Attribute-based key exchange with general policies
Vladimir Kolesnikov, Hugo Krawczyk, et al.
CCS 2016
The results regarding the concurrent composition of security two-party protocols in the plain model were described. Two types of composition were distinguished where the distinction related to the question of which protocols were being run together in the network. The first type, called self composition considered the case where a single protocol is executed many times in a network, while the second type, called general composition considered the case where many different protocols were run together in the network. The result showed that the lower bound leaves open the possibility of obtaining positive results.
Vladimir Kolesnikov, Hugo Krawczyk, et al.
CCS 2016
Yehuda Lindell, Anna Lysyanskaya, et al.
PODC 2002
Eyal Kushilevitz, Yehuda Lindell, et al.
STOC 2006
Yehuda Lindell
STOC 2003