2022
DOI: 10.1007/s00446-021-00416-4
|View full text |Cite
|
Sign up to set email alerts
|

Revisiting asynchronous fault tolerant computation with optimal resilience

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(13 citation statements)
references
References 13 publications
0
13
0
Order By: Relevance
“…Hence, the strong-commitment of AVSS guarantees that if D is corrupt and if some honest party obtains a point on D's polynomial, then all honest parties eventually obtain their respective points on this polynomial. Perfectly-secure AVSS is possible iff t < n/4 [13,4].…”
Section: Technical Overviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Hence, the strong-commitment of AVSS guarantees that if D is corrupt and if some honest party obtains a point on D's polynomial, then all honest parties eventually obtain their respective points on this polynomial. Perfectly-secure AVSS is possible iff t < n/4 [13,4].…”
Section: Technical Overviewmentioning
confidence: 99%
“…It is precisely for this reason that Π SWPS fails to qualify as a VSS. 4), the parties first run Π SWPS assuming a synchronous network, where Π BC is used to make any value public by setting t = t s . If D is honest then in a synchronous network, the first, second, third and fourth phase of Π SWPS would have been over by time ∆, 2∆, 2∆ + T BC and 2∆ + 2T BC respectively and by time 2∆+2T BC , the parties should have accepted (W, E, F).…”
Section: The Best-of-both-worlds Weak Polynomial-sharing (Wps) Protocolmentioning
confidence: 99%
“…In the general-adversary model, MPC with perfect and statistical security is achievable iff Z satisfies the Q (3) (P, Z) and Q (2) (P, Z) conditions respectively. 1 In terms of efficiency, MPC protocols against general adversaries are less efficient than those against threshold adversaries, by several orders of magnitude. Protocols against threshold adversaries typically incur a communication of n O (1) bits per multiplication, compared to |Z| O (1) bits per multiplication required against general adversaries.…”
Section: Introductionmentioning
confidence: 99%
“…1 In terms of efficiency, MPC protocols against general adversaries are less efficient than those against threshold adversaries, by several orders of magnitude. Protocols against threshold adversaries typically incur a communication of n O (1) bits per multiplication, compared to |Z| O (1) bits per multiplication required against general adversaries. 2 Since |Z| could be exponentially large in n, the exact exponent is very important.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation