2010
DOI: 10.1007/978-3-642-13190-5_24
|View full text |Cite
|
Sign up to set email alerts
|

Adaptively Secure Broadcast

Abstract: Abstract.A broadcast protocol allows a sender to distribute a message through a point-to-point network to a set of parties, such that (i) all parties receive the same message, even if the sender is corrupted, and (ii) this is the sender's message, if he is honest. Broadcast protocols satisfying these properties are known to exist if and only if t < n/3, where n denotes the total number of parties, and t denotes the maximal number of corruptions. When a setup allowing signatures is available to the parties, the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 42 publications
(31 citation statements)
references
References 33 publications
0
31
0
Order By: Relevance
“…We stress that our model is different from that considered by Hirt and Zikas [11], where in each round the honest parties' messages are first delivered to the corrupted parties only and then the adversary is allowed to corrupt additional parties and decide what messages to send on behalf of those parties to other honest players. In contrast, we assume that honest parties' messages are delivered "atomically", which is equivalent to assuming that adversarial corruption cannot occur in the time interval between when a message is sent and when it is received.…”
Section: Preliminaries 21 Network Modelmentioning
confidence: 99%
See 4 more Smart Citations
“…We stress that our model is different from that considered by Hirt and Zikas [11], where in each round the honest parties' messages are first delivered to the corrupted parties only and then the adversary is allowed to corrupt additional parties and decide what messages to send on behalf of those parties to other honest players. In contrast, we assume that honest parties' messages are delivered "atomically", which is equivalent to assuming that adversarial corruption cannot occur in the time interval between when a message is sent and when it is received.…”
Section: Preliminaries 21 Network Modelmentioning
confidence: 99%
“…(I.e., our definition does not guarantee secrecy for m; note that this only makes a difference when S corrupts no parties.) Our definition of relaxed broadcast is from [11].…”
Section: Functionality F Bcmentioning
confidence: 99%
See 3 more Smart Citations