Two-Threshold Broadcast and Detectable Multi-Party Computation
Matthias Fitzi, Martin Hirt, Thomas Holenstein, and Jürg Wullschleger
Advances in Cryptology — EUROCRYPT 2003, Lecture Notes in Computer Science, Springer-Verlag, vol. 2656, pp. 51–67, May 2003.
Classical distributed protocols like broadcast or multi-party computation provide security as long as the number of malicious players is bounded by some given threshold , i.e., . If exceeds then these protocols are completely insecure.
We relax this binary concept to the notion of two-threshold security: Such protocols guarantee full security as long as for some small threshold , and still provide some degraded security when for a larger threshold . In particular, we propose the following problems.
Broadcast with Extended Validity: Standard broadcast is achieved when . When , then either broadcast is achieved, or every player learns that there are too many faults. Furthermore, when the sender is honest, then broadcast is always achieved.
Broadcast with Extended Consistency: Standard broadcast is achieved when . When , then either broadcast is achieved, or every player learns that there are too many faults. Furthermore, the players agree on whether or not broadcast is achieved.
Detectable Multi-Party Computation: Secure computation is achieved when . When , then either the computation is secure, or all players detect that there are too many faults and abort.
The above protocols for players exist if and only if or .
BibTeX Citation
@inproceedings{FHHW03,
author = {Matthias Fitzi and Martin Hirt and Thomas Holenstein and Jürg Wullschleger},
title = {Two-Threshold Broadcast and Detectable Multi-Party Computation},
editor = {Eli Biham},
booktitle = {Advances in Cryptology --- EUROCRYPT 2003},
pages = {51--67},
series = {Lecture Notes in Computer Science},
volume = {2656},
year = {2003},
month = {5},
publisher = {Springer-Verlag},
}