Proceedings of the 2014 ACM Symposium on Principles of Distributed Computing 2014
DOI: 10.1145/2611462.2611490
|View full text |Cite
|
Sign up to set email alerts
|

Asynchronous MPC with a strict honest majority using non-equivocation

Abstract: Multiparty computation (MPC) among n parties can tolerate up to t < n/2 active corruptions in a synchronous communication setting; however, in an asynchronous communication setting, the resiliency bound decreases to only t < n/3 active corruptions. We improve the resiliency bound for asynchronous MPC (AMPC) to match synchronous MPC using non-equivocation.Non-equivocation is a message authentication mechanism to restrict a corrupted sender from making conflicting statements to different (honest) parties. It can… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 40 publications
(47 reference statements)
0
8
0
Order By: Relevance
“…Some works try to achieve similar goals but consider a different problem. In the case of the exact Byzantine consensus problem, [15], [16], [5], [6], [4] have studied the power of non-equivocation. By using transferable authentication and non-equivocation, [15] succeeds to transform any protocol that works under the crash model into a protocol that tolerates Byzantine failures without increasing the number of nodes.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Some works try to achieve similar goals but consider a different problem. In the case of the exact Byzantine consensus problem, [15], [16], [5], [6], [4] have studied the power of non-equivocation. By using transferable authentication and non-equivocation, [15] succeeds to transform any protocol that works under the crash model into a protocol that tolerates Byzantine failures without increasing the number of nodes.…”
Section: Related Workmentioning
confidence: 99%
“…By using transferable authentication and non-equivocation, [15] succeeds to transform any protocol that works under the crash model into a protocol that tolerates Byzantine failures without increasing the number of nodes. Based on the same methodology, in [16], the resiliency bound for asynchronous multiparty computation is improved to n ≥ 2f + 1. Recently, uniform hyperedges [5], [6], [4] have been considered to restrict equivocation.…”
Section: Related Workmentioning
confidence: 99%
“…Alternatively, one can assume a constant number of synchronous communication rounds after the synchronization point and run constant expected round synchronous agreement protocols [31]. -Non-equivocation Mechanism: In [18,2] it is shown how to design agreement protocols with t < n/2 in an asynchronous setting, provided there is a mechanism to enforce "non-equivocation". On a very high level, such a mechanism prevents a corrupted party to transmit conflicting messages to honest parties; however a corrupted party may send messages to certain number of parties and decide not to communicate to the rest of the parties.…”
Section: Realizing F Prep With Abort In the Partial Synchronous Setmentioning
confidence: 99%
“…So such a mechanism is strictly weaker than the broadcast primitive. In [18,2] it is also discussed how such a non-equivocation mechanism can be securely realized assuming a trusted hardware module with each party. One can use such a non-equivocation mechanism to agree about the status of Π PREP .…”
Section: Realizing F Prep With Abort In the Partial Synchronous Setmentioning
confidence: 99%
“…An edge (or link) capacity α ij for a link (i, j) ∈ E is computed as α ij = credit limit ji − balance ij , where balance ij is the balance on the Ripple link and credit limit ji is its capacity. 2 The final step toward obtaining our experiment dataset consisted of carrying out every transaction t ∈ T using the maxflow algorithm to find all possible paths between sender and receiver in G. If t can be successfully carried out, it is added to T . Therefore, our experiment dataset is composed of the graph G and the transaction set T .…”
Section: )mentioning
confidence: 99%