Asynchronous unconditionally secure computation: An efficiency improvement

被引:0
|
作者
Prabhu, B [1 ]
Srinathan, K [1 ]
Rangan, CP [1 ]
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Madras 600036, Tamil Nadu, India
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Consider a set of n players who wish to compute the value of a commonly agreed multi-variate function on their local inputs, whilst keeping their local inputs as private as possible even when a non-trivial subset of players collude and behave maliciously. This is the problem of secure multiparty computation. In this work, we present an efficient protocol for asynchronous secure computation tolerating a computationally unbounded Byzantine adversary that corrupts up to t < n/4 players.
引用
下载
收藏
页码:93 / 107
页数:15
相关论文
共 50 条
  • [21] Unconditionally Secure Group Authentication
    Van Dijk M.
    Gehrmann C.
    Smeets B.
    Designs, Codes and Cryptography, 1998, 14 (3) : 281 - 296
  • [22] Unconditionally secure entity authentication
    Kurosawa, K
    1998 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 1998, : 298 - 298
  • [23] Unconditionally Secure Quantum Signatures
    Amiri, Ryan
    Andersson, Erika
    ENTROPY, 2015, 17 (08): : 5635 - 5659
  • [24] Unconditionally Secure Electronic Voting
    Otsuka, Akira
    Imai, Hideki
    TOWARDS TRUSTWORTHY ELECTIONS: NEW DIRECTIONS IN ELECTRONIC VOTING, 2010, 6000 : 107 - 123
  • [25] Unconditionally Secure Searchable Encryption
    Yoshizawa, Takahiro
    Watanabe, Yohei
    Shikata, Junji
    2017 51ST ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2017,
  • [26] Multiround Unconditionally Secure Authentication
    Gehrmann C.
    Designs, Codes and Cryptography, 1998, 15 (1) : 67 - 86
  • [27] Unconditionally Secure Group Signatures
    Seito, Takenobu
    Hara, Yuki
    Shikata, Junji
    Matsumoto, Tsutomu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (08) : 2067 - 2085
  • [28] Unconditionally secure authenticated encryption
    Shikata, J
    Hanaoka, G
    Zheng, YL
    Matsumoto, T
    Imai, H
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (05): : 1119 - 1131
  • [29] Unconditionally secure bit commitment
    Kent, A
    PHYSICAL REVIEW LETTERS, 1999, 83 (07) : 1447 - 1450
  • [30] Unconditionally Secure Blind Signatures
    Hara, Yuki
    Seito, Takenobu
    Shikata, Junji
    Matsumoto, Tsutomu
    INFORMATION THEORETIC SECURITY, 2009, 4883 : 23 - 43