A protocol to achieve independence in constant rounds

被引:11
|
作者
Gennaro, R [1 ]
机构
[1] IBM Corp, TJ Watson Res Ctr, Yorktown Hts, NY 10598 USA
关键词
independence; computation model; communication networks; simultaneous broadcast; and Verifiable Secret Sharing (VSS) protocols;
D O I
10.1109/71.877748
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Independence is a fundamental property needed to achieve security in fault-tolerant distributed computing. In practice, distributed communication networks are neither fully synchronous or fully asynchronous, but rather loosely synchronized. By this, we mean that in a communication protocol, messages at a given round may depend on messages from other players at the same round. These possible dependencies among messages create problems if we need n players to announce independently chosen values. This task is called simultaneous broadcast. in this paper, we present the first constant round protocol for simultaneous broadcast in a reasonable computation model (which includes a common shared random string among the players). The protocol is provably secure under general cryptographic assumptions, in the process, we develop a new and stronger formal definition for this problem. Previously known protocols for this task required either O(log n) or expected constant rounds to complete (depending on the computation model considered).
引用
收藏
页码:636 / 647
页数:12
相关论文
共 50 条
  • [21] PRELOAD INDEPENDENCE OF THE TIME CONSTANT OF RELAXATION
    MAUGHAN, WL
    SUNAGAWA, K
    STODDARD, M
    KALLMAN, CH
    SAGAWA, K
    WEISFELDT, ML
    CLINICAL RESEARCH, 1982, 30 (02): : A483 - A483
  • [22] Two Rounds RFID Grouping-Proof Protocol
    Abughazalah, Sarah
    Markantonakis, Konstantinos
    Mayes, Keith
    2016 IEEE INTERNATIONAL CONFERENCE ON RFID (RFID), 2016, : 161 - 174
  • [23] Adaptively Secure, Universally Composable, Multiparty Computation in Constant Rounds
    Dachman-Soled, Dana
    Katz, Jonathan
    Rao, Vanishree
    THEORY OF CRYPTOGRAPHY (TCC 2015), PT II, 2015, 9015 : 586 - 613
  • [24] A Deterministic Algorithm for the MST Problem in Constant Rounds of Congested Clique
    Nowicki, Krzysztof
    STOC '21: PROCEEDINGS OF THE 53RD ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING, 2021, : 1154 - 1165
  • [25] Almost 3-Approximate Correlation Clustering in Constant Rounds
    Behnezhad, Soheil
    Charikar, Moses
    Ma, Weiyun
    Tan, Li-Yang
    2022 IEEE 63RD ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2022, : 720 - 731
  • [26] A Provable Authenticated Certificateless Group Key Agreement with Constant Rounds
    Teng, Jikai
    Wu, Chuankun
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2012, 14 (01) : 104 - 110
  • [27] Resettably-Sound Resettable Zero Knowledge in Constant Rounds
    Chongchitmate, Wutichai
    Ostrovsky, Rafail
    Visconti, Ivan
    THEORY OF CRYPTOGRAPHY, TCC 2017, PT II, 2017, 10678 : 111 - 138
  • [28] Hourly nursing rounds: Shaping nursing culture to achieve nursing quality outcomes
    Kalman, Melanie
    Olrich, Todd
    Nigolian, Cindy
    CLINICAL NURSE SPECIALIST, 2008, 22 (02) : 94 - 94
  • [29] Protocol independence using the sockets API
    Metz, C
    USENIX ASSOCIATION PROCEEDINGS OF THE FREENIX TRACK, 2000, : 99 - 107
  • [30] Protocol independence through disjoint encryption
    Guttman, JD
    Fábrega, FJT
    13TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2000, : 24 - 34