In this paper, we consider the following question: Does composing protocols having game-theoretic security result in a secure protocol in the sense of game-theoretic security? In order to discuss the composability of game-theoretic properties, we study security of cryptographic protocols in terms of the universal composability (UC) and game theory simultaneously. The contribution of this paper is the following: (i) We propose a compiler of two-party protocols in the local universal composability (LUC) framework such that it transforms any two-party protocol secure against semi-honest adversaries into a protocol secure against malicious adversaries in the LUC framework; (ii) We consider the application of our compiler to oblivious transfer (...
We construct a protocol for constant round Two-Party Secure Function Evaluation in the standard mode...
Secure multi-party computation systems are commonly built from a small set of primitive components. ...
In this paper, we study the question of whether or not it is possible to construct protocols for gen...
In this paper, we consider the following question: Does composing protocols having game-theoretic se...
We show that random oblivious transfer protocols that are statistically secure according to a defini...
In this paper we examine composability properties for the fundamental task of key exchange. Roughly ...
Universal composability is a framework for the specification and analysis of cryptographic protocols...
In this work, we investigate the security of interactive computations. The main emphasis is on the m...
Cryptography is a cornerstone for the protection of the digital society, and security definitions li...
The security analysis of real-world protocols involves reduction steps that are conceptually simple ...
In 2015, Chou and Orlandi presented an oblivious transfer protocol that already drew a lot of attent...
peer reviewedIn 2015, Chou and Orlandi presented an oblivious transfer protocol that already drew a ...
In a seminal work, Katz (Eurocrypt 2007) showed that parties being able to issue tamper-proof hardwa...
We continue the line of work initiated by Katz (Eurocrypt 2007) on using tamper-proof hardware for u...
Abstract. Higo, Tanaka, Yamada, and Yasunaga (ACISP 2012) studied oblivious transfer (OT) from a gam...
We construct a protocol for constant round Two-Party Secure Function Evaluation in the standard mode...
Secure multi-party computation systems are commonly built from a small set of primitive components. ...
In this paper, we study the question of whether or not it is possible to construct protocols for gen...
In this paper, we consider the following question: Does composing protocols having game-theoretic se...
We show that random oblivious transfer protocols that are statistically secure according to a defini...
In this paper we examine composability properties for the fundamental task of key exchange. Roughly ...
Universal composability is a framework for the specification and analysis of cryptographic protocols...
In this work, we investigate the security of interactive computations. The main emphasis is on the m...
Cryptography is a cornerstone for the protection of the digital society, and security definitions li...
The security analysis of real-world protocols involves reduction steps that are conceptually simple ...
In 2015, Chou and Orlandi presented an oblivious transfer protocol that already drew a lot of attent...
peer reviewedIn 2015, Chou and Orlandi presented an oblivious transfer protocol that already drew a ...
In a seminal work, Katz (Eurocrypt 2007) showed that parties being able to issue tamper-proof hardwa...
We continue the line of work initiated by Katz (Eurocrypt 2007) on using tamper-proof hardware for u...
Abstract. Higo, Tanaka, Yamada, and Yasunaga (ACISP 2012) studied oblivious transfer (OT) from a gam...
We construct a protocol for constant round Two-Party Secure Function Evaluation in the standard mode...
Secure multi-party computation systems are commonly built from a small set of primitive components. ...
In this paper, we study the question of whether or not it is possible to construct protocols for gen...