Ran Canetti, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, and Tal Malkin
On Adaptive vs. Non-adaptive Security of Multiparty Protocols
Journal of Cryptology vol. 17, no. 3, pp. 153-207, Jun 2004
Abstract Security analysis of multi-party cryptographic protocols distinguishes between two types of adversarial settings: In the non-adaptive setting the set of corrupted parties is chosen in advance, before the interaction begins. In the adaptive setting the adversary chooses who to corrupt during the course of the computation. We study the relations between adaptive security (i.e., security in the adaptive setting) and nonadaptive security, according to two definitions and in several models of computation.
Available files: [PDF,BibTeX]
(Conference version appeared in Proc. of EUROCRYPT'01).