Using non-interactive proofs to achieve independence e ciently and securely

نویسنده

  • Rosario Gennaro
چکیده

Independence or simultaneous broadcast is a fundamental tool to achieve security in fault tolerant distributed computing. It allows n players to commit to independently chosen values. In this paper we present a constant round protocol to perform this task. Previous solutions were all O(logn) rounds. In the process we develop a new and stronger formal de nition from this problem. As an example of the importance of independence in distributed protocols, we show an attack on the Sako-Kilian election scheme presented at CRYPTO 94 made possible by the protocol failure on achieving independence. Using our techniques we will show how to modify the scheme to make it secure.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using Non-interactive Proofs to Achieve Independence Eeciently and Securely

Independence or simultaneous broadcast is a fundamental tool to achieve security in fault tolerant distributed computing. It allows n players to commit to independently chosen values. In this paper we present a constant round protocol to perform this task. Previous solutions were all O(log n) rounds. In the process we develop a new and stronger formal deenition from this problem. As an example ...

متن کامل

e-Learning Theories with Emphasis on Independence Theory

Introduction: The basis of distance learning rests on the independence of the learner. The independent learning-teaching process is an educational system in which each learner is independent and separated from their teacher by time and place. Hence the present study seeks to examine E-learning Theories in general, but focuses on Independence Theory. Methods: The present study was conducte...

متن کامل

Foundations of Non-malleable Hash and One-Way Functions

Non-malleability is an interesting and useful property which ensures that a cryptographic protocol preserves the independence of the underlying values: given for example an encryption E(m) of some unknown message m, it should be hard to transform this ciphertext into some encryption E(m∗) of a related message m∗. This notion has been studied extensively for primitives like encryption, commitmen...

متن کامل

Strategic confrontation within monetary and financial authorities, and foreign exchange market participants in Iran: non-cooperative static games approach

The experience of large fluctuations in the Foreign Exchange Market in Iran and the impact of monetary and fiscal policies on this market revealed the importance of adopting a scientific approach by fiscal and monetary policymakers and paying attention to the behavior of other actors (Foreign Exchange Speculators) in the decision-making. The present study tries to evaluate the Social Loss of ad...

متن کامل

Minimizing Non-interactive Zero-Knowledge Proofs Using Fully Homomorphic Encryption

A non-interactive zero-knowledge proof can be used to demonstrate the truth of a statement without revealing anything else. It has been shown under standard cryptographic assumptions that non-interactive zero-knowledge proofs of membership exist for all languages in NP. However, known non-interactive zero-knowledge proofs of membership of NP-languages yield proofs that are larger than the corre...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1994