Approach to the privacy argument
This commit is contained in:
parent
b418b3080e
commit
0359e829f3
@ -1444,27 +1444,67 @@ At a result, there is no way for a user to loose control over a coin,
|
|||||||
|
|
||||||
\section{Privacy arguments}
|
\section{Privacy arguments}
|
||||||
|
|
||||||
We consider two coins $C_1$ and $C_2$ created by the same withdrawal
|
The {\em linking problem} for blind signature is,
|
||||||
or refresh operation. We say they are {\em linkable} if
|
if given coin creation transcrips and possibly fewer
|
||||||
some probabilistic polynomial time adversary has a non-negligible
|
coin deposit transcripts for coins from the creation transcripts,
|
||||||
advantage in guessing which two of $\{ C_0, C_1, C_2 \}$ were
|
then produce a corresponding creation and deposit transcript.
|
||||||
created together, where $C_0$ is an unrelated third coin.
|
|
||||||
|
|
||||||
% TODO: Compare this definition with some from the literature
|
We say a probabilistic polynomial time (PPT) adversary $A$
|
||||||
|
{\em links} coins if it has a non-negligable advantage in
|
||||||
|
solving the linking problem, when given the private keys
|
||||||
|
of the exchange.
|
||||||
|
|
||||||
.. reference literate about withdrawal ..
|
In Taler, there are two forms of coin creation transcrips,
|
||||||
|
withdrawal and refresh.
|
||||||
|
|
||||||
\begin{proposition}
|
\begin{lemma}
|
||||||
If two coins created by refresh are linkable, then some
|
If there are no refresh operations, any adversary with an
|
||||||
probabilistic polynomial time adversary has a non-negligible
|
advantage in linking coins is polynomially equivelent to an
|
||||||
advantage in determining that their seeds ...
|
advantage with the same advantage in recognizing blinding factors.
|
||||||
...
|
\end{lemma}
|
||||||
\end{proposition}
|
|
||||||
|
|
||||||
\begin{proof}
|
\begin{proof}
|
||||||
... random oracle ..
|
Let $n$ denote the RSA modulous of the denomination key.
|
||||||
|
Also let $d$ and $e$ denote the private and public exponents, respectively.
|
||||||
|
In effect, coin withdrawal transcripts consist of numbers
|
||||||
|
$b m^d \mod n$ where $m$ is the FDH of the coin's public key
|
||||||
|
and $b$ is the blinding factor, while coin deposits transcripts
|
||||||
|
consist of only $m^d \mon n$.
|
||||||
|
|
||||||
|
Of course, if the adversary can link coins then they can compute
|
||||||
|
the blinding factors as $b m^d / m^d \mod n$. Conversely, if the
|
||||||
|
adversary can recognize blinding factors then they link coins after
|
||||||
|
first computing $b_{i,j} = b_i m_i^d / m_j^d \mod n$ for all $i,j$.
|
||||||
\end{proof}
|
\end{proof}
|
||||||
|
|
||||||
|
We now know the following because Taler used SHA512 adopted to be
|
||||||
|
a FDH to breat the blinding factor.
|
||||||
|
|
||||||
|
\begin{corollary}
|
||||||
|
Assuming no refresh opeeration,
|
||||||
|
any PPT adversary with an advantage for linking Taler coins gives
|
||||||
|
rise to an adversary with an advantage for recognizing SHA512 output.
|
||||||
|
\end{corollary}
|
||||||
|
|
||||||
|
There was an earlier encryption-based version of the Taler protocol
|
||||||
|
in which refresh operated consisted of $\kappa$ normal coin withdrawals
|
||||||
|
encrypted using the secret $t^{(i)} C$ where $C = c G$ is the coin being
|
||||||
|
refreshed and $T^{(i)} = t^{(i)} G$ is the transfer key.
|
||||||
|
|
||||||
|
\begin{proposition}
|
||||||
|
Assuming the encryption used is ??? secure, and that
|
||||||
|
the independence of $c$, $t$, and the new coins key materials, then
|
||||||
|
any PPT adversary with an advantage for linking Taler coins gives
|
||||||
|
rise to an adversary with an advantage for recognizing SHA512 output.
|
||||||
|
\end{proposition}
|
||||||
|
|
||||||
|
We now apply \cite[??]{??} to deduce :
|
||||||
|
|
||||||
|
\begin{theorem}
|
||||||
|
In the random oracle model, any PPT adversary with an advantage
|
||||||
|
in linking Taler coins has an advantage in breaking elliptic curve
|
||||||
|
Diffie-Hellman key exchange on curve25519.
|
||||||
|
\end{theorem}
|
||||||
|
|
||||||
|
|
||||||
\end{document}
|
\end{document}
|
||||||
|
Loading…
Reference in New Issue
Block a user