Concurrent Composition of Secure Protocols in the Timing Model
J. Cryptology, pp. 431-492, 2005.
Secure ProtocolLocal ClockProtocol ExecutionHonest PartySecure Multiparty Computation
In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their inputs. In the stand-alone case it has been shown that every efficient function can be securely computed. However, in the setting of concurrent composition, broad impossibility results have been prov...More
Full Text (Upload PDF)