Cryptology ePrint Archive: Report 2020/1209

Universal Composition with Global Subroutines: Capturing Global Setup within plain UC

Christian Badertscher and Ran Canetti and Julia Hesse and Björn Tackmann and Vassilis Zikas

Abstract: The Global and Externalized UC frameworks [Canetti-Dodis-Pass-Walfish, TCC 07] extend the plain UC framework to additionally handle protocols that use a ``global setup'', namely a mechanism that is also used by entities outside the protocol. These frameworks have broad applicability: Examples include public-key infrastructures, common reference strings, shared synchronization mechanisms, global blockchains, or even abstractions such as the random oracle. However, the need to work in a specialized framework has been a source of confusion, incompatibility, and an impediment to broader use.

We show how security in the presence of a global setup can be captured within the plain UC framework, thus significantly simplifying the treatment. This is done as follows:

- We extend UC-emulation to the case where both the emulating protocol $\pi$ and the emulated protocol $\phi$ make subroutine calls to protocol $\gamma$ that is accessible also outside $\pi$ and $\phi$. As usual, this notion considers only a single instance of $\phi$ or $\pi$ (alongside $\gamma$).

- We extend the UC theorem to hold even with respect to the new notion of UC emulation. That is, we show that if $\pi$ UC-emulates $\phi$ in the presence of $\gamma$, then $\rho^{\phi\rightarrow\pi}$ UC-emulates $\rho$ for any protocol $\rho$, even when $\rho$ uses $\gamma$ directly, and in addition calls many instances of $\phi$, all of which use the same instance of $\gamma$. We prove this extension using the existing UC theorem as a black box, thus further simplifying the treatment.

We also exemplify how our treatment can be used to streamline, within the plain UC model, proofs of security of systems that involve global set-up, thus providing greater simplicity and flexibility.

Category / Keywords: foundations / Universal Composition, Global Setup

Original Publication (with major differences): IACR-TCC-2020

Date: received 2 Oct 2020

Contact author: christian badertscher at iohk io,canetti@bu edu,jhs@zurich ibm com,bjoern@dfinity org,vzikas@inf ed ac uk

Available format(s): PDF | BibTeX Citation

Version: 20201006:093947 (All versions of this report)

Short URL: ia.cr/2020/1209


[ Cryptology ePrint archive ]