Information-theoretic security without an honest majority

61Citations
Citations of this article
55Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We present six multiparty protocols with informationtheoretic security that tolerate an arbitrary number of corrupt participants. All protocols assume pairwise authentic private channels and a broadcast channel (in a single case, we require a simultaneous broadcast channel). We give protocols for veto, vote, anonymous bit transmission, collision detection, notification and anonymous message transmission. Not assuming an honest majority, in most cases, a single corrupt participant can make the protocol abort. All protocols achieve functionality never obtained before without the use of either computational assumptions or of an honest majority. © International Association for Cryptology Research 2007.

Cite

CITATION STYLE

APA

Broadbent, A., & Tapp, A. (2007). Information-theoretic security without an honest majority. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4833 LNCS, pp. 410–426). Springer Verlag. https://doi.org/10.1007/978-3-540-76900-2_25

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free