Basing Cryptographic Protocols on Tamper-Evident Seals View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2005

AUTHORS

Tal Moran , Moni Naor

ABSTRACT

In this paper we attempt to formally study two very intuitive physical models: sealed envelopes and locked boxes, often used as illustrations for common cryptographic operations. We relax the security properties usually required from locked boxes (such as in bit-commitment protocols) and require only that a broken lock or torn envelope be identifiable to the original sender. Unlike the completely impregnable locked box, this functionality may be achievable in real life, where containers having this property are called “tamper-evident seals”. Another physical object with this property is the “scratch-off card”, often used in lottery tickets. We show that scratch-off cards can be used to implement bit-commitment and coin flipping, but not oblivious transfer. Of particular interest, we give a strongly-fair coin flipping protocol with bias bounded by O(1/r) (where r is the number of rounds), beating the best known bias in the standard model even with cryptographic assumptions. More... »

PAGES

285-297

Book

TITLE

Automata, Languages and Programming

ISBN

978-3-540-27580-0
978-3-540-31691-6

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/11523468_24

DOI

http://dx.doi.org/10.1007/11523468_24

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1015897667


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0802", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computation Theory and Mathematics", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot, Israel", 
          "id": "http://www.grid.ac/institutes/grid.13992.30", 
          "name": [
            "Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot, Israel"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Moran", 
        "givenName": "Tal", 
        "id": "sg:person.012022173111.00", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012022173111.00"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot, Israel", 
          "id": "http://www.grid.ac/institutes/grid.13992.30", 
          "name": [
            "Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot, Israel"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Naor", 
        "givenName": "Moni", 
        "id": "sg:person.07776170271.83", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07776170271.83"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2005", 
    "datePublishedReg": "2005-01-01", 
    "description": "In this paper we attempt to formally study two very intuitive physical models: sealed envelopes and locked boxes, often used as illustrations for common cryptographic operations. We relax the security properties usually required from locked boxes (such as in bit-commitment protocols) and require only that a broken lock or torn envelope be identifiable to the original sender. Unlike the completely impregnable locked box, this functionality may be achievable in real life, where containers having this property are called \u201ctamper-evident seals\u201d. Another physical object with this property is the \u201cscratch-off card\u201d, often used in lottery tickets. We show that scratch-off cards can be used to implement bit-commitment and coin flipping, but not oblivious transfer. Of particular interest, we give a strongly-fair coin flipping protocol with bias bounded by O(1/r) (where r is the number of rounds), beating the best known bias in the standard model even with cryptographic assumptions.", 
    "editor": [
      {
        "familyName": "Caires", 
        "givenName": "Lu\u00eds", 
        "type": "Person"
      }, 
      {
        "familyName": "Italiano", 
        "givenName": "Giuseppe F.", 
        "type": "Person"
      }, 
      {
        "familyName": "Monteiro", 
        "givenName": "Lu\u00eds", 
        "type": "Person"
      }, 
      {
        "familyName": "Palamidessi", 
        "givenName": "Catuscia", 
        "type": "Person"
      }, 
      {
        "familyName": "Yung", 
        "givenName": "Moti", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/11523468_24", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-540-27580-0", 
        "978-3-540-31691-6"
      ], 
      "name": "Automata, Languages and Programming", 
      "type": "Book"
    }, 
    "keywords": [
      "common cryptographic operations", 
      "cryptographic operations", 
      "security properties", 
      "cryptographic protocols", 
      "cryptographic assumptions", 
      "original sender", 
      "oblivious transfer", 
      "physical objects", 
      "tamper-evident seals", 
      "real life", 
      "scratch", 
      "cards", 
      "coin flipping", 
      "sender", 
      "protocol", 
      "box", 
      "functionality", 
      "objects", 
      "tickets", 
      "physical model", 
      "model", 
      "operation", 
      "lock", 
      "standard model", 
      "flipping", 
      "containers", 
      "interest", 
      "illustration", 
      "particular interest", 
      "assumption", 
      "lottery tickets", 
      "properties", 
      "life", 
      "transfer", 
      "envelope", 
      "bias", 
      "seals", 
      "paper", 
      "intuitive physical model"
    ], 
    "name": "Basing Cryptographic Protocols on Tamper-Evident Seals", 
    "pagination": "285-297", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1015897667"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/11523468_24"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/11523468_24", 
      "https://app.dimensions.ai/details/publication/pub.1015897667"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-05-20T07:49", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220519/entities/gbq_results/chapter/chapter_82.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/11523468_24"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/11523468_24'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/11523468_24'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/11523468_24'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/11523468_24'


 

This table displays all metadata directly associated to this object as RDF triples.

126 TRIPLES      23 PREDICATES      65 URIs      58 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/11523468_24 schema:about anzsrc-for:08
2 anzsrc-for:0802
3 schema:author Nc320d09337194e9f85a5f3800ad2755c
4 schema:datePublished 2005
5 schema:datePublishedReg 2005-01-01
6 schema:description In this paper we attempt to formally study two very intuitive physical models: sealed envelopes and locked boxes, often used as illustrations for common cryptographic operations. We relax the security properties usually required from locked boxes (such as in bit-commitment protocols) and require only that a broken lock or torn envelope be identifiable to the original sender. Unlike the completely impregnable locked box, this functionality may be achievable in real life, where containers having this property are called “tamper-evident seals”. Another physical object with this property is the “scratch-off card”, often used in lottery tickets. We show that scratch-off cards can be used to implement bit-commitment and coin flipping, but not oblivious transfer. Of particular interest, we give a strongly-fair coin flipping protocol with bias bounded by O(1/r) (where r is the number of rounds), beating the best known bias in the standard model even with cryptographic assumptions.
7 schema:editor N047d9aed1c2c46c5b6d5d41674703c6e
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf N79ee649b7dff4a9fb99a59c27f94c4c6
12 schema:keywords assumption
13 bias
14 box
15 cards
16 coin flipping
17 common cryptographic operations
18 containers
19 cryptographic assumptions
20 cryptographic operations
21 cryptographic protocols
22 envelope
23 flipping
24 functionality
25 illustration
26 interest
27 intuitive physical model
28 life
29 lock
30 lottery tickets
31 model
32 objects
33 oblivious transfer
34 operation
35 original sender
36 paper
37 particular interest
38 physical model
39 physical objects
40 properties
41 protocol
42 real life
43 scratch
44 seals
45 security properties
46 sender
47 standard model
48 tamper-evident seals
49 tickets
50 transfer
51 schema:name Basing Cryptographic Protocols on Tamper-Evident Seals
52 schema:pagination 285-297
53 schema:productId N7c4203ed13d54bb880a8c27a8bd3e5a6
54 Neddcd59fbc2745208718240a6eadd4a4
55 schema:publisher Neaabb68ab14f4eb2aea15c52ebc9ae0d
56 schema:sameAs https://app.dimensions.ai/details/publication/pub.1015897667
57 https://doi.org/10.1007/11523468_24
58 schema:sdDatePublished 2022-05-20T07:49
59 schema:sdLicense https://scigraph.springernature.com/explorer/license/
60 schema:sdPublisher N1a22143b5d9841de8862aa9a37b1dca9
61 schema:url https://doi.org/10.1007/11523468_24
62 sgo:license sg:explorer/license/
63 sgo:sdDataset chapters
64 rdf:type schema:Chapter
65 N047d9aed1c2c46c5b6d5d41674703c6e rdf:first Nca93891fe280438a9ac82512916fa531
66 rdf:rest N7f4dc5dc0b6b40c8bb7ecc1e89e7e15b
67 N0a84dddef09c4edd91cf25a0d8b028c2 rdf:first N29c2a2c34c0d43309942018ced6e09ac
68 rdf:rest Nf7917d2198a54bde8e93e4dd72ba3e0d
69 N1a22143b5d9841de8862aa9a37b1dca9 schema:name Springer Nature - SN SciGraph project
70 rdf:type schema:Organization
71 N29c2a2c34c0d43309942018ced6e09ac schema:familyName Monteiro
72 schema:givenName Luís
73 rdf:type schema:Person
74 N4947a1f94e83473386e241c142b9869a schema:familyName Italiano
75 schema:givenName Giuseppe F.
76 rdf:type schema:Person
77 N626eb134a9204b88b97d2f0073a1aa67 schema:familyName Palamidessi
78 schema:givenName Catuscia
79 rdf:type schema:Person
80 N79ee649b7dff4a9fb99a59c27f94c4c6 schema:isbn 978-3-540-27580-0
81 978-3-540-31691-6
82 schema:name Automata, Languages and Programming
83 rdf:type schema:Book
84 N7c4203ed13d54bb880a8c27a8bd3e5a6 schema:name doi
85 schema:value 10.1007/11523468_24
86 rdf:type schema:PropertyValue
87 N7f4dc5dc0b6b40c8bb7ecc1e89e7e15b rdf:first N4947a1f94e83473386e241c142b9869a
88 rdf:rest N0a84dddef09c4edd91cf25a0d8b028c2
89 Nb99136fc34684baeb66f4629ccd9b52d schema:familyName Yung
90 schema:givenName Moti
91 rdf:type schema:Person
92 Nbeb88728b3b848f1ab007e6fb12b1730 rdf:first Nb99136fc34684baeb66f4629ccd9b52d
93 rdf:rest rdf:nil
94 Nc320d09337194e9f85a5f3800ad2755c rdf:first sg:person.012022173111.00
95 rdf:rest Nf41c3104351149c6b6ace4aa95d086a2
96 Nca93891fe280438a9ac82512916fa531 schema:familyName Caires
97 schema:givenName Luís
98 rdf:type schema:Person
99 Neaabb68ab14f4eb2aea15c52ebc9ae0d schema:name Springer Nature
100 rdf:type schema:Organisation
101 Neddcd59fbc2745208718240a6eadd4a4 schema:name dimensions_id
102 schema:value pub.1015897667
103 rdf:type schema:PropertyValue
104 Nf41c3104351149c6b6ace4aa95d086a2 rdf:first sg:person.07776170271.83
105 rdf:rest rdf:nil
106 Nf7917d2198a54bde8e93e4dd72ba3e0d rdf:first N626eb134a9204b88b97d2f0073a1aa67
107 rdf:rest Nbeb88728b3b848f1ab007e6fb12b1730
108 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
109 schema:name Information and Computing Sciences
110 rdf:type schema:DefinedTerm
111 anzsrc-for:0802 schema:inDefinedTermSet anzsrc-for:
112 schema:name Computation Theory and Mathematics
113 rdf:type schema:DefinedTerm
114 sg:person.012022173111.00 schema:affiliation grid-institutes:grid.13992.30
115 schema:familyName Moran
116 schema:givenName Tal
117 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012022173111.00
118 rdf:type schema:Person
119 sg:person.07776170271.83 schema:affiliation grid-institutes:grid.13992.30
120 schema:familyName Naor
121 schema:givenName Moni
122 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07776170271.83
123 rdf:type schema:Person
124 grid-institutes:grid.13992.30 schema:alternateName Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot, Israel
125 schema:name Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot, Israel
126 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...