Foreword |
|
vii | |
Preface |
|
xi | |
1. Introduction |
|
1 | (20) |
|
1.1 Secure Multi-party Computation |
|
|
1 | (7) |
|
|
8 | (7) |
|
1.2.1 Types of Protocol Composition |
|
|
8 | (2) |
|
1.2.2 Feasibility of Security under Composition |
|
|
10 | (5) |
|
|
15 | (6) |
|
1.3.1 The Composition of Authenticated Byzantine Agreement |
|
|
16 | (2) |
|
1.3.2 Secure Computation without Agreement |
|
|
18 | (1) |
|
1.3.3 Universally Composable Multi-party Computation |
|
|
18 | (3) |
2. The Composition of Authenticated Byzantine Agreement |
|
21 | (24) |
|
|
21 | (4) |
|
|
25 | (4) |
|
2.2.1 Computational Model |
|
|
25 | (1) |
|
2.2.2 Byzantine Generals/Agreement |
|
|
26 | (1) |
|
2.2.3 Composition of Protocols |
|
|
27 | (2) |
|
2.3 Impossibility for Parallel Composition |
|
|
29 | (6) |
|
2.4 Sequential Composition of Deterministic Protocols |
|
|
35 | (3) |
|
2.5 Authenticated Byzantine Agreement Using Unique Identifiers |
|
|
38 | (7) |
3. Secure Computation without Agreement |
|
45 | (36) |
|
|
46 | (7) |
|
3.1.1 Byzantine Agreement and Secure Multi-party Computation |
|
|
46 | (1) |
|
|
47 | (4) |
|
|
51 | (2) |
|
3.2 Definitions - Secure Computation |
|
|
53 | (8) |
|
3.2.1 Execution in the Ideal Model |
|
|
54 | (4) |
|
3.2.2 Execution in the Real Model |
|
|
58 | (2) |
|
3.2.3 Security as Emulation of a Real Execution in the Ideal Model |
|
|
60 | (1) |
|
|
61 | (1) |
|
3.3.1 Strengthening Broadcast with Abort |
|
|
62 | (1) |
|
3.4 Secure Computation with Abort and No Fairness |
|
|
62 | (10) |
|
3.5 Secure Computation with Abort and Partial Fairness |
|
|
72 | (5) |
|
3.6 Obtaining Security under Self Composition |
|
|
77 | (4) |
4. Universally Composable Multi-party Computation |
|
81 | (104) |
|
|
81 | (3) |
|
|
84 | (9) |
|
|
84 | (2) |
|
4.2.2 An Outline of the Results and Techniques |
|
|
86 | (7) |
|
|
93 | (15) |
|
4.3.1 Universally Composable Security: The General Framework |
|
|
93 | (9) |
|
4.3.2 Universal Composition with Joint State |
|
|
102 | (4) |
|
4.3.3 Well-Formed Functionalities |
|
|
106 | (2) |
|
4.4 Two-Party Secure Computation for Semi-honest Adversaries |
|
|
108 | (20) |
|
4.4.1 Universally Composable Oblivious Transfer |
|
|
108 | (8) |
|
4.4.2 The General Construction |
|
|
116 | (12) |
|
4.5 Universally Composable Commitments |
|
|
128 | (13) |
|
4.6 Universally Composable Zero-Knowledge |
|
|
141 | (2) |
|
4.7 The Commit-and-Prove Functionality FCP |
|
|
143 | (12) |
|
4.7.1 UC Realizing FCP for Static Adversaries |
|
|
144 | (5) |
|
4.7.2 UC Realizing FCP for Adaptive Adversaries |
|
|
149 | (6) |
|
4.8 Two-Party Secure Computation for Malicious Adversaries |
|
|
155 | (7) |
|
4.8.1 The Protocol Compiler |
|
|
155 | (6) |
|
|
161 | (1) |
|
4.9 Multi-party Secure Computation |
|
|
162 | (23) |
|
4.9.1 Multi-party Secure Computation for Semi-honest Adversaries |
|
|
163 | (6) |
|
4.9.2 Authenticated Broadcast |
|
|
169 | (3) |
|
4.9.3 One-to-Many Extensions of FMCOM, FZK, and FCP |
|
|
172 | (7) |
|
4.9.4 Multi-party Secure Computation for Malicious Adversaries |
|
|
179 | (6) |
References |
|
185 | (6) |
Index |
|
191 | |