Sciweavers

CSFW
2010
IEEE

A Framework for the Sound Specification of Cryptographic Tasks

13 years 7 months ago
A Framework for the Sound Specification of Cryptographic Tasks
Nowadays it is widely accepted to formulate the security of a protocol carrying out a given task via the "trusted-party paradigm," where the protocol execution is compared with an ideal process where the outputs are computed by a trusted party that sees all the inputs. A protocol is said to securely carry out a given task if running the protocol with a realistic adversary amounts to "emulating" the ideal process with the appropriate trusted party. In the Universal Composability (UC) framework the program run by the trusted party is called an ideal functionality. While this simulation-based security formulation provides strong security guarantees, its usefulness is contingent on the properties and correct specification of the ideal functionality, which, as demonstrated in recent years by the coexistence of complex, multiple functionalities for the same task as well as by their "unstable" nature, does not seem to be an easy task. In this paper we address th...
Juan A. Garay, Aggelos Kiayias, Hong-Sheng Zhou
Added 02 Sep 2010
Updated 02 Sep 2010
Type Conference
Year 2010
Where CSFW
Authors Juan A. Garay, Aggelos Kiayias, Hong-Sheng Zhou
Comments (0)