On the necessary and sufficient assumptions for UC computation

14Citations
Citations of this article
41Readers
Mendeley users who have this article in their library.

Abstract

We study the necessary and sufficient assumptions for universally composable (UC) computation, both in terms of setup and computational assumptions. We look at the common reference string model, the uniform random string model and the key-registration authority model (KRA), and provide new results for all of them. Perhaps most interestingly we show that: - For even the minimal meaningful KRA, where we only assume that the secret key is a value which is hard to compute from the public key, one can UC securely compute any poly-time functionality if there exists a passive secure oblivious-transfer protocol for the stand-alone model. Since a KRA where the secret keys can be computed from the public keys is useless, and some setup assumption is needed for UC secure computation, this establishes the best we could hope for the KRA model: any non-trivial KRA is sufficient for UC computation. - We show that in the KRA model one-way functions are sufficient for UC commitment and UC zero-knowledge. These are the first examples of UC secure protocols for non-trivial tasks which do not assume the existence of public-key primitives. In particular, the protocols show that non-trivial UC computation is possible in Minicrypt. © 2010 Springer.

References Powered by Scopus

Universally composable security: A new paradigm for cryptographic protocols

2187Citations
N/AReaders
Get full text

Proofs of partial knowledge and simplified design of witness hiding protocols

803Citations
N/AReaders
Get full text

Founding cryptography on oblivious transfer

735Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Efficiency preserving transformations for concurrent non-malleable zero knowledge

20Citations
N/AReaders
Get full text

A unified framework for UC from only OT

18Citations
N/AReaders
Get full text

A zero-one law for cryptographic complexity with respect to computational UC security

18Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Damgård, I., Nielsen, J. B., & Orlandi, C. (2010). On the necessary and sufficient assumptions for UC computation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5978 LNCS, pp. 109–127). https://doi.org/10.1007/978-3-642-11799-2_8

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 25

74%

Researcher 4

12%

Professor / Associate Prof. 3

9%

Lecturer / Post doc 2

6%

Readers' Discipline

Tooltip

Computer Science 28

80%

Mathematics 3

9%

Physics and Astronomy 2

6%

Engineering 2

6%

Save time finding and organizing research with Mendeley

Sign up for free