Ontology type: schema:Chapter Open Access: True
2013
AUTHORSJonathan Katz , Ueli Maurer , Björn Tackmann , Vassilis Zikas
ABSTRACTIn synchronous networks, protocols can achieve security guarantees that are not possible in an asynchronous world: they can simultaneously achieve input completeness (all honest parties’ inputs are included in the computation) and guaranteed termination (honest parties do not “hang” indefinitely). In practice truly synchronous networks rarely exist, but synchrony can be emulated if channels have (known) bounded latency and parties have loosely synchronized clocks.The widely-used framework of universal composability (UC) is inherently asynchronous, but several approaches for adding synchrony to the framework have been proposed. However, we show that the existing proposals do not provide the expected guarantees. Given this, we propose a novel approach to defining synchrony in the UC framework by introducing functionalities exactly meant to model, respectively, bounded-delay networks and loosely synchronized clocks. We show that the expected guarantees of synchronous computation can be achieved given these functionalities, and that previous similar models can all be expressed within our new framework. More... »
PAGES477-498
Theory of Cryptography
ISBN
978-3-642-36593-5
978-3-642-36594-2
http://scigraph.springernature.com/pub.10.1007/978-3-642-36594-2_27
DOIhttp://dx.doi.org/10.1007/978-3-642-36594-2_27
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1025348353
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information and Computing Sciences",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0802",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Computation Theory and Mathematics",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "Dept. of Computer Science, University of Maryland, USA",
"id": "http://www.grid.ac/institutes/grid.410443.6",
"name": [
"Dept. of Computer Science, University of Maryland, USA"
],
"type": "Organization"
},
"familyName": "Katz",
"givenName": "Jonathan",
"id": "sg:person.01354261156.67",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01354261156.67"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Dept.of Computer Science, ETH Z\u00fcrich, Switzerland",
"id": "http://www.grid.ac/institutes/grid.5801.c",
"name": [
"Dept.of Computer Science, ETH Z\u00fcrich, Switzerland"
],
"type": "Organization"
},
"familyName": "Maurer",
"givenName": "Ueli",
"id": "sg:person.01316567627.91",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01316567627.91"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Dept.of Computer Science, ETH Z\u00fcrich, Switzerland",
"id": "http://www.grid.ac/institutes/grid.5801.c",
"name": [
"Dept.of Computer Science, ETH Z\u00fcrich, Switzerland"
],
"type": "Organization"
},
"familyName": "Tackmann",
"givenName": "Bj\u00f6rn",
"id": "sg:person.07617171521.69",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07617171521.69"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Dept. of Computer Science, UCLA, USA",
"id": "http://www.grid.ac/institutes/grid.19006.3e",
"name": [
"Dept. of Computer Science, UCLA, USA"
],
"type": "Organization"
},
"familyName": "Zikas",
"givenName": "Vassilis",
"id": "sg:person.012007513121.08",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012007513121.08"
],
"type": "Person"
}
],
"datePublished": "2013",
"datePublishedReg": "2013-01-01",
"description": "In synchronous networks, protocols can achieve security guarantees that are not possible in an asynchronous world: they can simultaneously achieve input completeness (all honest parties\u2019 inputs are included in the computation) and guaranteed termination (honest parties do not \u201chang\u201d indefinitely). In practice truly synchronous networks rarely exist, but synchrony can be emulated if channels have (known) bounded latency and parties have loosely synchronized clocks.The widely-used framework of universal composability (UC) is inherently asynchronous, but several approaches for adding synchrony to the framework have been proposed. However, we show that the existing proposals do not provide the expected guarantees. Given this, we propose a novel approach to defining synchrony in the UC framework by introducing functionalities exactly meant to model, respectively, bounded-delay networks and loosely synchronized clocks. We show that the expected guarantees of synchronous computation can be achieved given these functionalities, and that previous similar models can all be expressed within our new framework.",
"editor": [
{
"familyName": "Sahai",
"givenName": "Amit",
"type": "Person"
}
],
"genre": "chapter",
"id": "sg:pub.10.1007/978-3-642-36594-2_27",
"inLanguage": "en",
"isAccessibleForFree": true,
"isPartOf": {
"isbn": [
"978-3-642-36593-5",
"978-3-642-36594-2"
],
"name": "Theory of Cryptography",
"type": "Book"
},
"keywords": [
"universal composability",
"synchronous computations",
"synchronous network",
"security guarantees",
"UC framework",
"asynchronous world",
"new framework",
"guarantees",
"network",
"novel approach",
"framework",
"computation",
"functionality",
"composability",
"previous similar models",
"latency",
"proposal",
"similar models",
"protocol",
"completeness",
"clock",
"parties",
"world",
"model",
"channels",
"practice",
"synchrony",
"termination",
"bounded-delay networks",
"approach"
],
"name": "Universally Composable Synchronous Computation",
"pagination": "477-498",
"productId": [
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1025348353"
]
},
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/978-3-642-36594-2_27"
]
}
],
"publisher": {
"name": "Springer Nature",
"type": "Organisation"
},
"sameAs": [
"https://doi.org/10.1007/978-3-642-36594-2_27",
"https://app.dimensions.ai/details/publication/pub.1025348353"
],
"sdDataset": "chapters",
"sdDatePublished": "2022-05-20T07:42",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-springernature-scigraph/baseset/20220519/entities/gbq_results/chapter/chapter_133.jsonl",
"type": "Chapter",
"url": "https://doi.org/10.1007/978-3-642-36594-2_27"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-36594-2_27'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-36594-2_27'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-36594-2_27'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-36594-2_27'
This table displays all metadata directly associated to this object as RDF triples.
117 TRIPLES
23 PREDICATES
56 URIs
49 LITERALS
7 BLANK NODES