Paper 2005/036

Concurrent Composition of Secure Protocols in the Timing Model

Yael Kalai, Yehuda Lindell, and Manoj Prabhakaran

Abstract

In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their inputs. In the stand-alone case, it has been shown that {\em every} efficient function can be securely computed. However, in the setting of concurrent composition, broad impossibility results have been proven for the case of no honest majority and no trusted setup phase. These results hold both for the case of general composition (where a secure protocol is run many times concurrently with arbitrary other protocols) and self composition (where a single secure protocol is run many times concurrently). In this paper, we investigate the feasibility of obtaining security in the concurrent setting, assuming that each party has a local clock and that these clocks proceed at approximately the same rate. We show that under this mild timing assumption, it is possible to securely compute {\em any} multiparty functionality under concurrent \emph{self} composition. We also show that it is possible to securely compute {\em any} multiparty functionality under concurrent {\em general} composition, as long as the secure protocol is run only with protocols whose messages are delayed by a specified amount of time. On the negative side, we show that it is impossible to achieve security under concurrent general composition with no restrictions whatsoever on the network (like the aforementioned delays), even in the timing model.

Metadata
Available format(s)
PDF PS
Category
Cryptographic protocols
Publication info
Published elsewhere. Appeared in STOC 2005.
Keywords
multiparty computationconcurrent general compositiontiming model
Contact author(s)
lindell @ cs biu ac il
History
2006-07-16: last of 6 revisions
2005-02-10: received
See all versions
Short URL
https://ia.cr/2005/036
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2005/036,
      author = {Yael Kalai and Yehuda Lindell and Manoj Prabhakaran},
      title = {Concurrent Composition of Secure Protocols in the Timing Model},
      howpublished = {Cryptology {ePrint} Archive, Paper 2005/036},
      year = {2005},
      url = {https://eprint.iacr.org/2005/036}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.