【24h】

Adaptively Secure Broadcast, Revisited

机译:再探自适应安全广播

获取原文
获取原文并翻译 | 示例

摘要

We consider the classical problem of synchronous broadcast with dishonest majority, when a public-key infrastructure and digital signatures are available. In a surprising result, Hirt and Zikas (Eurocrypt 2010) recently observed that all existing protocols for this task are insecure against an adaptive adversary who can choose which parties to corrupt as the protocol progresses. Moreover, they prove an impossibility result for adaptively secure broadcast in their setting. We argue that the communication model adopted by Hirt and Zikas is unrealistically pessimistic. We revisit the problem of adaptively secure broadcast in a more natural synchronous model (with rushing), and show that broadcast is possible in this setting for an arbitrary number of corruptions. Our positive result holds under a strong, simulation-based definition in the universal-composability framework. We also study the impact of adaptive attacks on protocols for secure multi-party computation where broadcast is used as a sub-routine.
机译:当公共密钥基础结构和数字签名可用时,我们考虑不诚实的多数同步广播的经典问题。令人惊讶的结果是,Hirt和Zikas(Eurocrypt 2010)最近观察到,针对该任务的所有现有协议对于适应性对手都是不安全的,后者可以随着协议的发展选择要破坏哪一方。此外,他们证明了在其设置中无法进行自适应安全广播的结果。我们认为,希特和齐卡斯所采用的沟通模式是不切实际的悲观主义。我们以更自然的同步模型(加急)重新审视了自适应安全广播的问题,并显示了在这种设置下可以进行任意数量的损坏广播。我们的积极结果在通用组合框架中基于模拟的强大定义下得以保持。我们还研究了自适应攻击对将广播用作子例程的安全多方计算协议的影响。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号