Proceedings of the Twenty-First Annual ACM Symposium on Theory of Computing - STOC '89 1989
DOI: 10.1145/73007.73014
|View full text |Cite
|
Sign up to set email alerts
|

Verifiable secret sharing and multiparty protocols with honest majority

Abstract: Under the assumption that each participant can broadcast a message to all other participants and that each pair of participants can communicate secretly, we present a verifiable secret sharing protocol, and show that any multiparty protocol, or game with incomplete information, can be achieved if a majority of the players are honest. The secrecy achieved is unconditional and does not rely on any assumption about computational intractability. Applications of these results to Byzantine Agreement are also present… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
491
0
1

Year Published

1996
1996
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 713 publications
(499 citation statements)
references
References 9 publications
2
491
0
1
Order By: Relevance
“…We consider statistical security (since, as mentioned above, perfect security is unachievable in this setting), and let κ denote the error parameter, κ ≥ 2n. [RB89] is a triple of protocols (ICSetup, ICValidate, ICReveal) which achieves a limited signature-like functionality for three players: a dealer D, intermediary I, and receiver R. D holds as input a secret s ∈ F, which he passes to I in ICSetup. ICValidate insures that even if D cheats, I knows a value which R will accept.…”
Section: Model Definitions and Toolsmentioning
confidence: 99%
See 2 more Smart Citations
“…We consider statistical security (since, as mentioned above, perfect security is unachievable in this setting), and let κ denote the error parameter, κ ≥ 2n. [RB89] is a triple of protocols (ICSetup, ICValidate, ICReveal) which achieves a limited signature-like functionality for three players: a dealer D, intermediary I, and receiver R. D holds as input a secret s ∈ F, which he passes to I in ICSetup. ICValidate insures that even if D cheats, I knows a value which R will accept.…”
Section: Model Definitions and Toolsmentioning
confidence: 99%
“…This is the first linear VSS protocol enjoying such a small number of broadcast rounds without trusted setup, while running in an overall constant number of rounds. We first obtain a (3, 0)-broadcast, (9, 1)-round protocol which, at a high level, is inspired by the ((7, 0)-broadcast) protocol in [RB89]; we then apply a moderated-protocol transformation to shave off one additional broadcast round.…”
Section: A Broadcast-and Round-efficient Vss Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…Over the last three decades, active research has been carried out in this area and many interesting and significant results have been obtained dealing with high efficiency, security against general adversaries, security against mixed type of corruptions, long-term security, provable security, etc (see [18,24,9,17,41,20,10,16,42,26,28,32,35,4,6] and their references). However, almost all these solutions are for the synchronous model, where it is assumed that every message in the network is delayed by a given constant.…”
Section: Verifiable Secret Sharing (Vss)mentioning
confidence: 99%
“…Moreover, if the model is augmented with a broadcast primitive, an active adversary can be tolerated who corrupts fewer than a 1/2-fraction of the players, at the cost of introducing non-zero yet negligible error probabilities [32]. For VSS it is required that the underlying LSSS is n − t-accepting and for secure multiplication the LSSS is required to satisfy the multiplication property.…”
Section: It Is Quasi-threshold (With a 2g Gap) This Means That A Tnmentioning
confidence: 99%