Second Summary Report on Multiparty Protocols Second Summary Report on Multiparty Protocols
نویسنده
چکیده
Project co-funded by the European Commission within the 6th Framework Programme Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission services) RE Restricted to a group specified by the consortium (including the Commission services) CO Confidential, only for members of the consortium (including the Commission services) The information in this document is provided as is, and no warranty is given or implied that the information is fit for any particular purpose. The user thereof uses the information at its sole risk and liability. Abstract This report summarizes the state of the art and open problems in the area of secure multiparty protocols. The report is divided into three chapters. The first chapter briefly discusses some common (mostly cryptographic) primitives used in multiparty protocols, namely broadcast channels, secret sharing, and threshold cryptography. Our current knowledge in these areas is summarized. The remaining chapters then continue with the presentation of some specifically active research areas in secure multiparty computation, and states important open problems in each of these areas. Here, the second chapter treats generic protocols for secure multi-party computation, while the third chapter considers several practical scenarios and specific protocols in these cases.
منابع مشابه
First Summary Report on Multiparty Protocols
Project co-funded by the European Commission within the 6th Framework Programme Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission services) RE Restricted to a group specified by the consortium (including the Commission services) CO Confidential, only for members of the consortium (including the Commission services) The information in this do...
متن کاملSecure Multiparty Computation Goes Live
In this note, we report on the first large-scale and practical application of multiparty computation, which took place in January 2008. We also report on the novel cryptographic protocols that were used.
متن کاملSecond Summary Report on Two-party Protocols Second Summary Report on Two-party Protocols
This report focuses on secure two-party protocols. We consider different notions of security and discuss the most attractive models and set-up assumptions (e.g., random oracle, common reference string, bare public keys, trusted computing base) that have been proposed so far. We consider many popular two-party games (e.g., zero-knowledge proof systems, commitment schemes, oblivious transfer, fai...
متن کاملMore Robust Multiparty Protocols with Oblivious Transfer
With oblivious transfer multiparty protocols become possible even in the presence of a faulty majority. But all known protocols can be aborted by just one disruptor. This paper presents more robust solutions for multiparty protocols with oblivious transfer. This additional robustness against disruptors weakens the security of the protocol and the guarantee that the result is correct. We can obs...
متن کاملEfficient and Secure Multiparty Computations Using a Standard Deck of Playing Cards
It is known that secure multiparty computation can be performed using physical cards with identical backs, and numerous cardbased cryptographic protocols have been proposed. Almost all existing protocols require multiple cards that have the same pattern on their face sides; thus, a standard deck of playing cards cannot be used for executing these protocols. However, there is one exception: Niem...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006