9f44978b4aed7aa6885d7b9
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf N84e28b359dc94a1f8d0f26ee712b779e
12 schema:keywords assumption
13 bias
14 box
15 broken lock
16 cards
17 coin flipping
18 coin flipping protocol
19 common cryptographic operations
20 containers
21 cryptographic assumptions
22 cryptographic operations
23 cryptographic protocols
24 envelope
25 fair coin flipping protocol
26 flipping
27 flipping protocol
28 functionality
29 illustration
30 interest
31 intuitive physical model
32 life
33 lock
34 locked boxes
35 lottery tickets
36 model
37 objects
38 oblivious transfer
39 operation
40 original sender
41 paper
42 particular interest
43 physical model
44 physical objects
45 properties
46 protocol
47 real life
48 scratch
49 seals
50 security properties
51 sender
52 standard model
53 tamper-evident seals
54 tickets
55 transfer
56 schema:name Basing Cryptographic Protocols on Tamper-Evident Seals
57 schema:pagination 285-297
58 schema:productId N5aa13eb714454995a19cf3df567ae802
59 Nbb7a06ce042d420b8436136eb9f62d48
60 schema:publisher N28cb55fc63ce42a3aeb0c8768578c664
61 schema:sameAs https://app.dimensions.ai/details/publication/pub.1015897667
62 https://doi.org/10.1007/11523468_24
63 schema:sdDatePublished 2022-01-01T19:20
64 schema:sdLicense https://scigraph.springernature.com/explorer/license/
65 schema:sdPublisher N2ed7ca4402524f9eafed7d64d306a609
66 schema:url https://doi.org/10.1007/11523468_24
67 sgo:license sg:explorer/license/
68 sgo:sdDataset chapters
69 rdf:type schema:Chapter
70 N10d65b10637c497488c9b7687af90365 rdf:first sg:person.07776170271.83
71 rdf:rest rdf:nil
72 N28cb55fc63ce42a3aeb0c8768578c664 schema:name Springer Nature
73 rdf:type schema:Organisation
74 N2ed7ca4402524f9eafed7d64d306a609 schema:name Springer Nature - SN SciGraph project
75 rdf:type schema:Organization
76 N5aa13eb714454995a19cf3df567ae802 schema:name dimensions_id
77 schema:value pub.1015897667
78 rdf:type schema:PropertyValue
79 N62b8127b05a14f03b6134d607222d4f6 rdf:first Nd21e594b7a0d43bf957dbfb667ee7f89
80 rdf:rest Nf3ea6388e1f944a696a2b94e70b19b61
81 N84559e120a5042c088e9fabb6e5268df schema:familyName Monteiro
82 schema:givenName Luís
83 rdf:type schema:Person
84 N84e28b359dc94a1f8d0f26ee712b779e schema:isbn 978-3-540-27580-0
85 978-3-540-31691-6
86 schema:name Automata, Languages and Programming
87 rdf:type schema:Book
88 Na26b8da9fc9747678e2bf5adab0d6deb schema:familyName Palamidessi
89 schema:givenName Catuscia
90 rdf:type schema:Person
91 Na45cd50f3aef45f79f6d7078b7d9c8f8 rdf:first Nfb64c15323744c83a4a542d560607029
92 rdf:rest rdf:nil
93 Nb06021cdd9f44978b4aed7aa6885d7b9 rdf:first Ne55db2f82476472a830848ebbbd3e6d4
94 rdf:rest N62b8127b05a14f03b6134d607222d4f6
95 Nb9cf5a9535244feaa1f3eeede933af3b rdf:first sg:person.012022173111.00
96 rdf:rest N10d65b10637c497488c9b7687af90365
97 Nbb7a06ce042d420b8436136eb9f62d48 schema:name doi
98 schema:value 10.1007/11523468_24
99 rdf:type schema:PropertyValue
100 Nc398002c9c034918979c1632e236e93b rdf:first Na26b8da9fc9747678e2bf5adab0d6deb
101 rdf:rest Na45cd50f3aef45f79f6d7078b7d9c8f8
102 Nd21e594b7a0d43bf957dbfb667ee7f89 schema:familyName Italiano
103 schema:givenName Giuseppe F.
104 rdf:type schema:Person
105 Ne55db2f82476472a830848ebbbd3e6d4 schema:familyName Caires
106 schema:givenName Luís
107 rdf:type schema:Person
108 Nf3ea6388e1f944a696a2b94e70b19b61 rdf:first N84559e120a5042c088e9fabb6e5268df
109 rdf:rest Nc398002c9c034918979c1632e236e93b
110 Nfb64c15323744c83a4a542d560607029 schema:familyName Yung
111 schema:givenName Moti
112 rdf:type schema:Person
113 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
114 schema:name Information and Computing Sciences
115 rdf:type schema:DefinedTerm
116 anzsrc-for:0802 schema:inDefinedTermSet anzsrc-for:
117 schema:name Computation Theory and Mathematics
118 rdf:type schema:DefinedTerm
119 sg:person.012022173111.00 schema:affiliation grid-institutes:grid.13992.30
120 schema:familyName Moran
121 schema:givenName Tal
122 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012022173111.00
123 rdf:type schema:Person
124 sg:person.07776170271.83 schema:affiliation grid-institutes:grid.13992.30
125 schema:familyName Naor
126 schema:givenName Moni
127 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07776170271.83
128 rdf:type schema:Person
129 grid-institutes:grid.13992.30 schema:alternateName Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot, Israel
130 schema:name Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot, Israel
131 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...