A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Leakage-Tolerant Interactive Protocols
[chapter]
2012
Lecture Notes in Computer Science
We put forth a framework for expressing security requirements from interactive protocols in the presence of arbitrary leakage. The framework allows capturing different levels of leakage-tolerance of protocols, namely the preservation (or degradation) of security, under coordinated attacks that include various forms of leakage from the secret states of participating components. The framework extends the universally composable (UC) security framework. We also prove a variant of the UC theorem
doi:10.1007/978-3-642-28914-9_15
fatcat:mjtgwsdpbfedzmqku3k3rp3icq