[Resource Topic] 2014/201: From Input Private to Universally Composable Secure Multiparty Computation Primitives

Welcome to the resource topic for 2014/201

Title:
From Input Private to Universally Composable Secure Multiparty Computation Primitives

Authors: Dan Bogdanov, Peeter Laud, Sven Laur, Pille Pullonen

Abstract:

Secure multiparty computation systems are commonly built form a small set of primitive components. Composability of security notions has a central role in the analysis of such systems, since it allows us to deduce security properties of complex protocols from the properties of its components. We show that the standard notions of universally composable security are overly restrictive in this context and can lead to protocols with sub-optimal performance. As a remedy, we introduce a weaker notion of privacy that is satisfied by simpler protocols and is preserved by composition. After that we fix a passive security model and show how to convert a private protocol into a universally composable protocol. As a result, we obtain modular security proofs without performance penalties.

ePrint: https://eprint.iacr.org/2014/201

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .