Paper 2011/602

Positive Results for Concurrently Secure Computation in the Plain Model

Vipul Goyal

Abstract

We consider the question of designing concurrently self-composable protocols in the plain model. We first focus on the minimal setting where there is a party \pa which might interact with several other parties in any unbounded (polynomial) number of concurrent sessions. \pa holds a single input $x$ which it uses in all the concurrent sessions. An analogy is a server interacting with various clients at the same time. In this ``single input" setting, we show that many (or even most) functionalities can be securely realized in the plain model. More precisely, we are able to realize all ideal functionalities except ones which are a (weak form of) cryptographic pseudorandom functions. We complement our positive result by showing an impossibility result in this setting for a functionality which evaluates a pseudorandom function. Our security definition follows the standard ideal/real world simulation paradigm (with no super polynomial simulation etc). There is no apriori bound on the number of concurrent executions. We show interesting extensions of our positive results to the more general setting where the honest parties may choose different inputs in different session (even adaptively), the roles that the parties assume in the protocol may be interchangeable, etc. We also put forward a conjecture that we call the bounded pseudoentropy conjecture. Prior to our work, the only positive results known in the plain model in the fully concurrent setting were for zero-knowledge.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. FOCS 2012
Contact author(s)
vipul @ microsoft com
History
2012-09-11: last of 2 revisions
2011-11-10: received
See all versions
Short URL
https://ia.cr/2011/602
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2011/602,
      author = {Vipul Goyal},
      title = {Positive Results for Concurrently Secure Computation in the Plain Model},
      howpublished = {Cryptology {ePrint} Archive, Paper 2011/602},
      year = {2011},
      url = {https://eprint.iacr.org/2011/602}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.