Always have a backup plan: Fully secure synchronous mpc with asynchronous fallback

15Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Protocols for secure Multi-Party Computation (MPC) can be classified according to the underlying communication model. Two prominent communication models considered in the literature are the synchronous and asynchronous models, which considerably differ in terms of the achievable security guarantees. Synchronous MPC protocols can achieve the optimal corruption threshold n/2 and allow every party to give input, but become completely insecure when synchrony assumptions are violated. On the other hand, asynchronous MPC protocols remain secure under arbitrary network conditions, but can tolerate only n/3 corruptions and parties with slow connections unavoidably cannot give input. A natural question is whether there exists a protocol for MPC that can tolerate up to ts < n and the number of inputs taken into account under an asynchronous network is at most n-ts.

Cite

CITATION STYLE

APA

Blum, E., Liu-Zhang, C. D., & Loss, J. (2020). Always have a backup plan: Fully secure synchronous mpc with asynchronous fallback. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 12171 LNCS, pp. 707–731). Springer. https://doi.org/10.1007/978-3-030-56880-1_25

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free