DocumentCode :
1710536
Title :
Universally composable security: a new paradigm for cryptographic protocols
Author :
Canetti, Ran
Author_Institution :
IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA
fYear :
2001
Firstpage :
136
Lastpage :
145
Abstract :
We propose a novel paradigm for defining security of cryptographic protocols, called universally composable security. The salient property of universally composable definitions of security is that they guarantee security even when a secure protocol is composed of an arbitrary set of protocols, or more generally when the protocol is used as a component of an arbitrary system. This is an essential property for maintaining security of cryptographic protocols in complex and unpredictable environments such as the Internet. In particular, universally composable definitions guarantee security even when an unbounded number of protocol instances are executed concurrently in an adversarially controlled manner, they guarantee non-malleability with respect to arbitrary protocols, and more. We show how to formulate universally composable definitions of security for practically any cryptographic task. Furthermore, we demonstrate that practically any such definition can be realized using known techniques, as long as only a minority of the participants are corrupted. We then proceed to formulate universally composable definitions of a wide array of cryptographic tasks, including authenticated and secure communication, key-exchange, public-key encryption, signature, commitment, oblivious transfer, zero knowledge and more. We also make initial steps towards studying the realizability of the proposed definitions in various settings.
Keywords :
bibliographies; computability; cryptography; message authentication; protocols; Internet; adversarially controlled execution; arbitrary protocols; arbitrary system; authenticated communication; complex unpredictable environments; concurrent composition; cryptographic protocol paradigm; cryptographic task; key-exchange; non-malleability; oblivious transfer; public-key encryption; secure communication; secure protocol; universally composable definitions; universally composable security; zero knowledge; Application software; Computer science; Computer security; Cryptographic protocols; Cryptography; Job design; Mathematical model; Radio access networks; Reactive power;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Foundations of Computer Science, 2001. Proceedings. 42nd IEEE Symposium on
Print_ISBN :
0-7695-1116-3
Type :
conf
DOI :
10.1109/SFCS.2001.959888
Filename :
959888
Link To Document :
بازگشت