Cmsc 858k — Advanced Topics in Cryptography

نویسندگان

  • Jeffrey Blank
  • Chiu Yuen Koo
  • Nikolai Yakovenko
چکیده

In this lecture, we study the Byzantine Agreement problem, defined as follows: consider a network of n processors, where each pair of processors can communicate (this is the so-called “point-to-point” model). Furthermore, at most t processors within this network may be faulty; a faulty processor may exhibit arbitrary behavior. (We also assume that the behavior of these faulty processors may be coordinated by a single adversary, and sometimes do not place any computational restrictions on this adversary.) Initially, each processor has an input value pi; this group of processors then runs a protocol which results in each (non-faulty) processor deciding on a value p∗i . Besides requiring that the protocol terminate, a Byzantine agreement protocol also satisfies the following (as long as no more than t processors are faulty):

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cmsc 858k — Advanced Topics in Cryptography

In a previous class (Lecture 25), we showed how to construct an identification scheme which is secure against a passive adversary using an Honest-Verifier Zero-Knowledge Proof of Knowledge (HVZK-PoK). We also showed that it is possible to construct an Identification Scheme secure against an active adversary using a Witness Indistinguishable Proof of Knowledge (WI-PoK). In this lecture, we will ...

متن کامل

Cmsc 858k — Advanced Topics in Cryptography

In a previous lecture, we saw how to construct a three-round zero-knowledge (ZK) proof system for graph 3-colorability with soundness error 1 − 1/ |E| on a common input G = (V,E). The soundness error can be made negligible, while maintaining zero knowledge, by repeating the protocol |E| · ω(log k) times sequentially (where k is the security parameter); unfortunately, this increases the round co...

متن کامل

Cmsc 858k — Advanced Topics in Cryptography Lecture 24

ZK proofs. Zero-knowledge proofs involve a prover P trying to prove a statement to a verifier V without revealing any knowledge beyond the fact that the statement is true. For example, consider the problem of proving membership in an NP language L, (e.g., graph Hamiltonicity, 3-coloring, etc.). A ZK proof protects against a cheating prover, in the sense that if a prover tries to give a proof fo...

متن کامل

Proofs in Cryptography∗

We give a brief overview of proofs in cryptography at a beginners level. We briefly cover a general way to look at proofs in cryptography and briefly compare the requirements to traditional reductions in computer science. We then look at two security paradigms, indistinguishability and simulation based security. We also describe the security models for Secret Key and Public Key systems with app...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004