[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/62212.62214acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free access

Multiparty unconditionally secure protocols

Published: 01 January 1988 Publication History

Abstract

Under the assumption that each pair of participants can communicate secretly, we show that any reasonable multiparty protocol can be achieved if at least 2n/3 of the participants are honest. The secrecy achieved is unconditional. It does not rely on any assumption about computational intractability.

References

[1]
B~fiay and Furedi: Mental Poker with Three or More Players, Information and Control, vol. 59, 1983, pp.84-93.
[2]
Benaloh: Secret sharing homomorphisms, Proc. of Crypto 86.
[3]
Blakely: Security proofs for information protection systems. Proc~ngs of the 1980 Symposium on Security and Privacy, IEEE Computer Society Press, NY, 1981, pp.79-88.
[4]
Brassard and Cr~peau: Zer~Knowledge Simulation of Boolean Circuits. Proceedings of Crypto 86.
[5]
Brassard, Chaum and Cr6peau: Minimum Disclosure Proofs of knowledge. To appear.
[6]
Ben-Or, Goldwasser and Wigderson: Completeness Them'eros for Non-Cryptographic Fault-Tolerant DistributeA Computation. to appear in l:'roceeAings of STOC 88.
[7]
Chaum: How to keep a sex:ret alive. PrOngs of Crypto 84.
[8]
Chaum: The Dining Cryptographers Problem, to appe~.
[9]
Chaum, Damgfird and van de Graaf: Multiparty Computations ensuring secrecy of each party's input and correcmess of the result. To appear in Proceextings of Crypto 87.
[10]
Chor, Goldwasser, Micali and Awerbuch: Verifiable Secret Sharing and Achieving Simultaneity in the Presence of faults. ProceeAings of FOCS 85, pp.383-395.
[11]
Dole and Strong: Polynomial Algorithms for Multiple Processor Agreement. Pr~ings of STOC 82, pp.401407.
[12]
Goldreich, Micali and Wigderson: How to play any mental game. Proceedings of STOC 87, pp.218-229.
[13]
Lam~ Shostak and Pease: The Byzanfine Generals Problem. ACM trans. Prog. Languages and Systems, vol.4, no.3, 1982, pp.382-401.
[14]
McEiiece and Sarvawate: On Sharing Secrets and Reed-Solomon Codes, CACM, Vol. 24, no. 9, 198 l, pp. 583-584.
[15]
Shamir: How to share a secret. CACM, vol.22, no.l I, 1979, pp.612-613.
[16]
Yao: Protocols for secure computations, Proc. of FOCS 82, pp. 160-164.

Cited By

View all
  • (2024)Communication-Efficient Multi-Party Computation for RMS ProgramsIACR Communications in Cryptology10.62056/ab0lmp-3yOnline publication date: 8-Jul-2024
  • (2024)Quantum Universally Composable Oblivious Linear EvaluationQuantum10.22331/q-2024-10-23-15078(1507)Online publication date: 23-Oct-2024
  • (2024)Information-Theoretic Perspectives for Simulation-Based Security in Multi-Party ComputationIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences10.1587/transfun.2023TAI0001E107.A:3(360-372)Online publication date: 1-Mar-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
STOC '88: Proceedings of the twentieth annual ACM symposium on Theory of computing
January 1988
553 pages
ISBN:0897912640
DOI:10.1145/62212
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 January 1988

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

STOC88
Sponsor:
STOC88: 1988 Symposium on the Theory of Computing
May 2 - 4, 1988
Illinois, Chicago, USA

Acceptance Rates

STOC '88 Paper Acceptance Rate 53 of 192 submissions, 28%;
Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

Upcoming Conference

STOC '25
57th Annual ACM Symposium on Theory of Computing (STOC 2025)
June 23 - 27, 2025
Prague , Czech Republic

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)549
  • Downloads (Last 6 weeks)67
Reflects downloads up to 25 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Communication-Efficient Multi-Party Computation for RMS ProgramsIACR Communications in Cryptology10.62056/ab0lmp-3yOnline publication date: 8-Jul-2024
  • (2024)Quantum Universally Composable Oblivious Linear EvaluationQuantum10.22331/q-2024-10-23-15078(1507)Online publication date: 23-Oct-2024
  • (2024)Information-Theoretic Perspectives for Simulation-Based Security in Multi-Party ComputationIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences10.1587/transfun.2023TAI0001E107.A:3(360-372)Online publication date: 1-Mar-2024
  • (2024)On the Communication Complexity of Secure Multi-Party Computation With AbortsProceedings of the 43rd ACM Symposium on Principles of Distributed Computing10.1145/3662158.3662815(480-491)Online publication date: 17-Jun-2024
  • (2024)Secret Sharing with SnitchingProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690296(840-853)Online publication date: 2-Dec-2024
  • (2024)Secure Multiparty Computation with Lazy SharingProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690207(795-809)Online publication date: 2-Dec-2024
  • (2024)Efficient Secret Sharing for Large-Scale ApplicationsProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670379(3065-3079)Online publication date: 2-Dec-2024
  • (2024)Privacy-Preserving Arbitrary Geometric Range Query in Mobile Internet of VehiclesIEEE Transactions on Mobile Computing10.1109/TMC.2023.333662123:7(7725-7738)Online publication date: Jul-2024
  • (2024)Many Non-Reed-Solomon Type MDS Codes From Arbitrary Genus Algebraic CurvesIEEE Transactions on Information Theory10.1109/TIT.2023.334814670:7(4856-4864)Online publication date: Jul-2024
  • (2024)Secure Network Function Computation for Linear Functions—Part I: Source SecurityIEEE Transactions on Information Theory10.1109/TIT.2023.332845470:1(676-697)Online publication date: Jan-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media