Hierarchy of Three-Party Consistency Specifications

被引:0
作者
Loss, Julian [1 ]
Maurer, Ueli [1 ]
Tschudi, Daniel [1 ]
机构
[1] Swiss Fed Inst Technol, Dept Comp Sci, Zurich, Switzerland
来源
2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY | 2016年
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the theory of distributed systems and in cryptography one considers a set of n parties which wish to securely perform a certain computation, even if some of the parties are dishonest. Broadcast, one of the most fundamental and widely used such primitives, allows one (possibly cheating) party to distribute a value m consistently to the other parties, in a context where only bilateral (authenticated) channels between parties are available. A well-known result [LSP82] states that this is possible if and only if strictly less than a third of the parties are dishonest. Broadcast guarantees a very strong form of consistency. This paper investigates generalizations of the broadcast setting in two directions: weaker forms of consistency guarantees are considered, and other resources than merely bilateral channels are assumed to be available. The ultimate goal of this line of work is to arrive at a complete classification of consistency specifications [Mau04]. As a concrete result in this direction we present a complete classification of three-party specifications with a binary input and binary outputs.
引用
收藏
页码:3048 / 3052
页数:5
相关论文
共 50 条
[41]   Three-party authenticated key agreements for optimal communicatione [J].
Lee, Tian-Fu ;
Hwang, Tzonelih .
PLOS ONE, 2017, 12 (03)
[42]   Three-party quantum key agreement with Bell states [J].
Yin Xun-Ru ;
Ma Wen-Ping ;
Shen Dong-Su ;
Wang Li-Li .
ACTA PHYSICA SINICA, 2013, 62 (17)
[43]   A Three-Party Model Tool for Ethical Risk Analysis [J].
Hélène Hermansson ;
Sven Ove Hansson .
Risk Management, 2007, 9 (3) :129-144
[44]   On the Exact Round Complexity of Secure Three-Party Computation [J].
Patra, Arpita ;
Ravi, Divya .
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 :425-458
[45]   Three-step three-party quantum secure direct communication [J].
Shan-Shan Chen ;
Lan Zhou ;
Wei Zhong ;
Yu-Bo Sheng .
Science China Physics, Mechanics & Astronomy, 2018, 61
[46]   Measuring bias: Moving from two-party to three-party elections [J].
Borisyuk, Galina ;
Johnston, Ron ;
Thrasher, Michael ;
Rallings, Colin .
ELECTORAL STUDIES, 2008, 27 (02) :245-256
[47]   Three-party quantum secret sharing against collective noise [J].
Yang, Yu-Guang ;
Gao, Shang ;
Li, Dan ;
Zhou, Yi-Hua ;
Shi, Wei-Min .
QUANTUM INFORMATION PROCESSING, 2019, 18 (07)
[48]   Cryptanalysis of an Enhanced Simple Three-Party Key Exchange Protocol [J].
Kim, Hae-Jung ;
Yoon, Eun-Jun .
SECURITY TECHNOLOGY, 2011, 259 :167-+
[49]   Fast and Secure Three-party Computation: The Garbled Circuit Approach [J].
Mohassel, Payman ;
Rosulek, Mike ;
Zhang, Ye .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :591-602
[50]   Simple three-party password authenticated key exchange protocol [J].
Lo N.-W. ;
Yeh K.-H. .
Journal of Shanghai Jiaotong University (Science), 2011, 16 (5) :600-603