Adaptive versus static security in the UC Model

8Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We show that for certain class of unconditionally secure protocols and target functionalities, static security implies adaptive security in the UC model. Similar results were previously only known for models with weaker security and/or composition guarantees. The result is, for instance, applicable to a wide range of protocols based on secret sharing. It “explains” why an often used proof technique for such protocols works, namely where the simulator runs in its head a copy of the honest players using dummy inputs and generates a protocol execution by letting the dummy players interact with the adversary. When a new player Pi is corrupted, the simulator adjusts the state of its dummy copy of Pi to be consistent with the real inputs and outputs of Pi and gives the state to the adversary. Our result gives a characterization of the cases where this idea will work to prove adaptive security. As a special case, we use our framework to give the first proof of adaptive security of the seminal BGW protocol in the UC framework.

Cite

CITATION STYLE

APA

Damgård, I., & Nielsen, J. B. (2014). Adaptive versus static security in the UC Model. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8782, 10–28. https://doi.org/10.1007/978-3-319-12475-9_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free