International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

On the Role of Scheduling in Simulation-Based Security

Authors:
Ran Canetti
Ling Cheung
Nancy Lynch
Olivier Pereira
Download:
URL: http://eprint.iacr.org/2007/102
Search ePrint
Search Google
Abstract: In a series of papers, K\"usters et al. investigated the relationships between various notions of simulation-based security. Two main factors, the placement of a ``master process'' and the existence of ``forwarder processes'', were found to affect the relationship between different definitions. In this extended abstract, we add a new dimension to the analysis of simulation-based security, namely, the scheduling of concurrent processes. We show that, when we move from sequential scheduling (as used in previous studies) to task-based nondeterministic scheduling, the same syntactic definition of security gives rise to incomparable semantic notions of security. Under task-based scheduling, the hierarchy based on placement of ``master process'' is no longer relevant, because no such designation is necessary to obtain meaningful runs of a system. On the other hand, the existence of ``forwarder processes'' remains an important factor.
BibTeX
@misc{eprint-2007-13384,
  title={On the Role of Scheduling in Simulation-Based Security},
  booktitle={IACR Eprint archive},
  keywords={foundations / simulation-based security, sequential and non-sequential scheduling},
  url={http://eprint.iacr.org/2007/102},
  note={Presented at WITS'07 lcheung@theory.csail.mit.edu 13594 received 21 Mar 2007},
  author={Ran Canetti and Ling Cheung and Nancy Lynch and Olivier Pereira},
  year=2007
}