Broadcast from Minicast Secure Against General Adversaries

被引:0
|
作者
Raykov, Pavel [1 ,2 ]
机构
[1] Tel Aviv Univ, Sch Elect Engn, IL-69978 Tel Aviv, Israel
[2] ITMO Univ, St Petersburg 197101, Russia
关键词
BYZANTINE AGREEMENT;
D O I
10.1007/978-3-662-47666-6_56
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Byzantine broadcast is a distributed primitive that allows a specific party to consistently distribute a message among n parties in the presence of potential misbehavior of up to t of the parties. The celebrated result of [PSL80] shows that broadcast is achievable from point-to-point channels if and only if t < n/3. The following two generalizations have been proposed to the original broadcast problem. In [FM98] the authors considered a general adversary characterized by the sets of parties that can be corrupted. It was shown that broadcast is achievable from point-to-point channels if and only if no three possible corrupted sets can cover the whole party set. In [CFF + 05] the notion of point-to-point channels has been extended to the b-minicast channels allowing to locally broadcast among any subset of b parties. It has been shown that broadcast secure against adversaries corrupting up to t parties is achievable from b-minicast if and only if t < b-1/b+1 n. In this paper we combine both generalizations by considering the problem of achieving broadcast from b-minicast channels secure against general adversaries. Our main result is a condition on the possible corrupted sets such that broadcast is achievable from b-minicast if and only if this condition holds.
引用
收藏
页码:701 / 712
页数:12
相关论文
共 50 条
  • [21] Efficient and short certificateless signatures secure against realistic adversaries
    Tso, Raylin
    Yi, Xun
    Huang, Xinyi
    JOURNAL OF SUPERCOMPUTING, 2011, 55 (02): : 173 - 191
  • [22] Perfectly-Secure Asynchronous MPC for General Adversaries (Extended Abstract)
    Choudhury, Ashish
    Pappu, Nikhil
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2020, 2020, 12578 : 786 - 809
  • [23] The secure judgment of graphic similarity against malicious adversaries and its applications
    Liu, Xin
    Xu, Yang
    Luo, Dan
    Xu, Gang
    Xiong, Neal
    Chen, Xiu-Bo
    SCIENTIFIC REPORTS, 2023, 13 (01):
  • [24] Information-Theoretically Secure MPC Against Mixed Dynamic Adversaries
    Damgard, Ivan
    Escudero, Daniel
    Ravi, Divya
    THEORY OF CRYPTOGRAPHY, TCC 2021, PT I, 2021, 13042 : 591 - 622
  • [25] The secure judgment of graphic similarity against malicious adversaries and its applications
    Xin Liu
    Yang Xu
    Dan Luo
    Gang Xu
    Neal Xiong
    Xiu-Bo Chen
    Scientific Reports, 13 (1)
  • [26] Secure K-prototype clustering against the collusion of rational adversaries
    Tian Y.
    Zhao M.
    Bi R.
    Xiong J.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2024, 51 (02): : 196 - 210
  • [27] Reinforcement Learning Aided Secure UAV Communications against Roaming Adversaries
    Su, Gongchao
    Dai, Mingjun
    Chen, Bin
    Lin, Xiaohui
    38TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN 2024, 2024, : 279 - 283
  • [28] Malicious adversaries against secure state estimation: Sparse sensor attack design
    Lu, An-Yang
    Yang, Guang-Hong
    AUTOMATICA, 2022, 136
  • [29] POOL: Scalable On-Demand Secure Computation Service Against Malicious Adversaries
    Zhu, Ruiyu
    Huang, Yan
    Cassel, Darion
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 245 - 257
  • [30] Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries
    Dupuis, Frederic
    Nielsen, Jesper Buus
    Salvail, Louis
    ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 685 - +