Asynchronous unconditionally secure computation: An efficiency improvement

被引:0
|
作者
Prabhu, B [1 ]
Srinathan, K [1 ]
Rangan, CP [1 ]
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Madras 600036, Tamil Nadu, India
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Consider a set of n players who wish to compute the value of a commonly agreed multi-variate function on their local inputs, whilst keeping their local inputs as private as possible even when a non-trivial subset of players collude and behave maliciously. This is the problem of secure multiparty computation. In this work, we present an efficient protocol for asynchronous secure computation tolerating a computationally unbounded Byzantine adversary that corrupts up to t < n/4 players.
引用
收藏
页码:93 / 107
页数:15
相关论文
共 50 条
  • [11] Unconditionally Secure Multiparty Computation for Symmetric Functions with Low Bottleneck Complexityy
    Eriguchi, Reo
    [J]. ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PT I, 2023, 14438 : 335 - 368
  • [12] Correction to: Unconditionally Secure Computation Against Low-Complexity Leakage
    Andrej Bogdanov
    Yuval Ishai
    Akshayaram Srinivasan
    [J]. Journal of Cryptology, 2022, 35
  • [13] Correction to: Unconditionally Secure Computation Against Low-Complexity Leakage
    Andrej Bogdanov
    Yuval Ishai
    Akshayaram Srinivasan
    [J]. Journal of Cryptology, 2022, 35
  • [14] Asynchronous perfectly secure computation tolerating generalized adversaries
    Kumar, MVNA
    Srinathan, K
    Rangan, CP
    [J]. INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 497 - 511
  • [15] Efficient Secure Multiparty Computation Protocol in Asynchronous Network
    Huang, Zheng
    Qiu, Weidong
    Li, Qiang
    Chen, Kefei
    [J]. ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 152 - 158
  • [16] Improving the Efficiency of Optimally-Resilient Statistically-Secure Asynchronous Multi-party Computation
    Choudhury, Ashish
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2020, 2020, 12578 : 810 - 831
  • [17] Constant-Overhead Unconditionally Secure Multiparty Computation Over Binary Fields
    Polychroniadou, Antigoni
    Song, Yifan
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT II, 2021, 12697 : 812 - 841
  • [18] On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation
    Damgard, Ivan
    Dupuis, Frederic
    Nielsen, Jesper Buus
    [J]. INFORMATION THEORETIC SECURITY (ICITS 2015), 2015, 9063 : 87 - 104
  • [19] Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority
    Ben-Sasson, Eli
    Fehr, Serge
    Ostrovsky, Rafail
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 663 - 680
  • [20] Quorums Quicken Queries: Efficient Asynchronous Secure Multiparty Computation
    Dani, Varsha
    King, Valerie
    Movahedi, Mahnush
    Saia, Jared
    [J]. DISTRIBUTED COMPUTING AND NETWORKING, ICDCN 2014, 2014, 8314 : 242 - 256