Abstract. In the context of Universal Composability, we introduce the concept of universal environments and simulators. Then, Universal Composability is equivalent to Universal Composability wrt. universal environments and simulators. We prove the existence of universal environments and simulators and investigate their computational complexity. From this, we get a number of consequences: First, we see that for polynomial-time protocols, exponential adversarial entities are as powerful as unlimited ones. Further, for a large class of protocols (those with bounded communication-complexity) we can show that UC and specialised-simulator UC coincide in the case of statistical security, i.e., that it is does not matter whether the simulator is ch...
The standard class of adversaries considered in cryptography is that of {\em strict} polynomial-time...
We show that random oblivious transfer protocols that are statistically secure according to a defini...
In this paper, we consider the following question: Does composing protocols having game-theoretic se...
In the context of Universal Composability, we introduce the concept of universal environments and si...
In the context of Universal Composability, we introduce the concept of universal environments and s...
We prove that security in the Universal Composability framework (UC) is equivalent to security in t...
Concurrent general composition relates to a setting where a secure protocol is run in a network conc...
Several compositional forms of simulation-based security have been proposed in the literature, inclu...
Abstract Concurrent general composition relates to a setting where a secure protocol is run in anetw...
Abstract. Several compositional forms of simulation-based security have been proposed in the literat...
International audienceIn this paper we enhance the EasyCrypt proof assistant to reason about computa...
Secure multi-party computation is a conceptual framework in which distrusting parties engage in a pr...
Recently, there has been much interest in extending models for simulation-based security in such a ...
he algebraic-group model (AGM), which lies between the generic group model and the standard model of...
In this work, relations between the security notions standard simulatability and universal simulata...
The standard class of adversaries considered in cryptography is that of {\em strict} polynomial-time...
We show that random oblivious transfer protocols that are statistically secure according to a defini...
In this paper, we consider the following question: Does composing protocols having game-theoretic se...
In the context of Universal Composability, we introduce the concept of universal environments and si...
In the context of Universal Composability, we introduce the concept of universal environments and s...
We prove that security in the Universal Composability framework (UC) is equivalent to security in t...
Concurrent general composition relates to a setting where a secure protocol is run in a network conc...
Several compositional forms of simulation-based security have been proposed in the literature, inclu...
Abstract Concurrent general composition relates to a setting where a secure protocol is run in anetw...
Abstract. Several compositional forms of simulation-based security have been proposed in the literat...
International audienceIn this paper we enhance the EasyCrypt proof assistant to reason about computa...
Secure multi-party computation is a conceptual framework in which distrusting parties engage in a pr...
Recently, there has been much interest in extending models for simulation-based security in such a ...
he algebraic-group model (AGM), which lies between the generic group model and the standard model of...
In this work, relations between the security notions standard simulatability and universal simulata...
The standard class of adversaries considered in cryptography is that of {\em strict} polynomial-time...
We show that random oblivious transfer protocols that are statistically secure according to a defini...
In this paper, we consider the following question: Does composing protocols having game-theoretic se...