Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security 2014
DOI: 10.1145/2660267.2660374
|View full text |Cite
|
Sign up to set email alerts
|

Practical UC security with a Global Random Oracle

Abstract: We show that there exist commitment, zero-knowledge and general function evaluation protocols with universally composable security, in a model where all parties and all protocols have access to a single, global, random oracle and no other trusted setup. This model provides significantly stronger composable security guarantees than the traditional random oracle model of Bellare and Rogaway [CCS'93] or even the common reference string model. Indeed, these latter models provide no security guarantees in the pres… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
47
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 72 publications
(47 citation statements)
references
References 35 publications
0
47
0
Order By: Relevance
“…We prove a composition theorem that establishes that protocols in our framework are secure in a universally composable fashion. Our composition proof treats the clock and ledger functionalities as global setups in the sense of [CDPW07,CJS14]. We emphasize that this is a critical design choice: the fact that the ledger is a global functionality ensures that any penalties that are incurred to the adversary that result to credits towards the honest parties will be globally recognized.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…We prove a composition theorem that establishes that protocols in our framework are secure in a universally composable fashion. Our composition proof treats the clock and ledger functionalities as global setups in the sense of [CDPW07,CJS14]. We emphasize that this is a critical design choice: the fact that the ledger is a global functionality ensures that any penalties that are incurred to the adversary that result to credits towards the honest parties will be globally recognized.…”
Section: Introductionmentioning
confidence: 99%
“…In our work we utilize global functionalities for universal composition (without the deniability aspect) as in [CJS14] where a similar approach was taken for the case of the use of the random oracle as a global setup functionality for MPC.…”
Section: Introductionmentioning
confidence: 99%
“…Also, we focus on the SCC model and while our protocols do not require rewinding in the proofs wrt coins or cryptographic primitivies, there are subtle issues while trying to guarantee universal composability in the programmable random oracle model. See [10] for more extensive discussion. Remark on cash distribution.…”
Section: Prmentioning
confidence: 99%
“…Similarly, the authors of [14] use FHE circuits for outsourcing execution to the cloud, and further discuss the requirement of selective decryptions in order to detect termination of FHE encrypted programs (called the termination problem). In [53], the authors demonstrate general function evaluation and zero-knowledge protocols focusing on universally composable security, while [15] leverages homomorphic hashing for verifiable computation delegation.…”
Section: Related Workmentioning
confidence: 99%