Adaptive versus Non-Adaptive Security of Multi-Party Protocols

@article{Canetti2004AdaptiveVN,
  title={Adaptive versus Non-Adaptive Security of Multi-Party Protocols},
  author={Ran Canetti and Ivan Damg{\aa}rd and Stefan Dziembowski and Yuval Ishai and Tal Malkin},
  journal={Journal of Cryptology},
  year={2004},
  volume={17},
  pages={153-207}
}
Security analysis of multi-party cryptographic protocols distinguishes between two types of adversarial settings: In the non-adaptive setting the set of corrupted parties is chosen in advance, before the interaction begins. In the adaptive setting the adversary chooses who to corrupt during the course of the computation. We study the relations between adaptive security (i.e., security in the adaptive setting) and nonadaptive security, according to two definitions and in several models of… CONTINUE READING
Highly Cited
This paper has 23 citations. REVIEW CITATIONS