Common use of Composition of Hybrid Protocols Clause in Contracts

Composition of Hybrid Protocols. All our results are proven in the standalone model, as is common for works in the area of byzantine agreement. This means that our protocols do not necessarily remain secure when composed (sequentially or in parallel) or used without care as subcomponents within larger protocols. In section 5, we show how to sequentially compose HBA protocols so that the composed protocol is also responsive and secure—as long as the component HBA protocols remain secure under composition. It remains an interesting open question to formalize the notion of hybrid protocols for BA (in our sense) in the UC framework [13] and to prove our compilers secure with respect to such a formalization.

Appears in 2 contracts

Sources: Byzantine Agreement, Byzantine Agreement