Two-Threshold Broadcast and Detectable Multi-party Computation

نویسندگان

  • Matthias Fitzi
  • Martin Hirt
  • Thomas Holenstein
  • Jürg Wullschleger
چکیده

Classical distributed protocols like broadcast or multi-party computation provide security as long as the number of malicious players f is bounded by some given threshold t, i.e., f ≤ t. If f exceeds t then these protocols are completely insecure. We relax this binary concept to the notion of two-threshold security: Such protocols guarantee full security as long as f ≤ t for some small threshold t, and still provide some degraded security when t < f ≤ T for a larger threshold T . In particular, we propose the following problems. ◦ Broadcast with Extended Validity: Standard broadcast is achieved when f ≤ t. When t < f ≤ T , then either broadcast is achieved, or every player learns that there are too many faults. Furthermore, when the sender is honest, then broadcast is always achieved. ◦ Broadcast with Extended Consistency: Standard broadcast is achieved when f ≤ t. When t < f ≤ T , then either broadcast is achieved, or every player learns that there are too many faults. Furthermore, the players agree on whether or not broadcast is achieved. ◦ Detectable Multi-Party Computation: Secure computation is achieved when f ≤ t. When t < f ≤ T , then either the computation is secure, or all players detect that there are too many faults and abort. The above protocols for n players exist if and only if t = 0 or t+2T < n.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Extended Validity and Consistency in Byzantine Agreement

A broadcast protocol allows a sender to distribute a value among a set of players such that it is guaranteed that all players receive the same value (consistency), and if the sender is honest, then all players receive the sender’s value (validity). Classical broadcast protocols for n players provide security with respect to a fixed threshold t < n/3, where both consistency and validity are guar...

متن کامل

Complete Characterization of AdversariesTolerable in Secure Multi - Party Computation

The classical results in unconditional multi-party computation among a set of n players state that less than n=2 passive or less than n=3 active adversaries can be tolerated; assuming a broadcast channel the threshold for active adversaries is n=2. Strictly generalizing these results we specify the set of potentially misbehaving players as an arbitrary set of subsets of the player set. We prove...

متن کامل

Design and formal verification of DZMBE+

In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...

متن کامل

General Adversaries in Unconditional Multi-party Computation

We consider a generalized adversary model for unconditionally secure multi-party computation. The adversary can actively corrupt (i.e. take full control over) a subset D P of the players, and, additionally , can passively corrupt (i.e. read the entire information of) another subset E P of the players. The adversary is characterized by a generalized adversary structure, i.e. a set of pairs (D; E...

متن کامل

Distributed Paillier Plaintext Equivalence Test

Consider the following scenario with N +2 parties, A, B, X1, X2, · · · , XN . Party A has a secret a, party B has a secret b, and party Xi has a secret xi, for i = 1, · · · , N . They want to know if a = b without revealing any information about their secrets. We propose a distributed protocol for this problem based on the Paillier threshold homomorphic encryption scheme with a public broadcast...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003