Broadcast from Minicast Secure Against General Adversaries

被引:0
|
作者
Raykov, Pavel [1 ,2 ]
机构
[1] Tel Aviv Univ, Sch Elect Engn, IL-69978 Tel Aviv, Israel
[2] ITMO Univ, St Petersburg 197101, Russia
关键词
BYZANTINE AGREEMENT;
D O I
10.1007/978-3-662-47666-6_56
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Byzantine broadcast is a distributed primitive that allows a specific party to consistently distribute a message among n parties in the presence of potential misbehavior of up to t of the parties. The celebrated result of [PSL80] shows that broadcast is achievable from point-to-point channels if and only if t < n/3. The following two generalizations have been proposed to the original broadcast problem. In [FM98] the authors considered a general adversary characterized by the sets of parties that can be corrupted. It was shown that broadcast is achievable from point-to-point channels if and only if no three possible corrupted sets can cover the whole party set. In [CFF + 05] the notion of point-to-point channels has been extended to the b-minicast channels allowing to locally broadcast among any subset of b parties. It has been shown that broadcast secure against adversaries corrupting up to t parties is achievable from b-minicast if and only if t < b-1/b+1 n. In this paper we combine both generalizations by considering the problem of achieving broadcast from b-minicast channels secure against general adversaries. Our main result is a condition on the possible corrupted sets such that broadcast is achievable from b-minicast if and only if this condition holds.
引用
收藏
页码:701 / 712
页数:12
相关论文
共 50 条
  • [1] Secure broadcast in distributed networks with strong adversaries
    Szalachowski, Pawel
    Kim, Tiffany Hyun-Jin
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3739 - 3750
  • [2] Network Agnostic Perfectly Secure Multiparty Computation Against General Adversaries
    Appan, Ananya
    Chandramouli, Anirudh
    Choudhury, Ashish
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2025, 71 (01) : 644 - 682
  • [3] Byzantine agreement secure against general adversaries in the dual failure model
    Altmann, B
    Fitzi, M
    Maurer, U
    DISTRIBUTED COMPUTING, 1999, 1693 : 123 - 137
  • [4] Efficient Byzantine agreement secure against general adversaries - (Extended abstract)
    Fitzi, M
    Maurer, U
    DISTRIBUTED COMPUTING, 1998, 1499 : 134 - 148
  • [5] Rational Broadcast Protocols Against Timid Adversaries
    Yamashita, Keigo
    Yasunaga, Kenji
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2023, 2023, 14167 : 277 - 293
  • [6] Encryption Schemes Secure Against Profiling Adversaries
    Diaz-Santiago, Sandra
    Chakraborty, Debrup
    E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2012, 2014, 455 : 172 - 191
  • [7] Privacy amplification secure against active adversaries
    Maurer, U
    Wolf, S
    ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 : 307 - 321
  • [8] Revisiting the Efficiency of Perfectly Secure Asynchronous Multi-party Computation Against General Adversaries
    Appan, Ananya
    Chandramouli, Anirudh
    Choudhury, Ashish
    PROGRESS IN CRYPTOLOGY, INDOCRYPT 2022, 2022, 13774 : 223 - 248
  • [9] Perfectly Secure Message Transmission Against Rational Adversaries
    Fujita, Maiki
    Koshiba, Takeshi
    Yasunaga, Kenji
    IEEE Journal on Selected Areas in Information Theory, 2022, 3 (02): : 390 - 404
  • [10] A Secure Scalar Product Protocol Against Malicious Adversaries
    Bo Yang
    Yong Yu
    Chung-Huang Yang
    Journal of Computer Science and Technology, 2013, 28 : 152 - 158