How to Solve any Protocol

نویسندگان

  • Problemby Oded Goldreich
  • Silvio Micali
  • Avi Wigderson
چکیده

Remark: A version identical in contents, but very diierent in form has appeared in the proceedings of the 19th STOC, pp. 218{229, 1987. This version was produced, from an old draft (dating to 1986), by automatic convertion of a old troff le into a latex le. The output was not carefully checked; hopefully, it does not contain too many typos. ABSTRACT: This extended abstract present a general theorem in the eld of fault tolerant distributed computing. Following is a simpliied description of a special case of this theorem. Loosely speaking, a protocol problem is a multi-argument function f and its solution is a multi-party fault-tolerant protocol having the following two properties: (1) Correctness: The protocol allows each party to obtain the value of the function on arguments scattered among all the parties. Namely, the local input of party P i is x i , and his local output (obtained by execution of the protocol) is f(x 1 ; x 2 ; :::; x n). (2) Privacy: Whatever a party (P i) can eeciently compute after participating in the protocol, he can also eeciently compute from his local input (x i) and his local output (i.e. i=1 x i then a solution is a protocol at the end of which each party gets the sum of the x i 's without gaining any additional knowledge as to how the residual sum is partitioned among his counterparts. Assuming the existence of secure encryption functions, it will be shown that every protocol problem has a solution with complexity polynomial in the complexity of the problem. Furthermore , we present an eecient algorithm that, on input a Turing machine description of a function, outputs an eecient solution for this problem.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Seeking Source Discourse Ideology by English and Persian Translators: A Comparative Think Aloud Protocol Study

Discourse audiences are susceptible to fall victims of the concealed ideological representations in discourses at the expanse of changing and modifying their mental models through which they act on the world. Translators as readers and at the same time intercultural mediators need to be equipped with the knowledge of how ideology is accommodated in discourse both not to fall victim to it and to...

متن کامل

Mobile IPv6 Security

This paper presents a case study of security protocol design: authentication of binding updates in Mobile IPv6. We go step by step through the threat analysis and show how each threat is addressed in the protocol design. The goal is to solve any new security issues caused by the introduction of mobility without requiring any new security infrastructure.

متن کامل

Dynamic configuration and collaborative scheduling in supply chains based on scalable multi-agent architecture

Due to diversified and frequently changing demands from customers, technological advances and global competition, manufacturers rely on collaboration with their business partners to share costs, risks and expertise. How to take advantage of advancement of technologies to effectively support operations and create competitive advantage is critical for manufacturers to survive. To respond to these...

متن کامل

Mitigating Network-Based Denial-of-Service Attacks with Client Puzzles

Over the past few years, denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks have become more of a threat than ever. These attacks are aimed at denying or degrading service for a legitimate user by any means necessary. The need to propose and research novel methods to mitigate them has become a critical research issue in network security. Recently, client puzzle protocols h...

متن کامل

An Efficient Protocol for Oblivious DFA Evaluation and Applications

In this paper, we design an efficient protocol for oblivious DFA evaluation between an input holder (client) and a DFA holder (server). The protocol runs in a single round, and only requires a small amount of computation by each party. The most efficient version of our protocol only requires O(k) asymmetric operations by either party, where k is the security parameter. Moreover, the client’s to...

متن کامل

A NEW PROTOCOL MODEL FOR VERIFICATION OF PAYMENT ORDER INFORMATION INTEGRITY IN ONLINE E-PAYMENT SYSTEM USING ELLIPTIC CURVE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL

Two parties that conduct a business transaction through the internet do not see each other personally nor do they exchange any document neither any money hand-to-hand currency. Electronic payment is a way by which the two parties transfer the money through the internet. Therefore integrity of payment and order information of online purchase is an important concern. With online purchase the cust...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1987