Abstract
Concurrent general composition relates to a setting where a secure protocol is run in a network concurrently with other, arbitrary protocols. Clearly, security in such a setting is what is desired, or even needed, in modern computer networks where many different protocols are executed concurrently. Our main result is a proof that security under concurrent general composition is equivalent to a relaxed variant of universal composability (where the only difference relates to the order of quantifiers in the definition). An important corollary of this theorem is that existing impossibility results for universal composability (or actually its relaxed variant) are inherent in any definition achieving security under concurrent general composition. We stress that the impossibility results obtained are not "black-box", and apply even to non-black-box simulation. Our main result also demonstrates that the definition of universal composability is somewhat "minimal", in that the composition guarantee provided by universal composability (almost) implies the definition itself. This indicates that the security definition of universal composability is not overly restrictive.
Original language | English |
---|---|
Title of host publication | Proceedings - 44th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2003 |
Publisher | IEEE Computer Society |
Pages | 394-403 |
Number of pages | 10 |
ISBN (Electronic) | 0769520405 |
DOIs | |
State | Published - 2003 |
Externally published | Yes |
Event | 44th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2003 - Cambridge, United States Duration: 11 Oct 2003 → 14 Oct 2003 |
Publication series
Name | Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS |
---|---|
Volume | 2003-January |
ISSN (Print) | 0272-5428 |
Conference
Conference | 44th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2003 |
---|---|
Country/Territory | United States |
City | Cambridge |
Period | 11/10/03 → 14/10/03 |
Bibliographical note
Publisher Copyright:© 2003 IEEE.
Keywords
- Computer networks
- Computer security
- Concurrent computing
- Cryptography
- Intelligent networks
- Polynomials
- Privacy
- Protocols
- Random variables
- Stress