Lecture

Weak Fiat-Shamir: Vulnerabilities in Cryptographic Protocols

Description

This lecture discusses the vulnerabilities associated with the Fiat-Shamir heuristic and its implications for the Helios electronic voting system. The instructor introduces Sigma Protocols, which allow a prover to demonstrate knowledge of a secret without revealing it. The lecture explains how the Fiat-Shamir transformation can convert these interactive protocols into non-interactive ones, emphasizing the importance of security properties such as special soundness and zero-knowledge. The presentation highlights two significant attacks on the Helios system: a denial of service attack that invalidates elections and a more severe attack that enables an attacker to manipulate election outcomes. The discussion includes a detailed analysis of how weak Fiat-Shamir transformations can lead to security flaws, particularly in the context of Helios. The lecture concludes with recommendations for using strong Fiat-Shamir transformations to enhance security, while also considering the trade-offs between security and efficiency in cryptographic applications.

About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.