首页> 外文期刊>Journal of Cryptology >Almost-Everywhere Secure Computation with Edge Corruptions
【24h】

Almost-Everywhere Secure Computation with Edge Corruptions

机译:几乎所有地方的边缘损坏安全计算

获取原文
获取原文并翻译 | 示例
           

摘要

We consider secure multi-party computation (MPC) in a setting where the adversary can separately corrupt not only the parties (nodes) but also the communication channels (edges), and can furthermore choose selectively and adaptively which edges or nodes to corrupt. Note that if an adversary corrupts an edge, even if the two nodes that share that edge are honest, the adversary can control the link and thus deliver wrong messages to both players. We consider this question in the information-theoretic setting, and require security against a computationally unbounded adversary.
机译:我们认为,在这样的环境中,安全的多方计算(MPC):对手不仅可以分别破坏各方(节点),而且可以分别破坏通信渠道(边缘),并且可以选择性地和自适应地选择要破坏的边或节点。请注意,如果对手破坏了一条优势,即使共享该优势的两个节点都是诚实的,那么敌方也可以控制链接,从而向两个玩家传递错误消息。我们在信息理论上考虑这个问题,并要求对计算上不受限制的对手采取安全措施。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号