Hierarchy of Three-Party Consistency Specifications

被引:0
作者
Loss, Julian [1 ]
Maurer, Ueli [1 ]
Tschudi, Daniel [1 ]
机构
[1] Swiss Fed Inst Technol, Dept Comp Sci, Zurich, Switzerland
来源
2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY | 2016年
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the theory of distributed systems and in cryptography one considers a set of n parties which wish to securely perform a certain computation, even if some of the parties are dishonest. Broadcast, one of the most fundamental and widely used such primitives, allows one (possibly cheating) party to distribute a value m consistently to the other parties, in a context where only bilateral (authenticated) channels between parties are available. A well-known result [LSP82] states that this is possible if and only if strictly less than a third of the parties are dishonest. Broadcast guarantees a very strong form of consistency. This paper investigates generalizations of the broadcast setting in two directions: weaker forms of consistency guarantees are considered, and other resources than merely bilateral channels are assumed to be available. The ultimate goal of this line of work is to arrive at a complete classification of consistency specifications [Mau04]. As a concrete result in this direction we present a complete classification of three-party specifications with a binary input and binary outputs.
引用
收藏
页码:3048 / 3052
页数:5
相关论文
共 50 条
  • [21] On the Exact Round Complexity of Secure Three-Party Computation
    Patra, Arpita
    Ravi, Divya
    JOURNAL OF CRYPTOLOGY, 2021, 34 (04)
  • [22] Information-Theoretically Secure Three-Party Computation with One Corrupted Party
    Wang, Ye
    Ishwar, Prakash
    Rane, Shantanu
    2013 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2013, : 3160 - +
  • [23] Three-party competition in parliamentary democracy with proportional representation
    Seok-ju Cho
    Public Choice, 2014, 161 : 407 - 426
  • [24] A novel three-party encrypted key exchange protocol
    Chang, CC
    Chang, YF
    COMPUTER STANDARDS & INTERFACES, 2004, 26 (05) : 471 - 476
  • [25] Three-step three-party quantum secure direct communication
    Shan-Shan Chen
    Lan Zhou
    Wei Zhong
    Yu-Bo Sheng
    Science China(Physics,Mechanics & Astronomy), 2018, (09) : 30 - 34
  • [26] Three-step three-party quantum secure direct communication
    Chen, Shan-Shan
    Zhou, Lan
    Zhong, Wei
    Sheng, Yu-Bo
    SCIENCE CHINA-PHYSICS MECHANICS & ASTRONOMY, 2018, 61 (09)
  • [27] A Secure Three-Party Computational Protocol for Triangle Area
    Liu, Liang
    Chen, Xiaofeng
    Lou, Wenjing
    INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 82 - 97
  • [28] Posets and protocols - Picking the right three-party protocol
    Ng, SL
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2003, 21 (01) : 55 - 61
  • [29] Amylin's three-party good-bye
    Brady Huggett
    Nature Biotechnology, 2012, 30 (9) : 812 - 812
  • [30] Secure three-party computational protocols for triangle area
    Liu, Liang
    Chen, Xiaofeng
    Lou, Wenjing
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (01) : 1 - 13