Second Summary Report on Multiparty Protocols Second Summary Report on Multiparty Protocols

نویسنده

  • Ahmad - Reza Sadeghi
چکیده

Project co-funded by the European Commission within the 6th Framework Programme Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission services) RE Restricted to a group specified by the consortium (including the Commission services) CO Confidential, only for members of the consortium (including the Commission services) The information in this document is provided as is, and no warranty is given or implied that the information is fit for any particular purpose. The user thereof uses the information at its sole risk and liability. Abstract This report summarizes the state of the art and open problems in the area of secure multiparty protocols. The report is divided into three chapters. The first chapter briefly discusses some common (mostly cryptographic) primitives used in multiparty protocols, namely broadcast channels, secret sharing, and threshold cryptography. Our current knowledge in these areas is summarized. The remaining chapters then continue with the presentation of some specifically active research areas in secure multiparty computation, and states important open problems in each of these areas. Here, the second chapter treats generic protocols for secure multi-party computation, while the third chapter considers several practical scenarios and specific protocols in these cases.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

First Summary Report on Multiparty Protocols

Project co-funded by the European Commission within the 6th Framework Programme Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission services) RE Restricted to a group specified by the consortium (including the Commission services) CO Confidential, only for members of the consortium (including the Commission services) The information in this do...

متن کامل

Secure Multiparty Computation Goes Live

In this note, we report on the first large-scale and practical application of multiparty computation, which took place in January 2008. We also report on the novel cryptographic protocols that were used.

متن کامل

Second Summary Report on Two-party Protocols Second Summary Report on Two-party Protocols

This report focuses on secure two-party protocols. We consider different notions of security and discuss the most attractive models and set-up assumptions (e.g., random oracle, common reference string, bare public keys, trusted computing base) that have been proposed so far. We consider many popular two-party games (e.g., zero-knowledge proof systems, commitment schemes, oblivious transfer, fai...

متن کامل

More Robust Multiparty Protocols with Oblivious Transfer

With oblivious transfer multiparty protocols become possible even in the presence of a faulty majority. But all known protocols can be aborted by just one disruptor. This paper presents more robust solutions for multiparty protocols with oblivious transfer. This additional robustness against disruptors weakens the security of the protocol and the guarantee that the result is correct. We can obs...

متن کامل

Efficient and Secure Multiparty Computations Using a Standard Deck of Playing Cards

It is known that secure multiparty computation can be performed using physical cards with identical backs, and numerous cardbased cryptographic protocols have been proposed. Almost all existing protocols require multiple cards that have the same pattern on their face sides; thus, a standard deck of playing cards cannot be used for executing these protocols. However, there is one exception: Niem...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006