On the Feasibility of Consistent Computations

In many practical settings, participants are willing to deviate from the protocol only if they remain undetected. Aumann and Lindell introduced a concept of covert adversaries to formalize this type of corruption. In the current paper, the authors refine their model to get stronger security guarantees. Namely, they show how to construct protocols, where malicious participants cannot learn anything beyond their intended outputs and honest participants can detect malicious behavior that alters their outputs. As this construction does not protect honest parties from selective protocol failures, a valid corruption complaint can leak a single bit of information about the inputs of honest parties.

Provided by: University of Tartu Topic: Security Date Added: Mar 2010 Format: PDF

Download Now

Find By Topic