Hierarchy of Three-Party Consistency Specifications

被引:0
作者
Loss, Julian [1 ]
Maurer, Ueli [1 ]
Tschudi, Daniel [1 ]
机构
[1] Swiss Fed Inst Technol, Dept Comp Sci, Zurich, Switzerland
来源
2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY | 2016年
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the theory of distributed systems and in cryptography one considers a set of n parties which wish to securely perform a certain computation, even if some of the parties are dishonest. Broadcast, one of the most fundamental and widely used such primitives, allows one (possibly cheating) party to distribute a value m consistently to the other parties, in a context where only bilateral (authenticated) channels between parties are available. A well-known result [LSP82] states that this is possible if and only if strictly less than a third of the parties are dishonest. Broadcast guarantees a very strong form of consistency. This paper investigates generalizations of the broadcast setting in two directions: weaker forms of consistency guarantees are considered, and other resources than merely bilateral channels are assumed to be available. The ultimate goal of this line of work is to arrive at a complete classification of consistency specifications [Mau04]. As a concrete result in this direction we present a complete classification of three-party specifications with a binary input and binary outputs.
引用
收藏
页码:3048 / 3052
页数:5
相关论文
共 50 条
[21]   Three-party competition in parliamentary democracy with proportional representation [J].
Cho, Seok-ju .
PUBLIC CHOICE, 2014, 161 (3-4) :407-426
[22]   On the Exact Round Complexity of Secure Three-Party Computation [J].
Patra, Arpita ;
Ravi, Divya .
JOURNAL OF CRYPTOLOGY, 2021, 34 (04)
[23]   Information-Theoretically Secure Three-Party Computation with One Corrupted Party [J].
Wang, Ye ;
Ishwar, Prakash ;
Rane, Shantanu .
2013 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2013, :3160-+
[24]   A Secure Three-Party Computational Protocol for Triangle Area [J].
Liu, Liang ;
Chen, Xiaofeng ;
Lou, Wenjing .
INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 :82-97
[25]   Amylin's three-party good-bye [J].
Brady Huggett .
Nature Biotechnology, 2012, 30 (9) :812-812
[26]   Posets and protocols - Picking the right three-party protocol [J].
Ng, SL .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2003, 21 (01) :55-61
[27]   Secure three-party computational protocols for triangle area [J].
Liu, Liang ;
Chen, Xiaofeng ;
Lou, Wenjing .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (01) :1-13
[28]   Three-step three-party quantum secure direct communication [J].
ShanShan Chen ;
Lan Zhou ;
Wei Zhong ;
YuBo Sheng .
Science China(Physics,Mechanics & Astronomy), 2018, Mechanics & Astronomy)2018 (09) :30-34
[29]   Three-step three-party quantum secure direct communication [J].
Chen, Shan-Shan ;
Zhou, Lan ;
Zhong, Wei ;
Sheng, Yu-Bo .
SCIENCE CHINA-PHYSICS MECHANICS & ASTRONOMY, 2018, 61 (09)
[30]   Cryptanalysis of simple three-party key exchange protocol [J].
Guo, Hua ;
Li, Zhoujun ;
Mu, Yi ;
Zhang, Xiyong .
COMPUTERS & SECURITY, 2008, 27 (1-2) :16-21