首页> 外文期刊>Journal of Cryptology >A Full Proof of the BGW Protocol for Perfectly Secure Multiparty Computation
【24h】

A Full Proof of the BGW Protocol for Perfectly Secure Multiparty Computation

机译:完全安全的多方计算的BGW协议的完整证明

获取原文
           

摘要

In the setting of secure multiparty computation, a set of n parties with private inputs wish to jointly compute some functionality of their inputs. One of the most fundamental results of secure computation was presented by Ben-Or, Goldwasser, and Wigderson (BGW) in 1988. They demonstrated that any n-party functionality can be computed with perfect security, in the private channels model. When the adversary is semi-honest, this holds as long as parties are corrupted, and when the adversary is malicious, this holds as long as parties are corrupted. Unfortunately, a full proof of these results was never published. In this paper, we remedy this situation and provide a full proof of security of the BGW protocol. This includes a full description of the protocol for the malicious setting, including the construction of a new subprotocol for the perfect multiplication protocol that seems necessary for the case of n/4 <= t < n/3.
机译:在安全多方计算的设置中,一组具有私人输入的n个参与者希望共同计算其输入的某些功能。安全计算的最基本结果之一是Ben-Or,Goldwasser和Wigderson(BGW)于1988年提出的。他们证明,在私有通道模型中,任何n方功能都可以以完美的安全性进行计算。当对手是半诚实者时,只要各方被破坏,这种情况就成立;而当对手是恶意者时,只要各方被破坏,这种情况就成立。不幸的是,这些结果的完整证据从未公布。在本文中,我们将纠正这种情况,并提供BGW协议安全性的完整证明。这包括对恶意设置协议的完整描述,包括为完美的乘法协议构建新的子协议,这对于n / 4 <= t

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号