Universally composable synchronous computation

J Katz, U Maurer, B Tackmann, V Zikas - Theory of Cryptography …, 2013 - Springer
Theory of Cryptography Conference, 2013Springer
In synchronous networks, protocols can achieve security guarantees that are not possible in
an asynchronous world: they can simultaneously achieve input completeness (all honest
parties' inputs are included in the computation) and guaranteed termination (honest parties
do not “hang” indefinitely). In practice truly synchronous networks rarely exist, but synchrony
can be emulated if channels have (known) bounded latency and parties have loosely
synchronized clocks. The widely-used framework of universal composability (UC) is …
Abstract
In synchronous networks, protocols can achieve security guarantees that are not possible in an asynchronous world: they can simultaneously achieve input completeness (all honest parties’ inputs are included in the computation) and guaranteed termination (honest parties do not “hang” indefinitely). In practice truly synchronous networks rarely exist, but synchrony can be emulated if channels have (known) bounded latency and parties have loosely synchronized clocks.
The widely-used framework of universal composability (UC) is inherently asynchronous, but several approaches for adding synchrony to the framework have been proposed. However, we show that the existing proposals do not provide the expected guarantees. Given this, we propose a novel approach to defining synchrony in the UC framework by introducing functionalities exactly meant to model, respectively, bounded-delay networks and loosely synchronized clocks. We show that the expected guarantees of synchronous computation can be achieved given these functionalities, and that previous similar models can all be expressed within our new framework.
Springer