The Multi-User Constrained Pseudorandom Function Security of Generalized GGM Trees for MPC and HierarchicalWallets
【Author】 Guo, Chun; Wang, Xiao; Xie, Xiang; Yu, Yu
【Source】ACM TRANSACTIONS ON PRIVACY AND SECURITY
【影响因子】2.717
【Abstract】Multi-user (mu) security considers large-scale attackers that, given access to a number of cryptosystem instances, attempt to compromise at least one of them. We initiate the study of mu security of the so-called GGM tree that stems from the pseudorandom generator to pseudorandom function transformation of Goldreich, Goldwasser, and Micali, with a goal to provide references for its recently popularized use in applied cryptography. We propose a generalized model for GGM trees and analyze its mu prefix-constrained pseudorandom function security in the random oracle model. Our model allows to derive concrete bounds and improvements for various protocols, and we showcase on the Bitcoin-Improvement-Proposal standard Bip32 hierarchical wallets and function secret sharing protocols. In both scenarios, we propose improvements with better performance and concrete security bounds at the same time. Compared with the state-of-the-art designs, our SHACAL3- and Keccak-p-based Bip32 variants reduce the communication cost of MPC-based implementations by 73.3% to 93.8%, whereas our AES-based function secret sharing substantially improves mu security while reducing computations by 50%.
【Keywords】Provable security; indistinguishability
【发表时间】2023 AUG
【收录时间】2023-09-28
【文献类型】实验仿真
【主题类别】
区块链技术-核心技术-密码学
【DOI】 10.1145/3592608
评论