Efficient Multiparty Computations Secure Against an Adaptive Adversary
@inproceedings{Cramer1999EfficientMC, title={Efficient Multiparty Computations Secure Against an Adaptive Adversary}, author={R. Cramer and I. Damg{\aa}rd and Stefan Dziembowski and M. Hirt and T. Rabin}, booktitle={EUROCRYPT}, year={1999} }
We consider verifiable secret sharing (VSS) and multiparty computation (MPC) in the secure-channels model, where a broadcast channel is given and a non-zero error probability is allowed. In this model Rabin and Ben-Or proposed VSS and MPC protocols secure against an adversary that can corrupt any minority of the players. In this paper, we first observe that a subprotocol of theirs, known as weak secret sharing (WSS), is not secure against an adaptive adversary, contrary to what was believed… CONTINUE READING
Topics from this paper
215 Citations
Adaptively Secure Threshold Signature Scheme in the Standard Model
- Mathematics, Computer Science
- Informatica
- 2009
- 8
- PDF
On the complexity of verifiable secret sharing and multiparty computation
- Mathematics, Computer Science
- STOC '00
- 2000
- 62
- PDF
Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority
- Computer Science, Mathematics
- CRYPTO
- 2012
- 76
- PDF
Probabilistic Verifiable Secret Sharing Tolerating Adaptive Adversary
- Computer Science
- IACR Cryptol. ePrint Arch.
- 2008
- 1
General Secure Multi-party Computation from any Linear Secret-Sharing Scheme
- Computer Science, Mathematics
- EUROCRYPT
- 2000
- 456
- PDF
Hybrid-secure MPC: trading information-theoretic robustness for computational privacy
- Computer Science
- IACR Cryptol. ePrint Arch.
- 2009
- 15
- PDF
Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience
- Computer Science
- INDOCRYPT
- 2009
- 9
- Highly Influenced
References
SHOWING 1-10 OF 29 REFERENCES
Multiparty computation unconditionally secure against Q^2 adversary structures
- Computer Science
- ArXiv
- 1999
- 7
- PDF
General Secure Multi-party Computation from any Linear Secret-Sharing Scheme
- Computer Science, Mathematics
- EUROCRYPT
- 2000
- 456
- PDF
Cryptographic Protocols Provably Secure Against Dynamic Adversaries
- Computer Science
- EUROCRYPT
- 1992
- 137
- PDF
Verifiable secret sharing and multiparty protocols with honest majority
- Computer Science
- STOC '89
- 1989
- 959
- PDF
Security and Composition of Multiparty Cryptographic Protocols
- Computer Science, Mathematics
- Journal of Cryptology
- 2000
- 1,151
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
- Computer Science
- PODC '98
- 1998
- 446
Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract)
- Computer Science
- PODC '97
- 1997
- 187
- PDF