Obtaining universally compoable security: Towards the bare bones of trust

Ran Canetti*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

23 Scopus citations

Abstract

A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally Composable (UC) security provides this guarantee in a strong sense: A UC-secure protocol maintains its security properties even when composed concurrently with an unbounded number of instances of arbitrary protocols. However, many interesting cryptographic tasks are provably impossible to realize with UC security, unless some trusted set-up is assumed. Impossibility holds even if ideally authenticated communication channels are provided. This survey examines and compares a number of set-up assumptions (models) that were recently demonstrated to suffice for constructing UC-secure protocols that realize practically any cryptographic task. We start with the common reference string (CRS) and key registration (KR) models. We then proceed to the "sunspot" models, which allow for some adversarial control over the set-up, a number of models which better captures set-up that is globally available in the system, and a timing assumption. Finally, we briefly touch upon set-up models for obtaining authenticated communication.

Original languageEnglish
Title of host publicationAdvances in Cryptology - ASIACRYPT 2007 - 13th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
PublisherSpringer Verlag
Pages88-112
Number of pages25
ISBN (Print)9783540768999
DOIs
StatePublished - 2007
Externally publishedYes
Event13th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2007 - Kuching, Malaysia
Duration: 2 Dec 20076 Dec 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4833 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference13th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2007
Country/TerritoryMalaysia
CityKuching
Period2/12/076/12/07

Fingerprint

Dive into the research topics of 'Obtaining universally compoable security: Towards the bare bones of trust'. Together they form a unique fingerprint.

Cite this