Link to the University of Pittsburgh Homepage
Link to the University Library System Homepage Link to the Contact Us Form

Bringing people of different beliefs together to do UC

Garg, S and Goyal, V and Jain, A and Sahai, A (2011) Bringing people of different beliefs together to do UC. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6597 L. 311 - 328. ISSN 0302-9743

[img]
Preview
PDF
Published Version
Available under License Creative Commons Attribution Non-commercial No Derivatives.

Download (448kB) | Preview
[img] Plain Text (licence)
Download (1kB)

Abstract

Known constructions of UC secure protocols are based on the premise that different parties collectively agree on some trusted setup. In this paper, we consider the following two intriguing questions: Is it possible to achieve UC if the parties do not want to put all their trust in one entity (or more generally, in one setup)? What if the parties have a difference of opinion about what they are willing to trust? The first question has been studied in only a limited way, while the second has never been considered before. In this paper, we initiate a systematic study to answer the above questions. We consider a scenario with multiple setup instances where each party in the system has some individual belief (setup assumption in terms of the given setups). The belief of a party corresponds to what it is willing to trust and its security is guaranteed given that its belief "holds." The question considered is: "Given some setups and the (possibly) different beliefs of all the parties, when can UC security be achieved?" We present a general condition on the setups and the beliefs of all the parties under which UC security is possible. Surprisingly, we show that when parties have different beliefs, UC security can be achieved with a more limited "trust" than what is necessary in the traditional setting (where all parties have a common belief). © 2011 International Association for Cryptologic Research.


Share

Citation/Export:
Social Networking:
Share |

Details

Item Type: Article
Status: Published
Creators/Authors:
CreatorsEmailPitt UsernameORCID
Garg, S
Goyal, V
Jain, A
Sahai, A
Date: 1 January 2011
Date Type: Publication
Journal or Publication Title: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume: 6597 L
Page Range: 311 - 328
Event Type: Conference
DOI or Unique Handle: 10.1007/978-3-642-19571-6_19
Schools and Programs: School of Law > Law > Faculty Publications
School of Law > Faculty Publications

School of Law > Law
Refereed: Yes
ISBN: 9783642195709
ISSN: 0302-9743
Date Deposited: 28 Sep 2020 17:56
Last Modified: 07 Jul 2022 22:55
URI: http://d-scholarship-dev.library.pitt.edu/id/eprint/39763

Metrics

Monthly Views for the past 3 years

Plum Analytics

Altmetric.com


Actions (login required)

View Item View Item