Cryptology ePrint Archive: Report 2015/950

A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer

Shota Goto and Junji Shikata

Abstract: In this paper, we consider the following question: Does composing protocols having game-theoretic security result in a secure protocol in the sense of game-theoretic security? In order to discuss the composability of game-theoretic properties, we study security of cryptographic protocols in terms of the universal composability (UC) and game theory simultaneously. The contribution of this paper is the following: (i) We propose a compiler of two-party protocols in the local universal composability (LUC) framework such that it transforms any two-party protocol secure against semi-honest adversaries into a protocol secure against malicious adversaries in the LUC framework; (ii) We consider the application of our compiler to oblivious transfer (OT) protocols, by which we obtain a construction of OT meeting both UC security and game-theoretic security.

Category / Keywords: cryptographic protocols / game-theoretic security, universal composability, local universal composability, oblivious transfer

Original Publication (with minor differences): Cryptography and Coding - 15th IMA International Conference, IMACC 2015

Date: received 30 Sep 2015

Contact author: goto-shota-zx at ynu jp

Available format(s): PDF | BibTeX Citation

Version: 20150930:120542 (All versions of this report)

Short URL: ia.cr/2015/950

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]