Multiparty Unconditionally Secure Protocols

نویسندگان

  • David Chaum
  • Claude Crépeau
  • Ivan Damgard
چکیده

Assume n participants P 1,P 2, . . . , Pn share the knowledge of a multivariable function F and that they want to publicly compute z =F (x1,x2, . . . , xn ), where xi is a secret input provided by Pi . The difficulty is to simultaneously provide the secrecy of each xi and to guarantee the correctness of the common result z . Such a task has been accomplished in [GMW] under the assumption that trapdoor permutations exist. The result we propose in this extended abstract is that, under the assumption that each pair of participants can communicate secretly, any reasonable function can be computed if at least 3 2n _ __ of the participants are honest and this is proved without any cryptographic assumption. Our result is based on a non-cryptographic verifiable secret sharing protocol that we also introduce in this paper.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Scalable and Unconditionally Secure Multiparty Computation

We present a multiparty computation protocol that is unconditionally secure against adaptive and active adversaries, with communication complexity O(Cn)k + O(Dn)k + poly(nκ), where C is the number of gates in the circuit, n is the number of parties, k is the bitlength of the elements of the field over which the computation is carried out, D is the multiplicative depth of the circuit, and κ is t...

متن کامل

Unconditionally Secure Multiparty Set Intersection Re-Visited

In this paper, we re-visit the problem of unconditionally secure multiparty set intersection in information theoretic model. Li et.al [24] have proposed a protocol for n-party set intersection problem, which provides unconditional security when t < n 3 players are corrupted by an active adversary having unbounded computing power. Moreover, they have claimed that their protocol takes six rounds ...

متن کامل

Unconditionally Secure Multiparty Computation and Secret Sharing

We suggest protocols for secure computation of the sum, product, and some other functions of three or more elements of an arbitrary constructible ring, without using any one-way functions. A new input that we offer here is that, in contrast with other proposals, we conceal “intermediate results” of a computation, i.e., we do not let any party accumulate functions of other parties’ private numbe...

متن کامل

Active Security in Multiparty Computation over Black-Box Groups

Most previous work on unconditionally secure multiparty computation has focused on computing over a nite eld (or ring). Multiparty computation over other algebraic structures has not received much attention, but is an interesting topic whose study may provide new and improved tools for certain applications. At CRYPTO 2007, Desmedt et al introduced a construction for a passive-secure multiparty ...

متن کامل

Multiparty quantum signature schemes

Digital signatures are widely used in electronic communications to secure important tasks such as financial transactions, software updates, and legal contracts. The signature schemes that are in use today are based on public-key cryptography and derive their security from computational assumptions. However, it is possible to construct unconditionally secure signature protocols. In particular, u...

متن کامل

Unconditionally Secure Asynchronous Multiparty Computation with Linear Communication Complexity

We present two unconditionally secure asynchronous multiparty computation (AMPC) protocols among nparties with an amortized communication complexity of O(n) field elements per multiplication gate and whichcan tolerate a computationally unbounded active adversary corrupting t < n/4 parties. These are the first AMPCprotocols with linear communication complexity per multiplication gate...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006