An error in the mixed adversary protocol by Fitzi, Hirt and Maurer

نویسنده

  • Ivan Damgård
چکیده

We point out an error in the protocol for mixed adversaries and zero error from the Crypto 98 paper by Fitzi, Hirt and Maurer. We show that the protocol only works under a stronger requirement on the adversary than the one claimed. Hence the bound on the adversary’s corruption capability given there is not tight. Subsequent work has shown, however, a new bound which is indeed tight.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Eecient Byzantine Agreement Secure against General Adversaries ?

This paper presents protocols for Byzantine agreement, i.e. for reliable broadcast, among a set of n players, some of which may be controlled by an adversary. It is well-known that Byzantine agreement is possible if and only if the number of cheaters is less than n=3. In this paper we consider a general adversary that is speciied by a set of subsets of the player set (the adversary structure), ...

متن کامل

Efficient Byzantine Agreement Secure Against General Adversaries

This paper presents protocols for Byzantine agreement, i.e. for reliable broadcast, among a set of n players, some of which may be controlled by an adversary. It is well-known that Byzantine agreement is possible if and only if the number of cheaters is less than n=3. In this paper we consider a general adversary that is speciied by a set of subsets of the player set (the adversary structure), ...

متن کامل

General Adversaries in Unconditional Multi-party Computation

We consider a generalized adversary model for unconditionally secure multi-party computation. The adversary can actively corrupt (i.e. take full control over) a subset D P of the players, and, additionally , can passively corrupt (i.e. read the entire information of) another subset E P of the players. The adversary is characterized by a generalized adversary structure, i.e. a set of pairs (D; E...

متن کامل

Multi-Party Computation with Omnipresent Adversary

Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P1, . . . , Pn, each with their own private input xi, to compute a function Y = F (x1, . . . , xn), such that at the end of the protocol, all participants learn the correct value of Y , while secrecy of the private inputs is maintained. Classical results in the unconditionally secure MPC indicate ...

متن کامل

MPC vs. SFE: Perfect Security in a Unified Corruption Model

Secure function evaluation (SFE) allows a set of players to compute an arbitrary agreed function of their private inputs, even if an adversary may corrupt some of the players. Secure multi-party computation (MPC) is a generalization allowing to perform an arbitrary on-going (also called reactive or stateful) computation during which players can receive outputs and provide new inputs at intermed...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 1999  شماره 

صفحات  -

تاریخ انتشار 1999