2014
DOI: 10.1007/978-3-319-12475-9_2
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive versus Static Security in the UC Model

Abstract: Abstract. We show that for certain class of unconditionally secure protocols and target functionalities, static security implies adaptive security in the UC model. Similar results were previously only known for models with weaker security and/or composition guarantees. The result is, for instance, applicable to a wide range of protocols based on secret sharing. It "explains" why an often used proof technique for such protocols works, namely where the simulator runs in its head a copy of the honest players usin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Firstly, one of the above trackability attack strategies has to be implemented in a model in a trace-based verification tool. On the one hand, selective blocking comes almost for free in any DY [20] tool: the attacker can and will try to block any message, and the "selective" nature is achieved by writing a model with a set of rules, restrictions and/or predicates, which quantify over a particular ID whose messages were "selectively" blocked 18 . On the other hand, forced conditions are implicitly implemented in any DY tool: the DY attacker will try arbitrary inputs forcing both the if and the else branch of all protocol tests.…”
Section: B Mechanising Explicit Trackability 1) Explicit Trackability...mentioning
confidence: 99%
See 1 more Smart Citation
“…Firstly, one of the above trackability attack strategies has to be implemented in a model in a trace-based verification tool. On the one hand, selective blocking comes almost for free in any DY [20] tool: the attacker can and will try to block any message, and the "selective" nature is achieved by writing a model with a set of rules, restrictions and/or predicates, which quantify over a particular ID whose messages were "selectively" blocked 18 . On the other hand, forced conditions are implicitly implemented in any DY tool: the DY attacker will try arbitrary inputs forcing both the if and the else branch of all protocol tests.…”
Section: B Mechanising Explicit Trackability 1) Explicit Trackability...mentioning
confidence: 99%
“…We use the terminology of "static" and "adaptive" attackers as per the usual ways in security[18]. Therein, adaptive attackers can change behaviour during their attack.…”
mentioning
confidence: 99%
“…As a result, different sharings are independent from each other and it is sufficient to prove simulatability of a single sharing. In case of adaptive corruption, the secret sharing scheme must be efficiently patchable [56] as the simulator must progressively disclose shares of an unknown value. The existence of trusted setup F allows to achieve integrity even for honest minority.…”
Section: Definition 2 (Hiding Storage)mentioning
confidence: 99%