Information-Theoretic Pseudosignatures and Byzantine Agreement for t ≥ n/3

作者: Michael Waidner , Birgit Pfitzmann

DOI:

关键词:

摘要: Byzantine agreement means achieving reliable broadcast on a point-to-point network of n processors, which up to t may be maliciously faulty. A well-known result by Pease, Shostak, and Lamport says that perfect is only possible if < n/3. In contrast, so-called authenticated protocols achieve for any based computational assumptions, typically the existence digital signature scheme, an assumption equivalent one-way functions. The “folklore” belief these two results assumptions are necessary ≥ We present protocol refutes this folklore belief, i.e., it achieves in information-theoretic setting. It does not, however, contradict precise impossibility result: More than one difference exists between model proof existing protocols, we remove assumption. Our new information-theoretically secure authentication scheme with many properties signatures; call pseudosignatures. construction pseudosignatures generalizes Chaum Roijakkers.

参考文章(29)
Cynthia Dwork, Benny Chor, Randomization in Byzantine Agreement. Adv. Comput. Res.. ,vol. 5, pp. 443- 497 ,(1989)
Jurjen Bos, Bert den Boer, Detection of disrupters in the DC protocol theory and application of cryptographic techniques. pp. 320- 327 ,(1990) , 10.1007/3-540-46885-4_33
David Chaum, Sandra Roijakkers, Unconditionally Secure Digital Signatures international cryptology conference. pp. 206- 214 ,(1990) , 10.1007/3-540-38424-3_15
Birgit Baum-Waidner, Birgit Pfitzmann, Michael Waidner, Unconditional Byzantine agreement with good majority symposium on theoretical aspects of computer science. pp. 285- 295 ,(1991) , 10.1007/BFB0020806
Birgit Pfitzmann, Sorting out signature schemes computer and communications security. pp. 74- 85 ,(1993) , 10.1145/168588.168597
Mark N. Wegman, J.Lawrence Carter, New hash functions and their use in authentication and set equality Journal of Computer and System Sciences. ,vol. 22, pp. 265- 279 ,(1981) , 10.1016/0022-0000(81)90033-7
R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM. ,vol. 26, pp. 96- 99 ,(1983) , 10.1145/357980.358017
R. Impagliazzo, S. Rudich, Limits on the provable consequences of one-way permutations Proceedings of the twenty-first annual ACM symposium on Theory of computing - STOC '89. pp. 44- 61 ,(1989) , 10.1145/73007.73012