Asynchronous unconditionally secure computation: An efficiency improvement

被引:0
|
作者
Prabhu, B [1 ]
Srinathan, K [1 ]
Rangan, CP [1 ]
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Madras 600036, Tamil Nadu, India
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Consider a set of n players who wish to compute the value of a commonly agreed multi-variate function on their local inputs, whilst keeping their local inputs as private as possible even when a non-trivial subset of players collude and behave maliciously. This is the problem of secure multiparty computation. In this work, we present an efficient protocol for asynchronous secure computation tolerating a computationally unbounded Byzantine adversary that corrupts up to t < n/4 players.
引用
收藏
页码:93 / 107
页数:15
相关论文
共 50 条
  • [1] Unconditionally Secure Computation with Reduced Interaction
    Damgard, Ivan
    Nielsen, Jesper Buus
    Ostrovsky, Rafail
    Rosen, Adi
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 : 420 - 447
  • [2] Scalable and unconditionally secure multiparty computation
    Damgard, Ivan
    Nielsen, Jesper Buns
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2007, PROCEEDINGS, 2007, 4622 : 572 - 590
  • [3] An Efficient Framework for Unconditionally Secure Multiparty Computation
    Choudhury, Ashish
    Patra, Arpita
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (01) : 428 - 468
  • [4] Round Efficient Unconditionally Secure Multiparty Computation Protocol
    Patra, Arpita
    Choudhary, Ashish
    Rangan, C. Pandu
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 : 185 - 199
  • [5] Unconditionally Secure Computation Against Low-Complexity Leakage
    Bogdanov, Andrej
    Ishai, Yuval
    Srinivasan, Akshayaram
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II, 2019, 11693 : 387 - 416
  • [6] On Unconditionally Secure Multiparty Computation for Realizing Correlated Equilibria in Games
    Wang, Ye
    Rane, Shantanu
    Ishwar, Prakash
    [J]. 2013 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP), 2013, : 241 - 244
  • [7] Unconditionally Secure Computation Against Low-Complexity Leakage
    Bogdanov, Andrej
    Ishai, Yuval
    Srinivasan, Akshayaram
    [J]. JOURNAL OF CRYPTOLOGY, 2021, 34 (04)
  • [8] Unconditionally Secure Computation Against Low-Complexity Leakage
    Andrej Bogdanov
    Yuval Ishai
    Akshayaram Srinivasan
    [J]. Journal of Cryptology, 2021, 34
  • [9] Asynchronous Secure Multiparty Computation in Constant Time
    Cohen, Ran
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT II, 2016, 9615 : 183 - 207
  • [10] Revisiting the Efficiency of Perfectly Secure Asynchronous Multi-party Computation Against General Adversaries
    Appan, Ananya
    Chandramouli, Anirudh
    Choudhury, Ashish
    [J]. PROGRESS IN CRYPTOLOGY, INDOCRYPT 2022, 2022, 13774 : 223 - 248