Adaptively Secure Broadcast

被引:0
|
作者
Hirt, Martin [1 ]
Zikas, Vassilis [1 ]
机构
[1] ETH, Dept Comp Sci, Zurich, Switzerland
来源
关键词
BYZANTINE AGREEMENT; ALGORITHMS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A broadcast protocol allows a sender to distribute a message through a point-to-point network to a set of parties, such that (i) all parties receive the same message, even if the sender is corrupted, and (ii) this is the sender's message, if he is honest. Broadcast protocols satisfying these properties are known to exist if and only if t < n/3, where n denotes the total number of parties, and t denotes the maximal number of corruptions. When a setup allowing signatures is available to the parties, then such protocols exist even for t < n. Since its invention in [LSP82], broadcast has been used as a primitive in numerous multi-party protocols making it one of the fundamental primitives in the distributed-protocols literature. The security of these protocols is analyzed in a model where a broadcast primitive which behaves in an ideal way is assumed. Clearly, a definition of broadcast should allow for secure composition, namely, it should be secure to replace an assumed broadcast primitive by a protocol satisfying this definition. Following recent cryptographic reasoning, to allow secure composition the ideal behavior of broadcast can be described as an ideal functionality, and a simulation-based definition can be used. In this work, we show that the property-based definition of broadcast does not imply the simulation-based definition for the natural broadcast functionality. In fact, most broadcast protocols in the literature do not securely realize this functionality, which raises a composability issue for these broadcast protocols. In particular, we do not know of any broadcast protocol which could be securely invoked in a multi-party computation protocol in the secure-channels model. The problem is that existing protocols for broadcast do not preserve the secrecy of the message while being broadcasted, and in particular allow the adversary to corrupt the sender (and change the message), depending on the message being broadcasted. For example, when every party should broadcast a random bit, the adversary could corrupt those parties who intend to broadcast 0, and make them broadcast I. More concretely, we show that simulatable broadcast in a model with secure channels is possible if and only if t < n/3, respectively t <= n/2 when a signature setup is available. The positive results are proven by constructing secure broadcast protocols.
引用
收藏
页码:466 / 485
页数:20
相关论文
共 50 条
  • [1] Adaptively Secure Broadcast, Revisited
    Garay, Juan A.
    Katz, Jonathan
    Kumaresan, Ranjit
    Zhou, Hong-Sheng
    PODC 11: PROCEEDINGS OF THE 2011 ACM SYMPOSIUM PRINCIPLES OF DISTRIBUTED COMPUTING, 2011, : 179 - 186
  • [2] Completeness Theorems for Adaptively Secure Broadcast
    Cohen, Ran
    Garay, Juan
    Zikas, Vassilis
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT I, 2023, 14081 : 3 - 38
  • [3] Adaptively Secure Broadcast Encryption with Dealership
    Acharya, Kamalesh
    Dutta, Ratna
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2016, 2017, 10157 : 161 - 177
  • [4] Efficient and adaptively secure broadcast encryption systems
    Zhang, Mingwu
    Yang, Bo
    Chen, Zhenhua
    Takagi, Tsuyoshi
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (08) : 1044 - 1052
  • [5] Adaptively Secure Broadcast Encryption With Constant Ciphertexts
    Guo, Dianli
    Wen, Qiaoyan
    Li, Wenmin
    Zhang, Hua
    Jin, Zhengping
    IEEE TRANSACTIONS ON BROADCASTING, 2016, 62 (03) : 709 - 715
  • [6] Adaptively secure broadcast encryption with authenticated content distributors
    Guo, Dianli
    Wen, Qiaoyan
    Li, Wenmin
    Zhang, Hua
    Jin, Zhengping
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (11-12) : 7889 - 7910
  • [7] Adaptively secure broadcast encryption with authenticated content distributors
    Dianli Guo
    Qiaoyan Wen
    Wenmin Li
    Hua Zhang
    Zhengping Jin
    Multimedia Tools and Applications, 2020, 79 : 7889 - 7910
  • [8] Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts and Keys
    Gay, Romain
    Kowalczyk, Lucas
    Wee, Hoeteck
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 123 - 139
  • [9] Adaptively secure broadcast encryption under standard assumptions with better efficiency
    Lee, Kwangsu
    Lee, Dong Hoon
    IET INFORMATION SECURITY, 2015, 9 (03) : 149 - 157
  • [10] Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext
    Liqing Chen
    Jiguo Li
    Yichen Zhang
    Soft Computing, 2020, 24 : 4589 - 4606