45th Annual IEEE Symposium on Foundations of Computer Science
DOI: 10.1109/focs.2004.71
|View full text |Cite
|
Sign up to set email alerts
|

Universally Composable Protocols with Relaxed Set-Up Assumptions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
175
0

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 120 publications
(176 citation statements)
references
References 18 publications
1
175
0
Order By: Relevance
“…Following the work of [49], the task of constructing UC secure protocols from any setup assumption reduces to the task of constructing a UC-puzzle in the hybrid model of the corresponding setup. 6 We obtain our positive result by following the same route. Specifically, we construct a "family of UC-puzzles" in the G wrap -hybrid model.…”
Section: Uc With Leaky Tokensmentioning
confidence: 63%
See 1 more Smart Citation
“…Following the work of [49], the task of constructing UC secure protocols from any setup assumption reduces to the task of constructing a UC-puzzle in the hybrid model of the corresponding setup. 6 We obtain our positive result by following the same route. Specifically, we construct a "family of UC-puzzles" in the G wrap -hybrid model.…”
Section: Uc With Leaky Tokensmentioning
confidence: 63%
“…In order to obtain our positive result, we build on the recent work of Lin et al [49] which puts forward a unified framework for designing UC secure protocols from known setup assumptions [12,13,43,6]. Lin et al observe that a general technique for constructing UC secure protocols is to have the simulator obtain a "trapdoor string" which is hard to compute for the adversary.…”
Section: Uc With Leaky Tokensmentioning
confidence: 99%
“…Unfortunately, most interesting cryptographic tasks are impossible to realize in the "plain" UC framework when an honest majority cannot be assumed and, in particular, in the setting of twoparty computation [9,10,44]. This negative result has motivated researchers to explore various extensions/variants of the plain UC framework in which secure computation can be achieved [8], with notable examples being the assumption of a common reference string (CRS) [7,9,11] or a public-key infrastructure [7,4]. In the real world, implementing either of these approaches seems to require the existence of some trusted entity that parties agree to use (though see [12] for some ideas on using a naturally occurring high-entropy source in place of a CRS).…”
Section: Introductionmentioning
confidence: 99%
“…In [10] it was shown that given a CRS, any functionality has a UC secure realisation. Furthermore, in [1] it was shown that the same holds for a PKI. 14 However, given a ZK functionality, commitments can be realised even with respect to long-term UC.…”
Section: Commitmentmentioning
confidence: 79%
“…First, we see that if prover and verifier are both honest, the verifier will always accept. This is due to the fact that for a Blum-integer n, a random residue is a square with probability at least 1 4 . Now we consider the case that the verifier is corrupted.…”
Section: Theorem 3 (Zk For Blum-integers Using Coin Toss) Assume Thamentioning
confidence: 99%