Universally composable security: a new paradigm for cryptographic protocols
Top Cited Papers
- 1 January 2001
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- No. 15525244,p. 136-145
- https://doi.org/10.1109/sfcs.2001.959888
Abstract
We propose a novel paradigm for defining security of cryptographic protocols, called universally composable security. The salient property of universally composable definitions of security is that they guarantee security even when a secure protocol is composed of an arbitrary set of protocols, or more generally when the protocol is used as a component of an arbitrary system. This is an essential property for maintaining security of cryptographic protocols in complex and unpredictable environments such as the Internet. In particular, universally composable definitions guarantee security even when an unbounded number of protocol instances are executed concurrently in an adversarially controlled manner, they guarantee non-malleability with respect to arbitrary protocols, and more. We show how to formulate universally composable definitions of security for practically any cryptographic task. Furthermore, we demonstrate that practically any such definition can be realized using known techniques, as long as only a minority of the participants are corrupted. We then proceed to formulate universally composable definitions of a wide array of cryptographic tasks, including authenticated and secure communication, key-exchange, public-key encryption, signature, commitment, oblivious transfer, zero knowledge and more. We also make initial steps towards studying the realizability of the proposed definitions in various settings.Keywords
This publication has 40 references indexed in Scilit:
- Nonmalleable CryptographySIAM Journal on Computing, 2000
- On the Composition of Zero-Knowledge Proof SystemsSIAM Journal on Computing, 1996
- Definitions and properties of zero-knowledge proof systemsJournal of Cryptology, 1994
- Three systems for cryptographic protocol analysisJournal of Cryptology, 1994
- The Knowledge Complexity of Interactive Proof SystemsSIAM Journal on Computing, 1989
- Minimum disclosure proofs of knowledgeJournal of Computer and System Sciences, 1988
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message AttacksSIAM Journal on Computing, 1988
- A randomized protocol for signing contractsCommunications of the ACM, 1985
- Probabilistic encryptionJournal of Computer and System Sciences, 1984
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983