2006
DOI: 10.1007/11681878_26
|View full text |Cite
|
Sign up to set email alerts
|

Secure Computation with Partial Message Loss

Abstract: Abstract. Existing communication models for multiparty computation (MPC) either assume that all messages are delivered eventually or any message can be lost. Under the former assumption, MPC protocols guaranteeing output delivery are known. However, this assumption may not hold in some network settings like the Internet where messages can be lost due to denial of service attack or heavy network congestion. On the other hand, the latter assumption may be too conservative. Known MPC protocols developed under thi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 25 publications
0
6
0
Order By: Relevance
“…In fact our impossibility result is inherent in any setting where we have a threshold adversary with active (or even just passive) and receive-omission corruption, simultaneously. In particular it also applies to the (nonadaptive) case of active and full-omission corruption [Koo06]. 8 The idea is the following: the adversary might, with non-zero probability, corrupt the player p i who is the first (or among the first) to get the output, e.g., by randomly choosing whom to corrupt.…”
Section: Security Definitionmentioning
confidence: 99%
See 4 more Smart Citations
“…In fact our impossibility result is inherent in any setting where we have a threshold adversary with active (or even just passive) and receive-omission corruption, simultaneously. In particular it also applies to the (nonadaptive) case of active and full-omission corruption [Koo06]. 8 The idea is the following: the adversary might, with non-zero probability, corrupt the player p i who is the first (or among the first) to get the output, e.g., by randomly choosing whom to corrupt.…”
Section: Security Definitionmentioning
confidence: 99%
“…A source of difficulties in designing protocols tolerating both active cheaters and omissions is that a player p j who receives ⊥ when expecting a message from a player p i cannot decide whether p i is send-omission or actively corrupted, or himself (i.e., p j ) is receive-omission corrupted. In [Koo06] the following straight-forward approach was taken in order to overcome this difficulty in the context of p i sharing a secret: Every player complains when he received no share from the dealer p i . If more players complain than the number of potentially corrupted players, p i is disqualified.…”
Section: Engineering the Network -Authenticated Channelsmentioning
confidence: 99%
See 3 more Smart Citations