Broadcast from Minicast Secure Against General Adversaries

被引:0
|
作者
Raykov, Pavel [1 ,2 ]
机构
[1] Tel Aviv Univ, Sch Elect Engn, IL-69978 Tel Aviv, Israel
[2] ITMO Univ, St Petersburg 197101, Russia
关键词
BYZANTINE AGREEMENT;
D O I
10.1007/978-3-662-47666-6_56
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Byzantine broadcast is a distributed primitive that allows a specific party to consistently distribute a message among n parties in the presence of potential misbehavior of up to t of the parties. The celebrated result of [PSL80] shows that broadcast is achievable from point-to-point channels if and only if t < n/3. The following two generalizations have been proposed to the original broadcast problem. In [FM98] the authors considered a general adversary characterized by the sets of parties that can be corrupted. It was shown that broadcast is achievable from point-to-point channels if and only if no three possible corrupted sets can cover the whole party set. In [CFF + 05] the notion of point-to-point channels has been extended to the b-minicast channels allowing to locally broadcast among any subset of b parties. It has been shown that broadcast secure against adversaries corrupting up to t parties is achievable from b-minicast if and only if t < b-1/b+1 n. In this paper we combine both generalizations by considering the problem of achieving broadcast from b-minicast channels secure against general adversaries. Our main result is a condition on the possible corrupted sets such that broadcast is achievable from b-minicast if and only if this condition holds.
引用
收藏
页码:701 / 712
页数:12
相关论文
共 50 条
  • [41] A secure distributed machine learning protocol against static semi-honest adversaries
    Sun, Maohua
    Yang, Ruidi
    Hu, Lei
    Applied Soft Computing, 2021, 102
  • [42] A GMM-Based Secure State Estimation Approach against Dynamic Malicious Adversaries
    Zhu, Cui
    Wang, Zile
    Zang, Zeyuan
    Li, Yuxuan
    Zheng, Huanming
    JOURNAL OF SENSORS, 2022, 2022
  • [43] Secure hypergraphs: Privacy from partial broadcast
    Franklin, M
    Yung, M
    SIAM JOURNAL ON DISCRETE MATHEMATICS, 2005, 18 (03) : 437 - 450
  • [44] Secure Symmetric Private Information Retrieval from Colluding Databases with Adversaries
    Wang, Qiwen
    Skoglund, Mikael
    2017 55TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2017, : 1083 - 1090
  • [45] Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing
    Beghaeiraveri, Seyed Amir Hosseini
    Izadi, Mohammad
    Rezvani, Mohsen
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [46] Post-quantum secure two-party computing protocols against malicious adversaries
    Huo, Yachao
    Zhao, Zongqu
    Qin, Panke
    Wang, Shujing
    Zheng, Chengfu
    Concurrency and Computation: Practice and Experience, 2024, 36 (04)
  • [47] Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries
    Pettai, Martin
    Laud, Peeter
    2015 IEEE 28TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM CSF 2015, 2015, : 75 - 89
  • [48] Adaptively Secure Broadcast
    Hirt, Martin
    Zikas, Vassilis
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 466 - 485
  • [49] Secure Broadcast Ambients
    Gunter, Elsa L.
    Yasmeen, Ayesha
    FORMAL ASPECTS IN SECURITY AND TRUST, 2009, 5491 : 257 - 271
  • [50] Fast and Accurate Likelihood Ratio-Based Biometric Verification Secure Against Malicious Adversaries
    Bassit, Amina
    Hahn, Florian
    Peeters, Joep
    Kevenaar, Tom
    Veldhuis, Raymond
    Peter, Andreas
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 5045 - 5060