{"ddc":["519"],"project":[{"_id":"258AA5B2-B435-11E9-9278-68D0E5697425","name":"Teaching Old Crypto New Tricks","grant_number":"682815","call_identifier":"H2020"}],"acknowledgement":"I want to acknowledge the funding by the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (682815 - TOCNeT).\r\n","file_date_updated":"2022-03-10T12:15:18Z","year":"2021","language":[{"iso":"eng"}],"_id":"10035","ec_funded":1,"citation":{"ieee":"K. Klein, “On the adaptive security of graph-based games,” Institute of Science and Technology Austria, 2021.","mla":"Klein, Karen. On the Adaptive Security of Graph-Based Games. Institute of Science and Technology Austria, 2021, doi:10.15479/at:ista:10035.","short":"K. Klein, On the Adaptive Security of Graph-Based Games, Institute of Science and Technology Austria, 2021.","ama":"Klein K. On the adaptive security of graph-based games. 2021. doi:10.15479/at:ista:10035","chicago":"Klein, Karen. “On the Adaptive Security of Graph-Based Games.” Institute of Science and Technology Austria, 2021. https://doi.org/10.15479/at:ista:10035.","ista":"Klein K. 2021. On the adaptive security of graph-based games. Institute of Science and Technology Austria.","apa":"Klein, K. (2021). On the adaptive security of graph-based games. Institute of Science and Technology Austria. https://doi.org/10.15479/at:ista:10035"},"publication_identifier":{"issn":["2663-337X"]},"page":"276","doi":"10.15479/at:ista:10035","has_accepted_license":"1","author":[{"first_name":"Karen","last_name":"Klein","id":"3E83A2F8-F248-11E8-B48F-1D18A9856A87","full_name":"Klein, Karen"}],"alternative_title":["ISTA Thesis"],"title":"On the adaptive security of graph-based games","related_material":{"record":[{"relation":"part_of_dissertation","id":"10044","status":"public"},{"status":"public","id":"10049","relation":"part_of_dissertation"},{"status":"public","id":"637","relation":"part_of_dissertation"},{"id":"10041","relation":"part_of_dissertation","status":"public"},{"status":"public","id":"6430","relation":"part_of_dissertation"},{"relation":"part_of_dissertation","id":"10048","status":"public"}]},"status":"public","publisher":"Institute of Science and Technology Austria","oa":1,"oa_version":"Published Version","date_created":"2021-09-23T07:31:44Z","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","department":[{"_id":"GradSch"},{"_id":"KrPi"}],"abstract":[{"text":"Many security definitions come in two flavors: a stronger “adaptive” flavor, where the adversary can arbitrarily make various choices during the course of the attack, and a weaker “selective” flavor where the adversary must commit to some or all of their choices a-priori. For example, in the context of identity-based encryption, selective security requires the adversary to decide on the identity of the attacked party at the very beginning of the game whereas adaptive security allows the attacker to first see the master public key and some secret keys before making this choice. Often, it appears to be much easier to achieve selective security than it is to achieve adaptive security. A series of several recent works shows how to cleverly achieve adaptive security in several such scenarios including generalized selective decryption [Pan07][FJP15], constrained PRFs [FKPR14], and Yao’s garbled circuits [JW16]. Although the above works expressed vague intuition that they share a common technique, the connection was never made precise. In this work we present a new framework (published at Crypto ’17 [JKK+17a]) that connects all of these works and allows us to present them in a unified and simplified fashion. Having the framework in place, we show how to achieve adaptive security for proxy re-encryption schemes (published at PKC ’19 [FKKP19]) and provide the first adaptive security proofs for continuous group key agreement protocols (published at S&P ’21 [KPW+21]). Questioning optimality of our framework, we then show that currently used proof techniques cannot lead to significantly better security guarantees for \"graph-building\" games (published at TCC ’21 [KKPW21a]). These games cover generalized selective decryption, as well as the security of prominent constructions for constrained PRFs, continuous group key agreement, and proxy re-encryption. Finally, we revisit the adaptive security of Yao’s garbled circuits and extend the analysis of Jafargholi and Wichs in two directions: While they prove adaptive security only for a modified construction with increased online complexity, we provide the first positive results for the original construction by Yao (published at TCC ’21 [KKP21a]). On the negative side, we prove that the results of Jafargholi and Wichs are essentially optimal by showing that no black-box reduction can provide a significantly better security bound (published at Crypto ’21 [KKPW21c]).","lang":"eng"}],"publication_status":"published","date_published":"2021-09-23T00:00:00Z","month":"09","article_processing_charge":"No","supervisor":[{"orcid":"0000-0002-9139-1654","first_name":"Krzysztof Z","last_name":"Pietrzak","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","full_name":"Pietrzak, Krzysztof Z"}],"tmp":{"image":"/images/cc_by.png","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","short":"CC BY (4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode"},"date_updated":"2023-10-17T09:24:07Z","file":[{"date_updated":"2021-10-04T12:22:33Z","file_id":"10082","success":1,"file_size":2104726,"date_created":"2021-10-04T12:22:33Z","relation":"main_file","checksum":"73a44345c683e81f3e765efbf86fdcc5","content_type":"application/pdf","file_name":"thesis_pdfa.pdf","creator":"cchlebak","access_level":"open_access"},{"content_type":"application/x-zip-compressed","creator":"cchlebak","access_level":"closed","file_name":"thesis_final (1).zip","checksum":"7b80df30a0e686c3ef6a56d4e1c59e29","relation":"source_file","file_id":"10085","date_created":"2021-10-05T07:04:37Z","file_size":9538359,"date_updated":"2022-03-10T12:15:18Z"}],"type":"dissertation","day":"23","degree_awarded":"PhD"}