On the limitations of universally composable two-party computation without set-up assumptions

Ran Canetti, Eran Kushilevitz, Y. Lindell

Research output: Contribution to journalArticlepeer-review

Abstract

The recently proposed universally composable (UC) security framework, for analyzing security of cryptographic protocols, provides very strong security guarantees. In particular, a protocol proven secure in this framework is guaranteed to maintain its security even when deployed in arbitrary multi-party, multi-protocol, multi-execution environments. Protocols for securely carrying out essentially any cryptographic task in a universally composable way exist, both in the case of an honest majority (in the plain model, i.e., without set-up assumptions) and in the case of no honest majority (in the common reference string model). However, in the plain model, little was known for the case of no honest majority and, in particular, for the important special case of two-party protocols. We study the feasibility of universally composable two-party function evaluation in the plain model. Our results show that very few functions can be computed in this model so as to provide the UC security guarantees. Specifically, for the case of deterministic functions, we provide a full characterization of the functions computable in this model. (Essentially, these are the functions that depend on at most one of the parties' inputs, and furthermore are “efficiently invertible” in a sense defined within.) For the case of probabilistic functions, we show that the only functions computable in this model are those where one of the parties can essentially uniquely determine the joint output
Original languageAmerican English
Pages (from-to)135-167
JournalJournal of Cryptology
Volume19
Issue number2
StatePublished - 2006

Fingerprint

Dive into the research topics of 'On the limitations of universally composable two-party computation without set-up assumptions'. Together they form a unique fingerprint.

Cite this