Header menu link for other important links
X
Asynchronous perfectly secure computation tolerating generalized adversaries
Chandrasekharan Pandu Rangan
Published in Springer Verlag
2002
Volume: 2384
   
Pages: 497 - 511
Abstract
We initiate the study of perfectly secure multiparty computation over asynchronous networks tolerating generalized adversaries. The classical results in information-theoretically secure asynchronous multiparty computation among n players state that less than (formula presented) active adversaries can be tolerated in the perfect setting [4]. Strictly generalizing these results to the non-threshold setting, we show that perfectly secure asynchronous multiparty computation among n players tolerating the adversary structure A is possible if and only if the union of no four sets in the adversary structure cover the full set of players. The computation and communication complexities of the presented protocols are polynomial in the size of the maximal basis of the adversary structure. Our results generalize the results of [16,10] to the asynchronous setting. Furthermore, when restricted to the threshold setting, the protocols of this paper result in solutions as good as the best known asynchronous threshold protocols for the perfect setting. Incidentally, the problems of designing efficient asynchronous secure protocols and adapting the efficiency improvement techniques of the threshold setting to the nonthreshold setting were mentioned as open in [18,17]. © Springer-Verlag Berlin Heidelberg 2002.
About the journal
JournalData powered by TypesetLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
PublisherData powered by TypesetSpringer Verlag
ISSN03029743
Open AccessNo
Concepts (11)
  •  related image
    Information theory
  •  related image
    Security of data
  •  related image
    ADVERSARY STRUCTURES
  •  related image
    ASYNCHRONOUS NETWORKS
  •  related image
    Communication complexity
  •  related image
    Efficiency improvement
  •  related image
    MULTIPARTY COMPUTATION
  •  related image
    Secure computation
  •  related image
    Secure multi-party computation
  •  related image
    THRESHOLD SETTING
  •  related image
    Cryptography