Proceedings of the 4th Conference on Innovations in Theoretical Computer Science 2013
DOI: 10.1145/2422436.2422478
|View full text |Cite
|
Sign up to set email alerts
|

An equational approach to secure multi-party computation

Abstract: We present a novel framework for the description and analysis of secure computation protocols that is at the same time mathematically rigorous and notationally lightweight and concise. The distinguishing feature of the framework is that it allows to specify (and analyze) protocols in a manner that is largely independent of time, greatly simplifying the study of cryptographic protocols. At the notational level, protocols are described by systems of mathematical equations (over domains), and can be studied throu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(18 citation statements)
references
References 23 publications
0
18
0
Order By: Relevance
“…This subsection further discuss the model of computation and compare it with other general models in the literature that are aimed at capturing distributed computation with concurrently running processes-some of which explicitly aim at modeling security of protocols. A very incomplete list of such models includes the CSP model of Hoare [74], the CCS model and π -calculus of Milner [99,100] (that is based on the λ-calculus as its basic model of computation), the spi-calculus of Abadi and Gordon [1] (that is based on the π -calculus), the framework of Lincoln et al [87] (that uses the functional representation of probabilistic polynomial time from [101]), the I/O automata of Merritt and Lynch [91], the probabilistic I/O automata of Lynch, Segala, and Vaandrager [92,115], the Abstract Cryptography model of Maurer and Renner [94], and the equational approach of Micciancio and Tessaro [97]. (Other approaches are mentioned in the Appendix.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…This subsection further discuss the model of computation and compare it with other general models in the literature that are aimed at capturing distributed computation with concurrently running processes-some of which explicitly aim at modeling security of protocols. A very incomplete list of such models includes the CSP model of Hoare [74], the CCS model and π -calculus of Milner [99,100] (that is based on the λ-calculus as its basic model of computation), the spi-calculus of Abadi and Gordon [1] (that is based on the π -calculus), the framework of Lincoln et al [87] (that uses the functional representation of probabilistic polynomial time from [101]), the I/O automata of Merritt and Lynch [91], the probabilistic I/O automata of Lynch, Segala, and Vaandrager [92,115], the Abstract Cryptography model of Maurer and Renner [94], and the equational approach of Micciancio and Tessaro [97]. (Other approaches are mentioned in the Appendix.…”
Section: Discussionmentioning
confidence: 99%
“…Micciancio and Tessaro [97] provide an alternative, simplified formalism for composable simulation-based security of protocol. The formalism, which is a generalization of Kahn networks [80], allows for equational (rather than temporal) representation and analysis of protocols and their security.…”
Section: Appendix a Related Workmentioning
confidence: 99%
“…We have already mentioned that cryptographers have developed a plethora of frameworks for composable security, such as universally composable cryptography [16], reactive simulatability [3,4,68] and others [44,49,52,61]. Moreover, some of these frameworks have been adapted to the quantum setting [7, 64,79].…”
Section: Related Workmentioning
confidence: 99%
“…Our work can be seen as a particular formalization of the ideas behind constructive cryptography, or alternatively as giving a categorical account of the real-world-ideal-world paradigm (also known as the simulation paradigm [39]), which underlies more concrete frameworks for composable security, such as universally composable cryptography [16] and others [3,4,44,49,52,61,68]. We will discuss these approaches and abstract and constructive cryptography in more detail in Section 1.1…”
Section: Introductionmentioning
confidence: 99%
“…Rather, our aim is to capture concurrency for more restricted tasks, and thus obtain a simpler definition. Due to its simplicity, our work can also act as a bridge for connecting the full UC framework with alternative formalisms like [25]. A similar attempt at providing a simplified framework appeared in [27,Ch.…”
Section: Related Workmentioning
confidence: 99%