First page Back Continue Last page Overview Graphics
Security is interpreted as “emulating the trusted service solution” [GMW87]: “Whatever damage that can be done to the protocol could have been done to the trusted party solution”.
The “classic” formalizations of this intuitive notion (e.g. [GL90,MR91,B91,C95,C00]) guarantee security only when a single protocol execution takes place at any time.
In contrast, in today’s networks:
- Multiple copies of a protocol may be running concurrently
- A protocol is run concurrently with other protocols
- Parties may be unaware of other executions, protocols, parties.
Stand-alone security does not suffice!