A Little Honesty Goes a Long Way

作者: Juan A. Garay , Ran Gelles , David S. Johnson , Aggelos Kiayias , Moti Yung

DOI: 10.1007/978-3-662-46494-6_7

关键词: ImpossibilityComputer scienceSecure multi-party computationComputer securityHonestyOrder (business)Adversarial system

摘要: A fundamental result in secure multiparty computation (MPC) is that order to achieve full security, it necessary a majority of the parties behave honestly. There are settings, however, where condition an honest might be overly restrictive, and there need define investigate other plausible adversarial models circumvent above impossibility.

参考文章(38)
Richard Cleve, Limits on the Security of Coin Flips when Half the Processors Are Faulty (Extended Abstract) symposium on the theory of computing. pp. 364- 369 ,(1986)
Gilad Asharov, Yehuda Lindell, Hila Zarosim, Fair and Efficient Secure Multiparty Computation with Reputation Systems international conference on the theory and application of cryptology and information security. pp. 201- 220 ,(2013) , 10.1007/978-3-642-42045-0_11
Jonathan Katz, Ueli Maurer, Björn Tackmann, Vassilis Zikas, Universally Composable Synchronous Computation Theory of Cryptography. pp. 477- 498 ,(2013) , 10.1007/978-3-642-36594-2_27
Jurjen Bos, Bert den Boer, Detection of disrupters in the DC protocol theory and application of cryptographic techniques. pp. 320- 327 ,(1990) , 10.1007/3-540-46885-4_33
Shafi Goldwasser, Yehuda Lindell, Secure Computation without Agreement Lecture Notes in Computer Science. pp. 17- 32 ,(2002) , 10.1007/3-540-36108-1_2
R. Canetti, Universally composable security: a new paradigm for cryptographic protocols international conference on cluster computing. pp. 136- 145 ,(2001) , 10.1109/SFCS.2001.959888
Ivan Damgård, Yuval Ishai, Constant-round multiparty computation using a black-box pseudorandom generator international cryptology conference. pp. 378- 394 ,(2005) , 10.1007/11535218_23
Luke Mather, Elisabeth Oswald, Joe Bandenburg, Marcin Wójcik, Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests international cryptology conference. pp. 486- 505 ,(2013) , 10.1007/978-3-642-42033-7_25