Local Sequentiality Does Not Help for Concurrent Composition

  • Andrew Y. Lindell
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5473)


Broad impossibility results have been proven regarding the feasibility of obtaining protocols that remain secure under concurrent composition when there is no honest majority. These results hold both for the case of general composition (where a secure protocol is run many times concurrently with arbitrary other protocols) and self composition (where a single secure protocol is run many times concurrently). One approach for bypassing these impossibility results is to consider more limited settings of concurrency. In this paper, we investigate a restriction that we call local sequentiality. In this setting, every honest party in the multi-party network runs its protocol executions strictly sequentially (thus, sequentiality is preserved locally, but not globally). Since security is preserved under global sequential composition, one may conjecture that it also preserved under local sequentiality. However, we show that local sequentiality does not help. That is, any protocol that is secure under local sequentiality is also secure under concurrent self composition (when the scheduling is fixed). Thus, known impossibility results apply.


Local Sequentiality Secure Protocol General Composition Impossibility Result Concurrent Execution 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Barak, B.: How to Go Beyond the Black-Box Simulation Barrier. In: 42nd FOCS, pp. 106–115 (2001)Google Scholar
  2. 2.
    Barak, B., Sahai, A.: How To Play Almost Any Mental Game Over The Net. In: 46th FOCS, pp. 543–552 (2005)Google Scholar
  3. 3.
    Beaver, D.: Foundations of secure interactive computing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 377–391. Springer, Heidelberg (1992)Google Scholar
  4. 4.
    Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation. In: 20th STOC, pp. 1–10 (1988)Google Scholar
  5. 5.
    Canetti, R.: Security and Composition of Multiparty Cryptographic Protocols. Theory of Cryptography Library, Record 98-18, version of June 4th (later versions do not contain the referenced material) (1998)Google Scholar
  6. 6.
    Canetti, R.: Security and Composition of Multiparty Cryptographic Protocols. Journal of Cryptology 13(1), 143–202 (2000)MathSciNetCrossRefzbMATHGoogle Scholar
  7. 7.
    Canetti, R.: Universally Composable Security: A New Paradigm for Cryptographic Protocols. In: 42nd FOCS, pp. 136–145 (2001)Google Scholar
  8. 8.
    Canetti, R., Fischlin, M.: Universally composable commitments. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 19–40. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  9. 9.
    Canetti, R., Kushilevitz, E., Lindell, Y.: On the Limitations of Universal Composable Two-Party Computation Without Set-Up Assumptions. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 68–86. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  10. 10.
    Canetti, R., Lindell, Y., Ostrovsky, R., Sahai, A.: Universally Composable Two-Party and Multi-Party Computation. In: 34th STOC, pp. 494–503 (2002)Google Scholar
  11. 11.
    Chaum, D., Crepeau, C., Damgard, I.: Multi-party Unconditionally Secure Protocols. In: 20th STOC, pp. 11–19 (1988)Google Scholar
  12. 12.
    Dolev, D., Dwork, C., Naor, M.: Non-malleable cryptography. SIAM Journal on Computing 30(2), 391–437 (2000)MathSciNetCrossRefzbMATHGoogle Scholar
  13. 13.
    Dwork, C., Naor, M., Sahai, A.: Concurrent Zero-Knowledge. In: 30th STOC, pp. 409–418 (1998)Google Scholar
  14. 14.
    Feige, U., Shamir, A.: Witness Indistinguishability and Witness Hiding Protocols. In: 22nd STOC, pp. 416–426 (1990)Google Scholar
  15. 15.
    Goldreich, O., Micali, S., Wigderson, A.: How to Play any Mental Game – A Completeness Theorem for Protocols with Honest Majority. In: 19th STOC, pp. 218–229 (1987)Google Scholar
  16. 16.
    Goldwasser, S., Levin, L.A.: Fair computation of general functions in presence of immoral majority. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 77–93. Springer, Heidelberg (1991)Google Scholar
  17. 17.
    Kalai, Y., Lindell, Y., Prabhakaran, M.: Concurrent General Composition of Secure Protocols in the Timing Model. In: the 37th STOC, pp. 644–653 (2005)Google Scholar
  18. 18.
    Lindell, Y.: Bounded-Concurrent Secure Two-Party Computation Without Setup Assumptions. In: 35th STOC, pp. 683–692 (2003)Google Scholar
  19. 19.
    Lindell, Y.: General Composition and Universal Composability in Secure Multi-Party Computation. In: 44th FOCS, pp. 394–403 (2003)Google Scholar
  20. 20.
    Lindell, Y.: Lower Bounds and Impossibility Results for Concurrent Self Composition. Journal of Cryptology 21(2), 200–249 (2008)MathSciNetCrossRefzbMATHGoogle Scholar
  21. 21.
    Micali, S., Rogaway, P.: Secure Computation. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 392–404. Springer, Heidelberg (1992)Google Scholar
  22. 22.
    Pass, R.: Simulation in Quasi-Polynomial Time, and Its Application to Protocol Composition. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 160–176. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  23. 23.
    Pass, R.: Bounded-Concurrent Secure Multi-Party Computation with a Dishonest Majority. In: The 36th STOC (to appear, 2004)Google Scholar
  24. 24.
    Pass, R., Rosen, A.: Bounded-Concurrent Secure Two-Party Computation in a Constant Number of Rounds. In: 44th FOCS, pp. 404–413 (2003)Google Scholar
  25. 25.
    Pfitzmann, B., Waidner, M.: Composition and Integrity Preservation of Secure Reactive Systems. In: 7th ACM Conference on Computer and Communication Security, pp. 245–254 (2000)Google Scholar
  26. 26.
    Prabhakaran, M., Sahai, A.: New Notions of Security: Universal Composability Without Trusted Setup. In: The 36th STOC (to appear, 2004)Google Scholar
  27. 27.
    Richardson, R., Kilian, J.: On the concurrent composition of zero-knowledge proofs. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, p. 415. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  28. 28.
    Yao, A.: How to Generate and Exchange Secrets. In: 27th FOCS, pp. 162–167 (1986)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Andrew Y. Lindell
    • 1
  1. 1.Aladdin Knowledge Systems and Bar-Ilan UniversityIsrael

Personalised recommendations