Universal composition with global subroutines: Capturing global setup within plain UC

Christian Badertscher*, Ran Canetti, Julia Hesse, Björn Tackmann, Vassilis Zikas

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

14 Scopus citations

Abstract

The Global and Externalized UC frameworks [Canetti-Dodis-Pass-Walfish, TCC 07] extend the plain UC framework to additionally handle protocols that use a “global setup”, namely a mechanism that is also used by entities outside the protocol. These frameworks have broad applicability: Examples include public-key infrastructures, common reference strings, shared synchronization mechanisms, global blockchains, or even abstractions such as the random oracle. However, the need to work in a specialized framework has been a source of confusion, incompatibility, and an impediment to broader use. We show how security in the presence of a global setup can be captured within the plain UC framework, thus significantly simplifying the treatment. This is done as follows: We extend UC-emulation to the case where both the emulating protocol π and the emulated protocol ɸ make subroutine calls to protocol γ that is accessible also outside π and ɸ. As usual, this notion considers only a single instance of ɸ or π (alongside γ).We extend the UC theorem to hold even with respect to the new notion of UC emulation. That is, we show that if π UC-emulates ɸ in the presence of γ, then ϱɸ → π UC-emulates ϱ for any protocol ϱ, even when ϱ uses γ directly, and in addition calls many instances of ɸ, all of which use the same instance of γ. We prove this extension using the existing UC theorem as a black box, thus further simplifying the treatment. We also exemplify how our treatment can be used to streamline, within the plain UC model, proofs of security of systems that involve global set-up, thus providing greater simplicity and flexibility.

Original languageEnglish
Title of host publicationTheory of Cryptography - 18th International Conference, TCC 2020, Proceedings
EditorsRafael Pass, Krzysztof Pietrzak
PublisherSpringer Science and Business Media Deutschland GmbH
Pages1-30
Number of pages30
ISBN (Print)9783030643805
DOIs
StatePublished - 2020
Externally publishedYes
Event18th International Conference on Theory of Cryptography, TCCC 2020 - Durham, United States
Duration: 16 Nov 202019 Nov 2020

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume12552 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference18th International Conference on Theory of Cryptography, TCCC 2020
Country/TerritoryUnited States
CityDurham
Period16/11/2019/11/20

Funding

FundersFunder number
National Science Foundation1801564, 1414119, 1931714
Defense Advanced Research Projects Agency
International Business Machines Corporation
Horizon 2020 Framework Programme780477 PRIViLEDGE
University of Edinburgh
Check Point Institute for Information Security, Tel Aviv University

    Fingerprint

    Dive into the research topics of 'Universal composition with global subroutines: Capturing global setup within plain UC'. Together they form a unique fingerprint.

    Cite this