{"id":"https://openalex.org/W4417010600","doi":"https://doi.org/10.1007/978-3-032-12290-2_22","title":"An Unstoppable Ideal Functionality for\u00a0Signatures and\u00a0a\u00a0Modular Analysis of\u00a0the\u00a0Dolev-Strong Broadcast","display_name":"An Unstoppable Ideal Functionality for\u00a0Signatures and\u00a0a\u00a0Modular Analysis of\u00a0the\u00a0Dolev-Strong Broadcast","publication_year":2025,"publication_date":"2025-12-04","ids":{"openalex":"https://openalex.org/W4417010600","doi":"https://doi.org/10.1007/978-3-032-12290-2_22"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-032-12290-2_22","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-032-12290-2_22","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-032-12290-2_22.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://link.springer.com/content/pdf/10.1007/978-3-032-12290-2_22.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048892933","display_name":"Ran Cohen","orcid":"https://orcid.org/0000-0002-1293-552X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ran Cohen","raw_affiliation_strings":["Efi Arazi School of Computer Science, Reichman University, Herzliya, Israel"],"affiliations":[{"raw_affiliation_string":"Efi Arazi School of Computer Science, Reichman University, Herzliya, Israel","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075332247","display_name":"Jack Doerner","orcid":"https://orcid.org/0009-0007-0409-2132"},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jack Doerner","raw_affiliation_strings":["University of Virginia, Charlottesville, USA"],"affiliations":[{"raw_affiliation_string":"University of Virginia, Charlottesville, USA","institution_ids":["https://openalex.org/I51556381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009945265","display_name":"Eysa Lee","orcid":"https://orcid.org/0009-0003-2860-2417"},"institutions":[{"id":"https://openalex.org/I98540497","display_name":"Barnard College","ror":"https://ror.org/04rt94r53","country_code":"US","type":"education","lineage":["https://openalex.org/I98540497"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Eysa Lee","raw_affiliation_strings":["Barnard College, New York, USA"],"affiliations":[{"raw_affiliation_string":"Barnard College, New York, USA","institution_ids":["https://openalex.org/I98540497"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009958147","display_name":"Anna Lysyanskaya","orcid":"https://orcid.org/0000-0002-3567-3550"},"institutions":[{"id":"https://openalex.org/I27804330","display_name":"Brown University","ror":"https://ror.org/05gq02987","country_code":"US","type":"education","lineage":["https://openalex.org/I27804330"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anna Lysyanskaya","raw_affiliation_strings":["Brown University, Providence, USA"],"affiliations":[{"raw_affiliation_string":"Brown University, Providence, USA","institution_ids":["https://openalex.org/I27804330"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050543367","display_name":"Lawrence Roy","orcid":"https://orcid.org/0009-0003-8436-0029"},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Lawrence Roy","raw_affiliation_strings":["Aarhus University, Aarhus, Denmark"],"affiliations":[{"raw_affiliation_string":"Aarhus University, Aarhus, Denmark","institution_ids":["https://openalex.org/I204337017"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5048892933"],"corresponding_institution_ids":[],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.60117509,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"675","last_page":"708"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9872999787330627,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9872999787330627,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.0034000000450760126,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.0027000000700354576,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.771399974822998},{"id":"https://openalex.org/keywords/ideal","display_name":"Ideal (ethics)","score":0.7479000091552734},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.6933000087738037},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.6481000185012817},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.63919997215271},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6047999858856201},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5157999992370605},{"id":"https://openalex.org/keywords/realization","display_name":"Realization (probability)","score":0.460099995136261},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.44339999556541443}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8634999990463257},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.771399974822998},{"id":"https://openalex.org/C2776639384","wikidata":"https://www.wikidata.org/wiki/Q840396","display_name":"Ideal (ethics)","level":2,"score":0.7479000091552734},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.6933000087738037},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.6481000185012817},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.63919997215271},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6047999858856201},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5579000115394592},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5157999992370605},{"id":"https://openalex.org/C2781089630","wikidata":"https://www.wikidata.org/wiki/Q21856745","display_name":"Realization (probability)","level":2,"score":0.460099995136261},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.44339999556541443},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.39239999651908875},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.37860000133514404},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3781999945640564},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.37540000677108765},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3734999895095825},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.33570000529289246},{"id":"https://openalex.org/C202424057","wikidata":"https://www.wikidata.org/wiki/Q1224829","display_name":"Digital Signature Algorithm","level":4,"score":0.3269999921321869},{"id":"https://openalex.org/C40231798","wikidata":"https://www.wikidata.org/wiki/Q1333743","display_name":"Composition (language)","level":2,"score":0.32190001010894775},{"id":"https://openalex.org/C168941894","wikidata":"https://www.wikidata.org/wiki/Q3483645","display_name":"Ring signature","level":4,"score":0.31040000915527344},{"id":"https://openalex.org/C2778029271","wikidata":"https://www.wikidata.org/wiki/Q5421931","display_name":"Extension (predicate logic)","level":2,"score":0.3066999912261963},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29919999837875366},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.2976999878883362},{"id":"https://openalex.org/C18899389","wikidata":"https://www.wikidata.org/wiki/Q2736593","display_name":"Blind signature","level":4,"score":0.2922999858856201},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.27970001101493835},{"id":"https://openalex.org/C40404285","wikidata":"https://www.wikidata.org/wiki/Q1921816","display_name":"Merkle signature scheme","level":5,"score":0.27790001034736633},{"id":"https://openalex.org/C136979486","wikidata":"https://www.wikidata.org/wiki/Q773483","display_name":"Existential quantification","level":2,"score":0.2766000032424927},{"id":"https://openalex.org/C131672422","wikidata":"https://www.wikidata.org/wiki/Q852594","display_name":"Provable security","level":3,"score":0.26820001006126404},{"id":"https://openalex.org/C124968333","wikidata":"https://www.wikidata.org/wiki/Q1465057","display_name":"Schnorr signature","level":5,"score":0.2515000104904175}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-032-12290-2_22","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-032-12290-2_22","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-032-12290-2_22.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:pure.atira.dk:openaire/a67fbdd8-106d-425f-a22b-b8fe7a2a6bf0","is_oa":true,"landing_page_url":"https://pure.au.dk/portal/en/publications/a67fbdd8-106d-425f-a22b-b8fe7a2a6bf0","pdf_url":null,"source":null,"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cohen, R, Doerner, J, Lee, E, Lysyanskaya, A & Roy, L 2026, An Unstoppable Ideal Functionality for\u00a0Signatures and\u00a0a\u00a0Modular Analysis of\u00a0the\u00a0Dolev-Strong Broadcast. in B Applebaum & H Lin (eds), Theory of Cryptography - 23rd International Conference, TCC 2025, Proceedings. Springer Science and Business Media Deutschland GmbH, Lecture Notes in Computer Science, vol. 16271 LNCS, pp. 675-708, 23rd Theory of Cryptography Conference, TCC 2025, Aarhus, Denmark, 01/12/2025. https://doi.org/10.1007/978-3-032-12290-2_22","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.1007/978-3-032-12290-2_22","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-032-12290-2_22","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-032-12290-2_22.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4417010600.pdf","grobid_xml":"https://content.openalex.org/works/W4417010600.grobid-xml"},"referenced_works_count":52,"referenced_works":["https://openalex.org/W165274269","https://openalex.org/W1486196512","https://openalex.org/W1499934958","https://openalex.org/W1565004756","https://openalex.org/W1600012864","https://openalex.org/W1601458649","https://openalex.org/W1892798954","https://openalex.org/W1991476961","https://openalex.org/W2017232139","https://openalex.org/W2027471022","https://openalex.org/W2034791526","https://openalex.org/W2035527360","https://openalex.org/W2038789445","https://openalex.org/W2039875296","https://openalex.org/W2041210125","https://openalex.org/W2082257278","https://openalex.org/W2113085788","https://openalex.org/W2117301329","https://openalex.org/W2126924915","https://openalex.org/W2140376574","https://openalex.org/W2151413173","https://openalex.org/W2152924492","https://openalex.org/W2154554454","https://openalex.org/W2155222571","https://openalex.org/W2156186849","https://openalex.org/W2166788520","https://openalex.org/W2233233025","https://openalex.org/W2293018556","https://openalex.org/W2294404229","https://openalex.org/W2482085991","https://openalex.org/W2728543642","https://openalex.org/W2882981146","https://openalex.org/W2933493434","https://openalex.org/W2990690033","https://openalex.org/W2991071002","https://openalex.org/W3031048092","https://openalex.org/W3031187036","https://openalex.org/W3088537673","https://openalex.org/W3117321621","https://openalex.org/W3137092842","https://openalex.org/W3185125275","https://openalex.org/W3214310681","https://openalex.org/W4246092823","https://openalex.org/W4285227787","https://openalex.org/W4286210688","https://openalex.org/W4286501744","https://openalex.org/W4312989341","https://openalex.org/W4385405602","https://openalex.org/W4385654063","https://openalex.org/W4396530571","https://openalex.org/W4402265706","https://openalex.org/W4405279308"],"related_works":[],"abstract_inverted_index":{"Many":[0],"foundational":[1],"results":[2],"in":[3,139,174,177],"the":[4,9,94,113,125,162,178,181,204,209,228,237],"literature":[5],"of":[6,164,180,208,227],"consensus":[7,133],"follow":[8],"Dolev-Yao":[10,229],"model":[11],"(FOCS":[12],"\u201981),":[13],"which":[14],"treats":[15],"digital":[16],"signatures":[17,74,156],"as":[18,220],"ideal":[19,33,71,145,153,192],"objects":[20],"with":[21],"perfect":[22],"correctness":[23],"and":[24,43,75,102,172],"unforgeability.":[25],"However,":[26],"no":[27,132],"work":[28,173],"has":[29,135],"yet":[30],"formalized":[31],"an":[32,70],"signature":[34,81,146,167,193],"scheme":[35],"that":[36,51,120,157,169],"is":[37,127,158],"both":[38],"suitable":[39],"for":[40,73,155],"this":[41],"methodology":[42],"possible":[44],"to":[45,89,236],"instantiate,":[46],"or":[47,111],"a":[48,98,116,130,140,150,221,224],"composition":[49,65],"theorem":[50],"ensures":[52],"security":[53],"when":[54,87,124],"instantiating":[55],"it":[56,77],"cryptographically.":[57],"The":[58],"Universal":[59],"Composition":[60],"(UC)":[61],"framework":[62],"would":[63],"ensure":[64],"if":[66],"we":[67],"could":[68],"specify":[69],"functionality":[72,95,114,126,154],"prove":[76],"UC-realizable.":[78],"Unfortunately,":[79],"all":[80],"functionalities":[82],"heretofore":[83],"proposed":[84],"are":[85,170],"problematic":[86],"used":[88],"construct":[90],"higher-level":[91,104],"protocols:":[92],"either":[93],"internally":[96],"computes":[97],"computationally":[99],"secure":[100],"signature,":[101],"therefore":[103],"protocols":[105],"must":[106],"rely":[107],"upon":[108],"computational":[109],"assumptions,":[110],"else":[112],"introduces":[115],"new":[117,151],"attack":[118],"surface":[119],"does":[121],"not":[122],"exist":[123],"realized.":[128],"As":[129],"consequence,":[131],"protocol":[134,212],"ever":[136],"been":[137],"analyzed":[138],"modular":[141,206],"way":[142],"using":[143],"existing":[144],"functionalities.":[147],"We":[148,198,231],"propose":[149],"unstoppable":[152],"UC-realized":[159],"exactly":[160],"by":[161,202],"set":[163],"standard":[165],"EUF-CMA":[166],"schemes":[168],"consistent":[171],"linear":[175],"time":[176],"length":[179],"message.":[182],"No":[183],"adversary":[184],"can":[185,217],"prevent":[186],"honest":[187],"parties":[188],"from":[189,195],"obtaining":[190],"perfectly":[191],"services":[194],"our":[196,234],"functionality.":[197],"showcase":[199],"its":[200],"usefulness":[201],"presenting":[203],"first":[205],"analysis":[207],"Dolev-Strong":[210],"broadcast":[211],"(SICOMP":[213],"\u201983).":[214],"Our":[215],"result":[216,235],"be":[218],"interpreted":[219],"step":[222],"toward":[223],"sound":[225],"realization":[226],"methodology.":[230],"also":[232],"generalize":[233],"threshold":[238],"setting.":[239]},"counts_by_year":[],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-12-04T00:00:00"}
