Universally composable multi-party computation using tamper-proof hardware
Title | Universally composable multi-party computation using tamper-proof hardware |
Publication Type | Journal Articles |
Year of Publication | 2007 |
Authors | Katz J |
Journal | Advances in Cryptology-EUROCRYPT 2007 |
Pagination | 115 - 128 |
Date Published | 2007/// |
Abstract | Protocols proven secure within the universal composability (UC) framework satisfy strong and desirable security properties. Unfortunately, it is known that within the “plain” model, secure computation of general functionalities without an honest majority is impossible. This has prompted researchers to propose various “setup assumptions” with which to augment the bare UC framework in order to bypass this severe negative result. Existing setup assumptions seem to inherently require some trusted party (or parties) to initialize the setup in the real world.We propose a new setup assumption — more along the lines of a physical assumption regarding the existence of tamper-proof hardware — which also suffices to circumvent the impossibility result mentioned above. We suggest this assumption as potentially leading to an approach that might alleviate the need for trusted parties, and compare our assumption to those proposed previously. |
DOI | 10.1007/978-3-540-72540-4_7 |