Hierarchy of Three-Party Consistency Specifications

被引:0
作者
Loss, Julian [1 ]
Maurer, Ueli [1 ]
Tschudi, Daniel [1 ]
机构
[1] Swiss Fed Inst Technol, Dept Comp Sci, Zurich, Switzerland
来源
2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY | 2016年
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the theory of distributed systems and in cryptography one considers a set of n parties which wish to securely perform a certain computation, even if some of the parties are dishonest. Broadcast, one of the most fundamental and widely used such primitives, allows one (possibly cheating) party to distribute a value m consistently to the other parties, in a context where only bilateral (authenticated) channels between parties are available. A well-known result [LSP82] states that this is possible if and only if strictly less than a third of the parties are dishonest. Broadcast guarantees a very strong form of consistency. This paper investigates generalizations of the broadcast setting in two directions: weaker forms of consistency guarantees are considered, and other resources than merely bilateral channels are assumed to be available. The ultimate goal of this line of work is to arrive at a complete classification of consistency specifications [Mau04]. As a concrete result in this direction we present a complete classification of three-party specifications with a binary input and binary outputs.
引用
收藏
页码:3048 / 3052
页数:5
相关论文
共 50 条
[31]   The British general election of 2010: a three-party contest - or three two-party contests? [J].
Johnston, Ron ;
Pattie, Charles .
GEOGRAPHICAL JOURNAL, 2011, 177 :17-26
[32]   A Security Patch for a Three-Party Key Exchange Protocol [J].
ZHAO Jianjie1 ;
2.Department of Computer Science and Engineering .
Wuhan University Journal of Natural Sciences, 2010, 15 (03) :242-246
[33]   Cryptanalysis of simple three-party key exchange protocol [J].
Guo, Hua ;
Li, Zhoujun ;
Mu, Yi ;
Zhang, Xiyong .
COMPUTERS & SECURITY, 2008, 27 (1-2) :16-21
[34]   On the Exact Round Complexity of Secure Three-Party Computation [J].
Arpita Patra ;
Divya Ravi .
Journal of Cryptology, 2021, 34
[35]   Cryptanalysis of a Simple Three-party Key Exchange Protocol [J].
He, Debiao ;
Chen, Jianhua ;
Hu, Jin .
INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2010, 34 (03) :337-339
[36]   Cryptanalysis of a simple three-party key exchange protocol [J].
Debiao, He ;
Jianhua, Chen ;
Jin, Hu .
Informatica (Ljubljana), 2010, 34 (03) :337-339
[37]   Three-party Encrypted Key Exchange: Attacks and a Solution [J].
Lin, Chun-Li ;
Sun, Hung-Min ;
Hwang, Tzonelih .
Operating Systems Review (ACM), 2000, 34 (04) :12-20
[38]   Three-party Quantum Authenticated Key Distribution with Partially Trusted Third Party [J].
Kanamori, Yoshito ;
Hoanca, Bogdan ;
Yoo, Seong-Moo .
GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
[39]   Three-party authenticated key agreements for optimal communicatione [J].
Lee, Tian-Fu ;
Hwang, Tzonelih .
PLOS ONE, 2017, 12 (03)
[40]   Three-party quantum key agreement with Bell states [J].
Yin Xun-Ru ;
Ma Wen-Ping ;
Shen Dong-Su ;
Wang Li-Li .
ACTA PHYSICA SINICA, 2013, 62 (17)