In this paper, we investigate the feasibility of obtaining security in the concurrent setting, assuming that each party has a local clock and that these clocks proceed at approximately the same rate. We show that under this mild timing assumption, it is possible to securely compute {\em any} multiparty functionality under concurrent \emph{self} composition. We also show that it is possible to securely compute {\em any} multiparty functionality under concurrent {\em general} composition, as long as the secure protocol is run only with protocols whose messages are delayed by a specified amount of time. On the negative side, we show that it is impossible to achieve security under concurrent general composition with no restrictions whatsoever on the network (like the aforementioned delays), even in the timing model.
Category / Keywords: cryptographic protocols / multiparty computation, concurrent general composition, timing model Publication Info: Appeared in STOC 2005. Date: received 10 Feb 2005, last revised 16 Jul 2006 Contact author: lindell at cs biu ac il Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation Version: 20060716:062420 (All versions of this report) Short URL: ia.cr/2005/036 Discussion forum: Show discussion | Start new discussion