On the necessity of rewinding in secure multiparty computation

11Citations
Citations of this article
41Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We investigate whether security of multiparty computation in the information-theoretic setting implies their security under concurrent composition. We show that security in the stand-alone model proven using black-box simulators in the information-theoretic setting does not imply security under concurrent composition, not even security under 2-bounded concurrent self-composition with an inefficient simulator and fixed inputs. This in particular refutes recently made claims on the equivalence of security in the stand-alone model and concurrent composition for perfect and statistical security (STOC'06). Our result strongly relies on the question whether every rewinding simulator can be transformed into an equivalent, potentially inefficient non-rewinding (straight-line) simulator. We answer this question in the negative by giving a protocol that can be proven secure using a rewinding simulator, yet that is not secure for any non-rewinding simulator. © International Association for Cryptologic Research 2007.

References Powered by Scopus

Universally composable security: A new paradigm for cryptographic protocols

2183Citations
N/AReaders
Get full text

Security and composition of multiparty cryptographic protocols

954Citations
N/AReaders
Get full text

Secure computation

224Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Functional encryption: New perspectives and lower bounds

101Citations
N/AReaders
Get full text

Complexity of multi-party computation problems: The case of 2-party symmetric secure function evaluation

37Citations
N/AReaders
Get full text

Security formalizations and their relationships for encryption and key agreement in information-theoretic cryptography

21Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Backes, M., Müller-Quade, J., & Unruh, D. (2007). On the necessity of rewinding in secure multiparty computation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4392 LNCS, pp. 157–173). Springer Verlag. https://doi.org/10.1007/978-3-540-70936-7_9

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 25

76%

Lecturer / Post doc 4

12%

Professor / Associate Prof. 2

6%

Researcher 2

6%

Readers' Discipline

Tooltip

Computer Science 27

77%

Mathematics 4

11%

Physics and Astronomy 2

6%

Engineering 2

6%

Save time finding and organizing research with Mendeley

Sign up for free