A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Secure Composition of Cryptographic Protocols
[chapter]
2011
Lecture Notes in Computer Science
General positive results for secure computation were obtained more than two decades ago. These results were for the setting where each protocol execution is done in isolation. With the proliferation of the network setting (and especially the internet), an ambitious effort to generalize these results and obtain concurrently secure protocols was started. However it was soon shown that designing secure protocols in the concurrent setting is unfortunately impossible in general. In this talk, we
doi:10.1007/978-3-642-24316-5_2
fatcat:2o6n4gsvrzau3ph6y5tjyzqm7a