Universally composable incoercibility

D Unruh, J Müller-Quade - Advances in Cryptology–CRYPTO 2010: 30th …, 2010 - Springer
… To define what it means that the real protocol is incoercible (or more precisely, as
incoercible as the ideal model), we will use the concept of simulation that underlies many …

Incoercible multi-party computation and universally composable receipt-free voting

J Alwen, R Ostrovsky, HS Zhou, V Zikas - … Barbara, CA, USA, August 16-20 …, 2015 - Springer
… the first universally composable notion of incoercible multi-… We define natural notions of UC
incoercibility corresponding … which realize our notions of UC incoercibility given access to an …

Evaluating security of voting schemes in the universal composability framework

J Groth - Applied Cryptography and Network Security: Second …, 2004 - Springer
… This simplifies security proofs since we only need to prove universal composability to … ,
universal composability of a voting scheme does not guarantee universal verifiability, incoercibility

Receipt-free universally-verifiable voting with everlasting privacy

T Moran, M Naor - Advances in Cryptology-CRYPTO 2006: 26th Annual …, 2006 - Springer
Universal Composability model, given that the underlying commitment is universally
composable… that is receipt-free under our definition is incoercible as well). Loosely, both definitions …

On the incoercibility of digital signatures

A Fraser, L Garms, EA Quaglia - 2023 IEEE 36th Computer …, 2023 - ieeexplore.ieee.org
… security model for incoercible signature schemes … incoercible signature scheme can be
viewed as a transformation of any generic signature scheme. Indeed, we present two incoercible

Symbolic universal composability

F Böhl, D Unruh - Journal of Computer Security, 2016 - content.iospress.com
We introduce a variant of the Universal Composability framework (UC; Canetti, FOCS 2001)
that uses symbolic cryptography. Two salient properties of the UC framework are secure …

Adaptively secure two-party computation from indistinguishability obfuscation

R Canetti, S Goldwasser, O Poburinnaya - Theory of Cryptography: 12th …, 2015 - Springer
… definition and is also universally composable. Furthermore, … incoercible distributed function
evaluation. Let f : (10, 1l∗ )n → (10, 1l∗ )n be an n-party function, and let Jf be the incoercible

Adaptively secure two-party computation from indistinguishability obfuscation

R Canetti, S Goldwasser, O Poburinnaya - Cryptology ePrint Archive, 2014 - eprint.iacr.org
… definition and is also universally composable. Furthermore, … We say that π is incoercible if
it UC-emulates an incoercible … notion of incoercibility: Indeed, F provides “ideal incoercibility” …

Split-ballot voting: everlasting privacy with distributed trust

T Moran, M Naor - ACM Transactions on Information and System Security …, 2010 - dl.acm.org
… is secure in the universal composability (UC) framework, … are not, themselves, universally
composable (we propose using a … -based models (such as universal composability), since the …

Public evidence from secret ballots

M Bernhard, J Benaloh, J Alex Halderman… - … Joint Conference, E …, 2017 - Springer
Incoercibility has been defined and examined in the universally composable framework in
the context of general multiparty computation [22, 90]. These definitions examine whether the …