Hierarchy of Three-Party Consistency Specifications

被引:0
|
作者
Loss, Julian [1 ]
Maurer, Ueli [1 ]
Tschudi, Daniel [1 ]
机构
[1] Swiss Fed Inst Technol, Dept Comp Sci, Zurich, Switzerland
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the theory of distributed systems and in cryptography one considers a set of n parties which wish to securely perform a certain computation, even if some of the parties are dishonest. Broadcast, one of the most fundamental and widely used such primitives, allows one (possibly cheating) party to distribute a value m consistently to the other parties, in a context where only bilateral (authenticated) channels between parties are available. A well-known result [LSP82] states that this is possible if and only if strictly less than a third of the parties are dishonest. Broadcast guarantees a very strong form of consistency. This paper investigates generalizations of the broadcast setting in two directions: weaker forms of consistency guarantees are considered, and other resources than merely bilateral channels are assumed to be available. The ultimate goal of this line of work is to arrive at a complete classification of consistency specifications [Mau04]. As a concrete result in this direction we present a complete classification of three-party specifications with a binary input and binary outputs.
引用
收藏
页码:3048 / 3052
页数:5
相关论文
共 50 条
  • [41] On the Exact Round Complexity of Secure Three-Party Computation
    Patra, Arpita
    Ravi, Divya
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 425 - 458
  • [42] Three-party Quantum Authenticated Key Distribution with Partially Trusted Third Party
    Kanamori, Yoshito
    Hoanca, Bogdan
    Yoo, Seong-Moo
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [43] Three-step three-party quantum secure direct communication
    Shan-Shan Chen
    Lan Zhou
    Wei Zhong
    Yu-Bo Sheng
    Science China Physics, Mechanics & Astronomy, 2018, 61
  • [44] Measuring bias: Moving from two-party to three-party elections
    Borisyuk, Galina
    Johnston, Ron
    Thrasher, Michael
    Rallings, Colin
    ELECTORAL STUDIES, 2008, 27 (02) : 245 - 256
  • [45] Cryptanalysis of an Enhanced Simple Three-Party Key Exchange Protocol
    Kim, Hae-Jung
    Yoon, Eun-Jun
    SECURITY TECHNOLOGY, 2011, 259 : 167 - +
  • [46] Fast and Secure Three-party Computation: The Garbled Circuit Approach
    Mohassel, Payman
    Rosulek, Mike
    Zhang, Ye
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 591 - 602
  • [47] Three-party quantum secret sharing against collective noise
    Yang, Yu-Guang
    Gao, Shang
    Li, Dan
    Zhou, Yi-Hua
    Shi, Wei-Min
    QUANTUM INFORMATION PROCESSING, 2019, 18 (07)
  • [48] Efficient Three-party Boolean-to-Arithmetic Share Conversion
    Cheng, Nan
    Zhang, Feng
    Mitrokotsa, Aikaterini
    2023 20TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PST, 2023, : 111 - 116
  • [49] Formal Analysis and Verification for Three-Party Authentication Protocol of RFID
    Chen, Jia
    Xiao, Meihua
    Yang, Ke
    Li, Wei
    Zhong, Xiaomei
    THEORETICAL COMPUTER SCIENCE (NCTCS 2018), 2018, 882 : 46 - 60
  • [50] Efficient three-party key exchange protocols with round efficiency
    Taek-Young Youn
    Eun Sook Kang
    Changhoon Lee
    Telecommunication Systems, 2013, 52 : 1367 - 1376