Aarhus University Seal

On Adaptive vs. Non-adaptive Security of Multiparty Protocols

Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearch

  • Ran Canetti, Denmark
  • Ivan Bjerre Damgård
  • Stefan Dziembowski, Denmark
  • Yuval Ishai, Denmark
  • Tal Malkin, Denmark
  • Department of Computer Science
Security analysis of multiparty cryptographic protocols distinguishes between two types of adversarialsettings: In the non-adaptive setting, the set of corrupted parties is chosen in advance, before the interaction begins. In the adaptive setting, the adversary chooses who to corrupt during the course of the computation. We study the relations between adaptive security (i.e., security in the adaptive setting) and non-adaptive security, according to two definitions and in several models of computation. While affirming some prevailing beliefs, we also obtain some unexpected results. Some highlights of our results are:
- According to the definition of Dodis-Micali-Rogaway (which is set in the information-theoretic model), adaptive and non-adaptive security are equivalent. This holds for both honest-but-curious and Byzantine adversaries, and for any number of parties.
- According to the definition of Canetti, for honest-but-curious adversaries, adaptive security is equivalent to non-adaptive security when the number of parties is logarithmic, and is strictly stronger than non-adaptive security when the number of parties is super-logarithmic. For Byzantine adversaries, adaptive security is strictly stronger than non-adaptive security, for any number of parties.
Original languageEnglish
Title of host publicationAdvances in Cryptology --- EUROCRYPT 2001 : International Conference on the Theory and Application of Cryptographic Techniques Innsbruck, Austria, May 6-10, 2001 Proceedings
EditorsBirgit Pfitzmann
Number of pages18
PublisherSpringer
Publication year2001
Pages262-279
ISBN (print)978-3-540-42070-5
DOIs
Publication statusPublished - 2001
EventInternational Conference on the Theory and Application of Cryptographic Techniques - Innsbruck, Austria
Duration: 6 May 200110 May 2001

Conference

ConferenceInternational Conference on the Theory and Application of Cryptographic Techniques
LandAustria
ByInnsbruck
Periode06/05/200110/05/2001
SeriesLecture Notes in Computer Science
Volume2045
ISSN0302-9743

See relations at Aarhus University Citationformats

ID: 281009