Efficient multiparty computations secure against an adaptive adversary

被引:0
|
作者
Cramer, R [1 ]
Damgård, I
Dziembowski, S
Hirt, M
Rabin, T
机构
[1] Swiss Fed Inst Technol, Zurich, Switzerland
[2] Univ Aarhus, BRICS, DK-8000 Aarhus C, Denmark
[3] IBM Corp, TJ Watson Res Ctr, Armonk, NY 10504 USA
来源
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We consider verifiable secret sharing (VSS) and multiparty computation (MPC) in the secure-channels model, where a broadcast channel is given and a non-zero error probability is allowed. In this model Rabin and Ben-Or proposed VSS and MPC protocols secure against an adversary that can corrupt any minority of the players. In this paper, we first observe that a, subprotocol of theirs, known as weak secret sharing (WSS), is not secure against an adaptive adversary, contrary to what was believed earlier. We then propose new and adaptively secure protocols for WSS, VSS and MPC that are substantially more efficient than the original ones. Our protocols generalize easily to provide security against general Q(2)-adversaries.
引用
收藏
页码:311 / 326
页数:16
相关论文
共 50 条
  • [1] Secure Multiparty Computations on Bitcoin
    Andrychowicz, Marcin
    Dziembowski, Stefan
    Malinowski, Daniel
    Mazurek, Lukasz
    [J]. COMMUNICATIONS OF THE ACM, 2016, 59 (04) : 76 - 84
  • [2] Secure Multiparty Computations on Bitcoin
    Andrychowicz, Marcin
    Dziembowski, Stefan
    Malinowski, Daniel
    Mazurek, Lukasz
    [J]. 2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, : 443 - 458
  • [3] Efficient and Secure Multiparty Computations Using a Standard Deck of Playing Cards
    Mizuki, Takaaki
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2016, 2016, 10052 : 484 - 499
  • [4] Secure multiparty computations without computers
    Niemi, V
    Renvall, A
    [J]. THEORETICAL COMPUTER SCIENCE, 1998, 191 (1-2) : 173 - 183
  • [5] Editorial: Multiparty secure quantum and semiquantum computations
    Ye, Tianyu
    [J]. FRONTIERS IN PHYSICS, 2023, 11
  • [6] Secure multiparty computations using a dial lock
    Mizuki, Takaaki
    Kugimoto, Yoshinori
    Sone, Hideaki
    [J]. THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2007, 4484 : 499 - +
  • [7] Distributed Certificateless Key Encapsulation Mechanism Secure Against the Adaptive Adversary
    龙宇
    李祥学
    陈克非
    洪璇
    [J]. Journal of Shanghai Jiaotong University(Science), 2009, 14 (01) : 102 - 106
  • [8] Distributed certificateless key encapsulation mechanism secure against the adaptive adversary
    Long Y.
    Li X.-X.
    Chen K.-F.
    Hong X.
    [J]. Journal of Shanghai Jiaotong University (Science), 2009, 14 (1) : 102 - 106
  • [9] Achieving Secure and Differentially Private Computations in Multiparty Settings
    Acar, Abbas
    Celik, Z. Berkay
    Aksu, Hidayet
    Uluagac, A. Selcuk
    McDaniel, Patrick
    [J]. 2017 1ST IEEE SYMPOSIUM ON PRIVACY-AWARE COMPUTING (PAC), 2017, : 49 - 59
  • [10] Secure multiparty computations in floating-point arithmetic
    Guo, Chuan
    Hannun, Awni
    Knott, Brian
    van der Maaten, Laurens
    Tygert, Mark
    Zhu, Ruiyu
    [J]. INFORMATION AND INFERENCE-A JOURNAL OF THE IMA, 2022, 11 (01) : 103 - 135