On the limitations of universally composable two-party computation without set-up assumptions

作者: Ran Canetti , Eyal Kushilevitz , Yehuda Lindell

DOI: 10.1007/3-540-39200-9_5

关键词:

摘要: The recently proposed universally composable (UC) security framework, for analyzing of cryptographic protocols, provides very strong guarantees. In particular, a protocol proven secure in this framework is guaranteed to maintain its even when deployed arbitrary multi-party, multi-protocol, multi-execution environments. Protocols securely carrying out essentially any task way exist, both the case an honest majority (in plain model, i.e., without set-up assumptions) and no common reference string model). However, little was known and, important special two-party protocols. We study feasibility function evaluation model. Our results show that few functions can be computed model so as provide UC Specifically, deterministic functions, we full characterization computable (Essentially, these are depend on at most one parties' inputs, furthermore "efficiently invertible" sense defined within.) For probabilistic only those where parties uniquely determine joint output.

参考文章(37)
Rainer Steinwandt, Jörn Müller-Quade, Dennis Hofheinz, On Modeling IND-CCA Security in Cryptographic Protocols. IACR Cryptology ePrint Archive. ,vol. 2003, pp. 24- ,(2003)
Oded Goldreich, , Silvio Micali, Avi Wigderson, , , How to play any mental game, or a completeness theorem for protocols with honest majority Providing Sound Foundations for Cryptography. pp. 307- 328 ,(2019) , 10.1145/3335741.3335755
Yehuda Lindell, Lower Bounds for Concurrent Self Composition theory of cryptography conference. pp. 203- 222 ,(2004) , 10.1007/978-3-540-24638-1_12
Silvio Micali, Phillip Rogaway, Secure Computation (Abstract) international cryptology conference. pp. 392- 404 ,(1991)
R. Canetti, Universally composable security: a new paradigm for cryptographic protocols international conference on cluster computing. pp. 136- 145 ,(2001) , 10.1109/SFCS.2001.959888
Amos Beimel, Tal Malkin, Silvio Micali, The All-or-Nothing Nature of Two-Party Secure Computation international cryptology conference. pp. 80- 97 ,(1999) , 10.1007/3-540-48405-1_6
Charles Rackoff, Daniel R. Simon, Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack international cryptology conference. pp. 433- 444 ,(1991) , 10.1007/3-540-46766-1_35
Ransom Richardson, Joe Kilian, On the concurrent composition of zero-knowledge proofs theory and application of cryptographic techniques. pp. 415- 431 ,(1999) , 10.1007/3-540-48910-X_29
Ran Canetti, Marc Fischlin, Universally Composable Commitments international cryptology conference. pp. 19- 40 ,(2001) , 10.1007/3-540-44647-8_2
Joe Kilian, More general completeness theorems for secure two-party computation symposium on the theory of computing. pp. 316- 324 ,(2000) , 10.1145/335305.335342