Position-Based Cryptography and Multiparty Communication Complexity

Position based cryptography (PBC), proposed in the seminal work of Chandran, Goyal, Moriarty, and Ostrovsky (SIAM J. Computing, 2014), aims at constructing cryptographic schemes in which the identity of the user is his geographic position. Chandran et al.

  • PDF / 515,826 Bytes
  • 26 Pages / 439.37 x 666.142 pts Page_size
  • 30 Downloads / 210 Views

DOWNLOAD

REPORT


3

Swarthmore College, Swarthmore, USA [email protected] 2 University of Warsaw, Warsaw, Poland [email protected] Ruhr University Bochum, Bochum, Germany [email protected] 4 TU Darmstadt, Darmstadt, Germany 5 IST Austria, Klosterneuburg, Austria [email protected]

Abstract. Position based cryptography (PBC), proposed in the seminal work of Chandran, Goyal, Moriarty, and Ostrovsky (SIAM J. Computing, 2014), aims at constructing cryptographic schemes in which the identity of the user is his geographic position. Chandran et al. construct PBC schemes for secure positioning and position-based key agreement in the bounded-storage model (Maurer, J. Cryptology, 1992). Apart from bounded memory, their security proofs need a strong additional restriction on the power of the adversary: he cannot compute joint functions of his inputs. Removing this assumption is left as an open problem. We show that an answer to this question would resolve a long standing open problem in multiparty communication complexity: finding a function that is hard to compute with low communication complexity in the simultaneous message model, but easy to compute in the fully adaptive model. On a more positive side: we also show some implications in the other direction, i.e.: we prove that lower bounds on the communication complexity of certain multiparty problems imply existence of PBC primitives. Using this result we then show two attractive ways to “bypass” our hardness result: the first uses the random oracle model, the second weakens the locality requirement in the bounded-storage model to online computability. The random oracle construction is arguably one of the simplest proposed so far in this area. Our results indicate that constructing improved provably secure protocols for PBC requires a better understanding of multiparty communication complexity. This is yet another S. Dziembowski—Supported by the ERC starting grant CNTM-207908 and by the FNP Team grant 2016/1/4. S. Faust—Supported by the Emmy Noether Program FA 1320/1-1 of the German Research Foundation (DFG). K. Pietrzak—Supported by the European Research Council, ERC consolidator grant (682815 - TOCNeT). c International Association for Cryptologic Research 2017  Y. Kalai and L. Reyzin (Eds.): TCC 2017, Part I, LNCS 10677, pp. 56–81, 2017. https://doi.org/10.1007/978-3-319-70500-2_3

Position-Based Cryptography and Multiparty Communication Complexity

57

example where negative results in one area (in our case: lower bounds in multiparty communication complexity) can be used to construct secure cryptographic schemes.

1

Introduction

The standard way to identify participants in cryptographic protocols is to check their knowledge of some secret data (like a password or a key), to verify some biometric information, or the possession of some hardware tokens. A new intriguing idea, known under the name of position-based cryptography (PBC) [16] is to construct algorithms in which the participating parties are identified by their geographic position. For example, consider t