A Framework for the Sound Specification of Cryptographic Tasks

Nowadays it is widely accepted to formulate the security of a protocol carrying out a given task via the "Trusted-party paradigm," where the protocol execution is compared with an ideal process where the outputs are computed by a trusted party that sees all the inputs. A protocol is said to securely carry out a given task if running the protocol with a realistic adversary amounts to "Emulating" the ideal process with the appropriate trusted party. In the Universal Composability (UC) framework the program run by the trusted party is called an ideal functionality.

Provided by: University of Connecticut Topic: Security Date Added: Mar 2010 Format: PDF

Download Now

Find By Topic