A protocol to achieve independence in constant rounds

被引:11
|
作者
Gennaro, R [1 ]
机构
[1] IBM Corp, TJ Watson Res Ctr, Yorktown Hts, NY 10598 USA
关键词
independence; computation model; communication networks; simultaneous broadcast; and Verifiable Secret Sharing (VSS) protocols;
D O I
10.1109/71.877748
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Independence is a fundamental property needed to achieve security in fault-tolerant distributed computing. In practice, distributed communication networks are neither fully synchronous or fully asynchronous, but rather loosely synchronized. By this, we mean that in a communication protocol, messages at a given round may depend on messages from other players at the same round. These possible dependencies among messages create problems if we need n players to announce independently chosen values. This task is called simultaneous broadcast. in this paper, we present the first constant round protocol for simultaneous broadcast in a reasonable computation model (which includes a common shared random string among the players). The protocol is provably secure under general cryptographic assumptions, in the process, we develop a new and stronger formal definition for this problem. Previously known protocols for this task required either O(log n) or expected constant rounds to complete (depending on the computation model considered).
引用
收藏
页码:636 / 647
页数:12
相关论文
共 50 条
  • [1] A constant rounds group key agreement protocol without using hash functions
    Zhang, Hua
    Wen, Qiao-yan
    Zhang, Jie
    Li, Wen-min
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2009, 19 (06) : 457 - 464
  • [2] An Enhanced Password-based Group Key Agreement Protocol with Constant Rounds
    Yuan, Wei
    Hu, Liang
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (05): : 2589 - 2594
  • [3] Concurrently Secure Computation in Constant Rounds
    Garg, Sanjam
    Goyal, Vipul
    Jain, Abhishek
    Sahai, Amit
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 99 - 116
  • [4] IRAN HOPING TO ACHIEVE SUGAR INDEPENDENCE
    RIESZ, JE
    FOREIGN AGRICULTURE, 1969, 7 (07): : 20 - &
  • [5] BY THE NUMBERS: US TO ACHIEVE ENERGY INDEPENDENCE
    Brown, Alan S.
    MECHANICAL ENGINEERING, 2013, 135 (02) : 32 - 33
  • [6] Fully private auctions in a constant number of rounds
    Brandt, F
    FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2003, 2742 : 223 - 238
  • [7] Secure Multiparty RAM Computation in Constant Rounds
    Garg, Sanjam
    Gupta, Divya
    Miao, Peihan
    Pandey, Omkant
    THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 491 - 520
  • [8] Linear Probing with Constant Independence
    Pagh, Anna
    Pagh, Rasmus
    Ruzic, Milan
    STOC 07: PROCEEDINGS OF THE 39TH ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, 2007, : 318 - 327
  • [9] LINEAR PROBING WITH CONSTANT INDEPENDENCE
    Pagh, Anna
    Pagh, Rasmus
    Ruzic, Milan
    SIAM JOURNAL ON COMPUTING, 2009, 39 (03) : 1107 - 1120
  • [10] How to Achieve Non-Malleability in One or Two Rounds
    Khurana, Dakshita
    Sahai, Amit
    2017 IEEE 58TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2017, : 564 - 575