Concurrent general composition of secure protocols in the timing model

Yael Tauman Kalai, Yehuda Lindell, Manoj Prabhakaran

Research output: Contribution to journalConference article

Abstract

In the setting of secure multiparty computation, a set of mutually distrustful parties wish to jointly compute some function of their input (i.e., they wish to securely carry out some distributed task). In the stand-alone case, it has been shown that every efficient function can be securely computed. However, in the setting of concurrent composition, broad impossibility results have been proven for the case where there is no honest majority (or trusted setup). In this paper, we investigate the feasibility of obtaining secure multiparty protocols in a network where certain time bounds are assumed. Specifically, the security of our protocols rely on the very reasonable assumption that local clocks do not "drift" too much (i.e., it is assumed that they proceed at approximately the same rate). We show that under this mild timing assumption, it is possible to securely compute any functionality under concurrent general composition (as long as messages from the arbitrary other protocols are delayed for a specified amount of time).

Original languageEnglish (US)
Pages (from-to)644-653
Number of pages10
JournalProceedings of the Annual ACM Symposium on Theory of Computing
DOIs
StatePublished - Dec 1 2005
Event13th Color Imaging Conference: Color Science, Systems, Technologies, and Applications - Scottsdale, AZ, United States
Duration: Nov 7 2005Nov 11 2005

Keywords

  • Cryptography
  • Protocol composition
  • Secure multiparty computation

ASJC Scopus subject areas

  • Software

Fingerprint Dive into the research topics of 'Concurrent general composition of secure protocols in the timing model'. Together they form a unique fingerprint.

  • Cite this