作者
Ran Canetti, Yehuda Lindell, Rafail Ostrovsky, Amit Sahai
发表日期
2002/5/19
研讨会论文
Proceedings of the thiry-fourth annual ACM symposium on Theory of computing
页码范围
494-503
出版商
ACM
简介
We show how to securely realize any multi-party functionality in a universally composable way, regardless of the number of corrupted participants. That is, we consider a multi-party network with open communication and an adversary that can adaptively corrupt as many parties as it wishes. In this setting, our protocols allow any subset of the parties (with pairs of parties being a special case) to securely realize any desired functionality of their local inputs, and be guaranteed that security is preserved regardless of the activity in the rest of the network. This implies that security is preserved under concurrent composition of an unbounded number of protocol executions, it implies non-malleability with respect to arbitrary protocols, and more. Our constructions are in the common reference string model and make general intractability assumptions.
引用总数
20022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024628384149393635373735535171574536403851475015
学术搜索中的文章
R Canetti, Y Lindell, R Ostrovsky, A Sahai - Proceedings of the thiry-fourth annual ACM symposium …, 2002
R Canetti, Y Lindell, R Ostrovsky, A Sahai - Proceedings of STOC