First page Back Continue Last page Overview Graphics
Implications of the UC theorem
Assume protocol “emulates” a trusted service F. Can deduce security of in any multi-execution environment:
As far as the “rest of the network” is concerned, interacting with (multiple copies of) is equivalent to interacting with (multiple copies of) F.
Notes: