Lecture 3,4: Universal Composability

نویسندگان

  • Ran Canetti
  • Yael Kalai
چکیده

3 Proof of the Composition Theorem Let A be any B-limited adversary that interacts with protocol QP in the real-life model. Our goal is to construct a B-limited adversary H that interacts with protocol Q in the f -hybrid model, such that no environment Z can tell the difference between the two interactions. We will construct H via the following three steps. 1. From A we construct an adversary AP that interacts only with protocol P . 2. From the security of P , there is an adversary SP in the ideal process for evaluation of f , such that for every environment Z, IDEALfSP ,Z ∼ EXECP,AP ,Z . 3. We use A and SP to construct an adversary H and show that for every environment Z, EXEC Q,H,Z ∼ EXECQP ,A,Z .

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Relations among Statistical Security Notions or Why Exponential Adversaries are Unlimited

In the context of Universal Composability, we introduce the concept of universal environments and simulators. Then, Universal Composability is equivalent to Universal Composability wrt. universal environments and simulators. We prove the existence of universal environments and simulators and investigate their computational complexity. From this, we get a number of consequences: First, we see th...

متن کامل

Relations amount Statistical Security Notions - or - Why Exponential Adversaries are Unlimited

In the context of Universal Composability, we introduce the concept of universal environments and simulators. Then, Universal Composability is equivalent to Universal Composability wrt. universal environments and simulators. We prove the existence of universal environments and simulators and investigate their computational complexity. From this, we get a number of consequences: First, we see th...

متن کامل

A Paradox of Quantum Universal Composability

Security of cryptographic protocols under composition is a major concern in cryptography. For classical cryptography Canetti gave a definition of security implying universal composability [Can01]. A protocol proven secure in that sense may replace ideal functionalities in arbitrary applications preserving the overall security of the application. In this contribution we sketch the modifications ...

متن کامل

An optimistic fair exchange protocol and its security in the universal composability framework

Fair exchange protocols allow both or neither of two parties to obtain the other’s items, and this property is essential in e-commerce. In this paper, we construct an optimistic fair exchange protocol that is applicable to any digital signature by prescribing three forms of signatures, namely presignature, post-signature and notarised signature. We set an expiration date for presignature, and t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004