Leakage-resilient coin tossing

作者: Elette Boyle , Shafi Goldwasser , Yael Tauman Kalai

DOI: 10.1007/S00446-013-0206-Z

关键词:

摘要: The ability to collectively toss a common coin among $$n$$ n parties in the presence of faults is an important primitive arsenal randomized distributed protocols. In case dishonest majority, it was shown be impossible achieve less than $$\frac{1}{r}$$ 1 r bias $$O(r)$$ O ( ) rounds (Cleve STOC '86). honest contrast, unconditionally secure $$O(1)$$ -round protocols for generating perfectly unbiased coins follow from general completeness theorems on multi-party channels model (e.g., BGW, CCD '88). However, with must generate and hold local secret values which are assumed hidden malicious parties: assumption crucial proving resulting unbiased. This unfortunately does not seem practice, as attackers can launch side-channel attacks state leak information their secrets. this work, we present protocol coin, leakage parties. We tolerate $$t \le (\frac{1}{3} - \epsilon n$$ t ≤ 3 ∈ computationally unbounded statically scheduled Byzantine addition $$\varTheta (1)$$ ? -fraction each (honest) party's state. Our results memory (of Akavia, Goldwasser, Vaikuntanathan '08) adapted setting. Another contribution our work tool use collective flipping—leakage-resilient verifiable sharing (VSS). Informally, variant ordinary VSS secrecy guarantees maintained even if leaked individual shares secret.

参考文章(43)
Oded Goldreich, , Silvio Micali, Avi Wigderson, , , How to play any mental game, or a completeness theorem for protocols with honest majority Providing Sound Foundations for Cryptography. pp. 307- 328 ,(2019) , 10.1145/3335741.3335755
David Chaum, Claude Crépeau, Ivan Damgård, Multiparty Unconditionally Secure Protocols (Extended Abstract) symposium on the theory of computing. pp. 11- 19 ,(1988)
Richard Cleve, Limits on the Security of Coin Flips when Half the Processors Are Faulty (Extended Abstract) symposium on the theory of computing. pp. 364- 369 ,(1986)
Paul Feldman, Silvio Micali, Byzantine Agreement in Constant Expected Time (and Trusting No One) foundations of computer science. pp. 267- 276 ,(1985)
Michael Ben-Or, Another Advantage of Free Choice: Completely Asynchronous Agreement Protocols (Extended Abstract). principles of distributed computing. pp. 27- 30 ,(1983)
Silvio Micali, Leonid Reyzin, Physically observable cryptography theory of cryptography conference. pp. 278- 296 ,(2004) , 10.1007/978-3-540-24638-1_16
Ran Canetti, Yevgeniy Dodis, Shai Halevi, Eyal Kushilevitz, Amit Sahai, Exposure-resilient functions and all-or-nothing transforms theory and application of cryptographic techniques. pp. 453- 469 ,(2000) , 10.1007/3-540-45539-6_33
Shafi Goldwasser, Madhu Sudan, Vinod Vaikuntanathan, Distributed Computing with Imperfect Randomness Lecture Notes in Computer Science. pp. 288- 302 ,(2005) , 10.1007/11561927_22
Moni Naor, Gil Segev, Public-Key Cryptosystems Resilient to Key Leakage international cryptology conference. pp. 18- 35 ,(2009) , 10.1007/978-3-642-03356-8_2
Ronald L. Rivest, All-or-Nothing Encryption and the Package Transform fast software encryption. pp. 210- 218 ,(1997) , 10.1007/BFB0052348