DocumentCode :
2092737
Title :
Information theory and secure multi-party computation
Author :
Maurer, UelX Hl
Author_Institution :
Dept. of Comput. Sci., Eidgenossische Tech. Hochschule, Zurich, Switzerland
fYear :
1998
fDate :
22-26 Jun 1998
Firstpage :
152
Lastpage :
153
Abstract :
Two types of generalizations in secure multi-party computation are described. First, we report on a new general adversary model: while previous protocols were designed to tolerate misbehavior of one of two types (active or passive adversaries) the new protocols tolerate mixed types of adversaries, i.e. an adversary that can corrupt players actively, passively, or can let them crash (i.e. stop execution). We derive the necessary and sufficient conditions under which such a general adversary can be tolerated. Second, we present a generic protocol framework that unifies previous approaches achieving unconditional (or information-theoretic) security and cryptographic security (i.e. security based on a cryptographic intractability assumption). This is achieved by introducing secret sharing schemes with an additional property called the multiplication property and a new type of homomorphic commitment scheme, and by generalizing the concept of commitments
Keywords :
cryptography; information theory; protocols; telecommunication security; cryptographic intractability assumption; cryptographic security; general adversary model; generic protocol framework; homomorphic commitment scheme; information theory; multiplication property; protocols; secret sharing schemes; secure multi-party computation; unconditional security; Communication channels; Computational modeling; Computer crashes; Cryptographic protocols; Cryptography; Information security; Information theory; Privacy; Stock markets; Voting;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Theory Workshop, 1998
Conference_Location :
Killarney
Print_ISBN :
0-7803-4408-1
Type :
conf
DOI :
10.1109/ITW.1998.706489
Filename :
706489
Link To Document :
بازگشت