2004
DOI: 10.1007/978-3-540-28628-8_34
|View full text |Cite
|
Sign up to set email alerts
|

Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness

Abstract: Abstract. Unconditionally secure multi-party computations in general, and broadcast in particular, are impossible if any third of the players can be actively corrupted and if no additional information-theoretic primitive is given. In this paper, we relativize this pessimistic result by showing that such a primitive can be as simple as noisy communication channels between the players or weakly correlated pieces of information. We consider the scenario where three players have access to random variables X, Y , a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
18
0

Year Published

2005
2005
2023
2023

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 20 publications
(18 citation statements)
references
References 26 publications
0
18
0
Order By: Relevance
“…This area has a rich history (see [35,36,21,28,5,22,40] and references therein). However, most of the work in this area has been restricted to the two-party setting, and known results for the multi-party setting are not general enough to apply to the case of the anonymity functionality.…”
Section: Related Workmentioning
confidence: 99%
“…This area has a rich history (see [35,36,21,28,5,22,40] and references therein). However, most of the work in this area has been restricted to the two-party setting, and known results for the multi-party setting are not general enough to apply to the case of the anonymity functionality.…”
Section: Related Workmentioning
confidence: 99%
“…The type of correlated randomness needed for realizing multiparty computation with unconditional security in the presence of an honest majority is studied in [17,18]. Statistically secure commitment protocol from correlated randomness are constructed in [31].…”
Section: Related Workmentioning
confidence: 99%
“…In the context of cryptography, the notions have first been used in [10], [12], [18]. Both notions have appeared previously in other information-theoretic contexts [11], the latter under the name of sufficient statistics.…”
Section: Preliminaries: Common and Dependent Partsmentioning
confidence: 99%