Universal composability from essentially any trusted setup

4Citations
Citations of this article
44Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

It is impossible to securely carry out general multi-party computation in arbitrary network contexts like the Internet, unless protocols have access to some trusted setup. In this work we classify the power of such trusted (2-party) setup functionalities. We show that nearly every setup is either useless (ideal access to the setup is equivalent to having no setup at all) or else complete (composably secure protocols for all tasks exist in the presence of the setup). We further argue that those setups which are neither complete nor useless are highly unnatural. The main technical contribution in this work is an almost-total characterization of completeness for 2-party setups. Our characterization treats setup functionalities as black-boxes, and therefore is the first work to classify completeness of arbitrary setup functionalities (i.e., randomized, reactive, and having behavior that depends on the global security parameter). © 2012 International Association for Cryptologic Research.

Cite

CITATION STYLE

APA

Rosulek, M. (2012). Universal composability from essentially any trusted setup. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7417 LNCS, pp. 406–423). https://doi.org/10.1007/978-3-642-32009-5_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free