Unconditionally Secure Broadcast With Signatures

نویسنده

  • Thomas Holenstein
چکیده

Broadcast, also called Byzantine Agreement, is a multi-party computation primitive where a dealer sends his input value to a group of players. All players must agree on the same output value, even if a part of these players is corrupted by an adversary. Furthermore, when the dealer is not corrupted, the output value of the correct players must be the input value of the dealer. It has been proven that broadcast can be achieved if and only if less than a third of the players is corrupted. In the case where a PKI which allows players to sign messages is available, protocols have been proposed that achieve broadcast for any number of corrupted players. However, most of these protocols have the drawback that a single corrupted player who can break the signature scheme is sufficient to make the protocol fail. Holenstein presented a hybrid protocol that tolerates either t0 corrupted players, or up to t1 > t0 corrupted players if the adversary cannot break the signature scheme. One goal of this project was to improve the results of Holenstein by finding such a hybrid protocol that is both efficient and optimal in the bounds t0 and t1. We did not reach this goal. However, we obtained interesting conclusions and intermediate results. We present our attempt to map the hybrid model with signatures to a hybrid failure model, in order to adapt the existing broadcast protocol from the hybrid failure model to our case. We also discuss our attempts to implement in our model a primitive proposed by Fitzi, and explain how this primitive can be used to achieve broadcast along the lines of the Dolev-Strong protocol. Some other tracks we followed are also presented. Another task of this project was to generalize the protocols proposed by Holenstein to the general adversary setting. Whereas in a threshold model, an upper bound on the number of corrupted players is specified, in a general adversary setting, the collection of all possible sets of players that could be corrupted is given. General adversary structures are a strict generalization of threshold structures. For example, the threshold setting where only t players can be corrupted is a special case of a general adversary structure consisting of all player sets of cardinality at most t. In the thesis we show how to adapt Holenstein’s protocol so that it achieves broadcast secure against a general adversary. Our protocol is not efficient since its number of communication rounds is exponential. Finally, we prove the optimal bounds for which broadcast is still possible in our hybrid general adversary model.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code

Digital signatures whose security does not rely on any unproven computational assumption have recently received considerable attention. While these unconditionally secure digital signatures provide a foundation for long term integrity and non-repudiation of data, currently known schemes generally require a far greater amount of memory space for the storage of users’ secret information than a tr...

متن کامل

Efficient Unconditionally Secure Digital Signatures

Digital signatures whose security does not rely on any unproven computational assumption have recently received considerable attention. While these unconditionally secure digital signatures provide a foundation for long term integrity and non-repudiation of data, currently known schemes generally require a far greater amount of memory space for the storage of secret and public keys than a tradi...

متن کامل

Practical Proven Secure Authentication with Arbitration

Proven secure signature schemes and unconditionally secure authentication schemes with arbiter have been proposed. The former are not practical (too slow) and the latter cannot be reused. All these limitations are solved in this paper by presenting a resuable conditionally secure authentication scheme with arbiter. The scheme is unconditionally secure against denial by the sender of having sent...

متن کامل

Unconditionally Secure Quantum Signatures

Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from,...

متن کامل

Unconditionally Secure Digital Signature Schemes Admitting Transferability

A potentially serious problem with current digital signature schemes is that their underlying hard problems from number theory may be solved by an innovative technique or a new generation of computing devices such as quantum computers. Therefore while these signature schemes represent an efficient solution to the short term integrity (unforgeability and non-repudiation) of digital data, they pr...

متن کامل

Unconditional Sender and Recipient Untraceability in Spite of Active Attacks

A protocol is described which allows to send and receive messages anonymously using an arbitrary communication network, and it is proved to be unconditionally secure. This improves a result by DAVID CHAUM: The DC-net guarantees the same, but on the assumption of a reliable broadcast network. Since unconditionally secure Byzantine Agreement cannot be achieved, such a reliable broadcast network c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004