Efficient Multiparty Computations Secure Against an Adaptive Adversary View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

1999-04-15

AUTHORS

Ronald Cramer , Ivan Damgård , Stefan Dziembowski , Martin Hirt , Tal Rabin

ABSTRACT

We consider verifiable secret sharing (VSS) and multiparty computation (MPC) in the secure-channels model, where a broadcast channel is given and a non-zero error probability is allowed. In this model Rabin and Ben-Or proposed VSS and MPC protocols secure against an adversary that can corrupt any minority of the players. In this paper, we first observe that a subprotocol of theirs, known as weak secret sharing (WSS), is not secure against an adaptive adversary, contrary to what was believed earlier. We then propose new and adaptively secure protocols for WSS, VSS and MPC that are substantially more efficient than the original ones. Our protocols generalize easily to provide security against general Q2-adversaries. More... »

PAGES

311-326

Book

TITLE

Advances in Cryptology — EUROCRYPT ’99

ISBN

978-3-540-65889-4
978-3-540-48910-8

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/3-540-48910-x_22

DOI

http://dx.doi.org/10.1007/3-540-48910-x_22

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1041055798


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "ETH, Zurich, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.5801.c", 
          "name": [
            "ETH, Zurich, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Cramer", 
        "givenName": "Ronald", 
        "id": "sg:person.013660213711.14", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013660213711.14"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Aarhus University, BRICS, Switzerland", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Aarhus University, BRICS, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Damg\u00e5rd", 
        "givenName": "Ivan", 
        "id": "sg:person.016521211021.12", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016521211021.12"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Aarhus University, BRICS, Switzerland", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Aarhus University, BRICS, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Dziembowski", 
        "givenName": "Stefan", 
        "id": "sg:person.07521014243.18", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07521014243.18"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "ETH, Zurich, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.5801.c", 
          "name": [
            "ETH, Zurich, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Hirt", 
        "givenName": "Martin", 
        "id": "sg:person.010611500757.30", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010611500757.30"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "IBM T.J.Watson Research Center, Switzerland", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "IBM T.J.Watson Research Center, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Rabin", 
        "givenName": "Tal", 
        "id": "sg:person.015473523512.58", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015473523512.58"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "1999-04-15", 
    "datePublishedReg": "1999-04-15", 
    "description": "We consider verifiable secret sharing (VSS) and multiparty computation (MPC) in the secure-channels model, where a broadcast channel is given and a non-zero error probability is allowed. In this model Rabin and Ben-Or proposed VSS and MPC protocols secure against an adversary that can corrupt any minority of the players. In this paper, we first observe that a subprotocol of theirs, known as weak secret sharing (WSS), is not secure against an adaptive adversary, contrary to what was believed earlier. We then propose new and adaptively secure protocols for WSS, VSS and MPC that are substantially more efficient than the original ones. Our protocols generalize easily to provide security against general Q2-adversaries.", 
    "editor": [
      {
        "familyName": "Stern", 
        "givenName": "Jacques", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/3-540-48910-x_22", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-540-65889-4", 
        "978-3-540-48910-8"
      ], 
      "name": "Advances in Cryptology \u2014 EUROCRYPT \u201999", 
      "type": "Book"
    }, 
    "keywords": [
      "verifiable secret sharing", 
      "multiparty computation", 
      "secret sharing", 
      "adaptive adversary", 
      "Efficient Multiparty Computation", 
      "secure channels model", 
      "non-zero error probability", 
      "secure protocol", 
      "MPC protocols", 
      "adversary", 
      "broadcast channel", 
      "sharing", 
      "original one", 
      "computation", 
      "error probability", 
      "protocol", 
      "security", 
      "subprotocol", 
      "Rabin", 
      "players", 
      "model", 
      "channels", 
      "probability", 
      "one", 
      "Ben", 
      "minority", 
      "paper"
    ], 
    "name": "Efficient Multiparty Computations Secure Against an Adaptive Adversary", 
    "pagination": "311-326", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1041055798"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/3-540-48910-x_22"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/3-540-48910-x_22", 
      "https://app.dimensions.ai/details/publication/pub.1041055798"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-05-10T10:38", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220509/entities/gbq_results/chapter/chapter_138.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/3-540-48910-x_22"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/3-540-48910-x_22'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/3-540-48910-x_22'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/3-540-48910-x_22'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/3-540-48910-x_22'


 

This table displays all metadata directly associated to this object as RDF triples.

120 TRIPLES      23 PREDICATES      52 URIs      45 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/3-540-48910-x_22 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N03c93ad3b493497f88028730fd00a553
4 schema:datePublished 1999-04-15
5 schema:datePublishedReg 1999-04-15
6 schema:description We consider verifiable secret sharing (VSS) and multiparty computation (MPC) in the secure-channels model, where a broadcast channel is given and a non-zero error probability is allowed. In this model Rabin and Ben-Or proposed VSS and MPC protocols secure against an adversary that can corrupt any minority of the players. In this paper, we first observe that a subprotocol of theirs, known as weak secret sharing (WSS), is not secure against an adaptive adversary, contrary to what was believed earlier. We then propose new and adaptively secure protocols for WSS, VSS and MPC that are substantially more efficient than the original ones. Our protocols generalize easily to provide security against general Q2-adversaries.
7 schema:editor N795a9e309b104a868e1864ca85de0140
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf Nbce38b0649d345a9b5e4869037d2fc6f
12 schema:keywords Ben
13 Efficient Multiparty Computation
14 MPC protocols
15 Rabin
16 adaptive adversary
17 adversary
18 broadcast channel
19 channels
20 computation
21 error probability
22 minority
23 model
24 multiparty computation
25 non-zero error probability
26 one
27 original one
28 paper
29 players
30 probability
31 protocol
32 secret sharing
33 secure channels model
34 secure protocol
35 security
36 sharing
37 subprotocol
38 verifiable secret sharing
39 schema:name Efficient Multiparty Computations Secure Against an Adaptive Adversary
40 schema:pagination 311-326
41 schema:productId N797e2a279d0741a88c19f3a48d4c0635
42 N83e7328d00144c81943446e801fb84ed
43 schema:publisher Nc578c18273e543a3acbf64c367ff7731
44 schema:sameAs https://app.dimensions.ai/details/publication/pub.1041055798
45 https://doi.org/10.1007/3-540-48910-x_22
46 schema:sdDatePublished 2022-05-10T10:38
47 schema:sdLicense https://scigraph.springernature.com/explorer/license/
48 schema:sdPublisher N8308e8a0a10741c9a9f307144454aeac
49 schema:url https://doi.org/10.1007/3-540-48910-x_22
50 sgo:license sg:explorer/license/
51 sgo:sdDataset chapters
52 rdf:type schema:Chapter
53 N03c93ad3b493497f88028730fd00a553 rdf:first sg:person.013660213711.14
54 rdf:rest Na644809b7def41bfa7b221fb25ce45bf
55 N047ba25054b342f8badeecb03da06c98 rdf:first sg:person.010611500757.30
56 rdf:rest Nfb82c7c4ee594274af09e3f7cabc96d9
57 N795a9e309b104a868e1864ca85de0140 rdf:first Na22c5954f54946b7b1ee9430c5367ddf
58 rdf:rest rdf:nil
59 N797e2a279d0741a88c19f3a48d4c0635 schema:name doi
60 schema:value 10.1007/3-540-48910-x_22
61 rdf:type schema:PropertyValue
62 N8308e8a0a10741c9a9f307144454aeac schema:name Springer Nature - SN SciGraph project
63 rdf:type schema:Organization
64 N83e7328d00144c81943446e801fb84ed schema:name dimensions_id
65 schema:value pub.1041055798
66 rdf:type schema:PropertyValue
67 Na22c5954f54946b7b1ee9430c5367ddf schema:familyName Stern
68 schema:givenName Jacques
69 rdf:type schema:Person
70 Na644809b7def41bfa7b221fb25ce45bf rdf:first sg:person.016521211021.12
71 rdf:rest Nf241122a58ed41b0a7132a29078b79cd
72 Nbce38b0649d345a9b5e4869037d2fc6f schema:isbn 978-3-540-48910-8
73 978-3-540-65889-4
74 schema:name Advances in Cryptology — EUROCRYPT ’99
75 rdf:type schema:Book
76 Nc578c18273e543a3acbf64c367ff7731 schema:name Springer Nature
77 rdf:type schema:Organisation
78 Nf241122a58ed41b0a7132a29078b79cd rdf:first sg:person.07521014243.18
79 rdf:rest N047ba25054b342f8badeecb03da06c98
80 Nfb82c7c4ee594274af09e3f7cabc96d9 rdf:first sg:person.015473523512.58
81 rdf:rest rdf:nil
82 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
83 schema:name Information and Computing Sciences
84 rdf:type schema:DefinedTerm
85 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
86 schema:name Data Format
87 rdf:type schema:DefinedTerm
88 sg:person.010611500757.30 schema:affiliation grid-institutes:grid.5801.c
89 schema:familyName Hirt
90 schema:givenName Martin
91 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010611500757.30
92 rdf:type schema:Person
93 sg:person.013660213711.14 schema:affiliation grid-institutes:grid.5801.c
94 schema:familyName Cramer
95 schema:givenName Ronald
96 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013660213711.14
97 rdf:type schema:Person
98 sg:person.015473523512.58 schema:affiliation grid-institutes:None
99 schema:familyName Rabin
100 schema:givenName Tal
101 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015473523512.58
102 rdf:type schema:Person
103 sg:person.016521211021.12 schema:affiliation grid-institutes:None
104 schema:familyName Damgård
105 schema:givenName Ivan
106 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016521211021.12
107 rdf:type schema:Person
108 sg:person.07521014243.18 schema:affiliation grid-institutes:None
109 schema:familyName Dziembowski
110 schema:givenName Stefan
111 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07521014243.18
112 rdf:type schema:Person
113 grid-institutes:None schema:alternateName Aarhus University, BRICS, Switzerland
114 IBM T.J.Watson Research Center, Switzerland
115 schema:name Aarhus University, BRICS, Switzerland
116 IBM T.J.Watson Research Center, Switzerland
117 rdf:type schema:Organization
118 grid-institutes:grid.5801.c schema:alternateName ETH, Zurich, Switzerland
119 schema:name ETH, Zurich, Switzerland
120 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...