TY - GEN
T1 - A unified framework for concurrent security
T2 - 41st Annual ACM Symposium on Theory of Computing, STOC '09
AU - Lin, Huijia
AU - Pass, Rafael
AU - Venkitasubramaniam, Muthuramakrishnan
PY - 2009
Y1 - 2009
N2 - We present a unified framework for obtaining Universally Composable (UC) protocols by relying on stand-alone secure non-malleable commitments. Essentially all results on concurrent secure computation|both in relaxed models (e.g., quasi-polynomial time simulation), or with trusted set-up assumptions (e.g., the CRS model, the imperfect CRS model, or the timing model)- are obtained as special cases of our framework. This not only leads to conceptually simpler solutions, but also to improved set-up assumptions, roundcomplexity, and computational assumptions. Additionally, this framework allows us to consider new relaxed models of security: we show that UC security where the adversary is a uniform PPT but the simulator is allowed to be a non-uniform PPT (i.e., essentially, traditional UC security, but with a non-uniform reduction) is possible without any trusted set-up. This gives the first results on concurrent secure computation without set-up, which can be used for securely computing "computationallysensitive" functionalities (e.g., data-base queries, "proof of work"-protocols, or playing bridge on the Internet).
AB - We present a unified framework for obtaining Universally Composable (UC) protocols by relying on stand-alone secure non-malleable commitments. Essentially all results on concurrent secure computation|both in relaxed models (e.g., quasi-polynomial time simulation), or with trusted set-up assumptions (e.g., the CRS model, the imperfect CRS model, or the timing model)- are obtained as special cases of our framework. This not only leads to conceptually simpler solutions, but also to improved set-up assumptions, roundcomplexity, and computational assumptions. Additionally, this framework allows us to consider new relaxed models of security: we show that UC security where the adversary is a uniform PPT but the simulator is allowed to be a non-uniform PPT (i.e., essentially, traditional UC security, but with a non-uniform reduction) is possible without any trusted set-up. This gives the first results on concurrent secure computation without set-up, which can be used for securely computing "computationallysensitive" functionalities (e.g., data-base queries, "proof of work"-protocols, or playing bridge on the Internet).
KW - Non-malleability
KW - Secure multi-party computation
KW - Universal composability
UR - http://www.scopus.com/inward/record.url?scp=70350671713&partnerID=8YFLogxK
U2 - 10.1145/1536414.1536441
DO - 10.1145/1536414.1536441
M3 - ???researchoutput.researchoutputtypes.contributiontobookanthology.conference???
AN - SCOPUS:70350671713
SN - 9781605585062
T3 - Proceedings of the Annual ACM Symposium on Theory of Computing
SP - 179
EP - 188
BT - STOC'09 - Proceedings of the 2009 ACM International Symposium on Theory of Computing
Y2 - 31 May 2009 through 2 June 2009
ER -