2

Is there a simple example of a cryptographic protocol that is secure when used on its own (with only one instance active at a time) but becomes insecure in a concurrent setting, i.e., a failure of parallel composition? (Ideally, one that doesn't require understanding zero-knowledge proofs or multiparty secure computation?)

D.W.
  • 36,982
  • 13
  • 107
  • 196

0 Answers0