2019
DOI: 10.1007/978-3-030-34578-5_17
|View full text |Cite
|
Sign up to set email alerts
|

Beyond Honest Majority: The Round Complexity of Fair and Robust Multi-party Computation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 36 publications
0
5
0
Order By: Relevance
“…1]) excluded security with unanimous abort for the case of an honest majority, but only for protocols that are defined in the plain model, without any trusted setup assumptions. Indeed, as pointed out by the authors in [62], their proof technique does not extend to the setting with private-coin setup. In more detail, and to illustrate the difference, consider the setting where the first round is over broadcast (and possibly point-to-point channels) and the second is over pointto-point.…”
Section: Impossibility Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…1]) excluded security with unanimous abort for the case of an honest majority, but only for protocols that are defined in the plain model, without any trusted setup assumptions. Indeed, as pointed out by the authors in [62], their proof technique does not extend to the setting with private-coin setup. In more detail, and to illustrate the difference, consider the setting where the first round is over broadcast (and possibly point-to-point channels) and the second is over pointto-point.…”
Section: Impossibility Resultsmentioning
confidence: 99%
“…Patra and Ravi [60] showed that in the plain model (without any setup assumptions, such as a PKI) security with unanimous abort cannot be achieved in two point-to-point rounds, and even if the first round can use a broadcast channel. As pointed out in [62], the lower-bounds proofs from [60] do not extend to a setting with private-coins setup. While advancing our understanding of what kind of security can be achieved in two rounds, the picture derived from the results above is only partial and does not resolve the question of whether the feasibility results can be pushed further.…”
Section: Introductionmentioning
confidence: 99%
“…Computational security stands to the assumption that an adversary has limited computing power that prevents him from solving complex mathematical problems. While unconditional security means that the security persists even if the adversary has unlimited computing power [11][12][13][14]. It led Cabello et al [15] to propose two unconditionally secure linear schemes against cheaters, classified as a robust scheme and a secure scheme.…”
Section: Security Analysis Of Sssmentioning
confidence: 99%
“… Patra and Ravi [ 60 ] showed that in the plain model (without any setup assumptions, such as a PKI) security with unanimous abort cannot be achieved in two point-to-point rounds, and even if the first round can use a broadcast channel. As pointed out in [ 62 ], the lower-bounds proofs from [ 60 ] do not extend to a setting with private-coins setup. …”
Section: Introductionmentioning
confidence: 99%
“…1]) excluded security with unanimous abort for the case of an honest majority, but only for protocols that are defined in the plain model, without any trusted setup assumptions. Indeed, as pointed out by the authors in [ 62 ], their proof technique does not extend to the setting with private-coin setup. In more detail, and to illustrate the difference, consider the setting where the first round is over broadcast (and possibly point-to-point channels) and the second is over point-to-point.…”
Section: Introductionmentioning
confidence: 99%