TY - GEN
T1 - Characterization of secure multiparty computation without broadcast
AU - Cohen, Ran
AU - Haitner, Iftach
AU - Omri, Eran
AU - Rotem, Lior
N1 - Publisher Copyright:
© International Association for Cryptologic Research 2016.
PY - 2016
Y1 - 2016
N2 - A major challenge in the study of cryptography is characterizing the necessary and sufficient assumptions required to carry out a given cryptographic task. The focus of this work is the necessity of a broadcast channel for securely computing symmetric functionalities (where all the parties receive the same output) when one third of the parties, or more, might be corrupted. Assuming all parties are connected via a peer-to-peer network, but no broadcast channel (nor a secure setup phase) is available, we prove the following characterization: A symmetric n-party functionality can be securely computed facing n/3≤t
AB - A major challenge in the study of cryptography is characterizing the necessary and sufficient assumptions required to carry out a given cryptographic task. The focus of this work is the necessity of a broadcast channel for securely computing symmetric functionalities (where all the parties receive the same output) when one third of the parties, or more, might be corrupted. Assuming all parties are connected via a peer-to-peer network, but no broadcast channel (nor a secure setup phase) is available, we prove the following characterization: A symmetric n-party functionality can be securely computed facing n/3≤t
KW - Broadcast
KW - Coin flipping
KW - Fairness
KW - Impossibility result
KW - Multiparty computation
KW - Point-to-point communication
UR - http://www.scopus.com/inward/record.url?scp=84952700772&partnerID=8YFLogxK
U2 - 10.1007/978-3-662-49096-9_25
DO - 10.1007/978-3-662-49096-9_25
M3 - ???researchoutput.researchoutputtypes.contributiontobookanthology.conference???
AN - SCOPUS:84952700772
SN - 9783662490952
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 596
EP - 616
BT - Theory of Cryptography - 13th International Conference, TCC 2016-A, Proceedings
A2 - Kushilevitz, Eyal
A2 - Malkin, Tal
T2 - 13th International Conference on Theory of Cryptography, TCC 2016
Y2 - 10 January 2016 through 13 January 2016
ER -