Secure multi-party computation without agreement

Shafi Goldwasser, Yehuda Lindell

Research output: Contribution to journalArticlepeer-review

70 Scopus citations

Abstract

The use of a broadcast channel is essential for achieving meaningful secure multi-party computation whenever a third or more of the parties were corrupted. A mild relaxation of the definition of secure computation allowing abort was also presented. It was shown that the relaxation suffices for achieving secure computation in a point-to-point network. It was also shown that the secure multi-party computation for this definition can be achieved for any number of corrupted parties and without a broadcast channel. The result enables to obtain multi-party protocols that remained secure under composition without assuming a broadcast channel.

Original languageEnglish
Pages (from-to)247-287
Number of pages41
JournalJournal of Cryptology
Volume18
Issue number3
DOIs
StatePublished - Jul 2005

Keywords

  • Broadcast
  • Protocol composition
  • Secure multi-party computation

Fingerprint

Dive into the research topics of 'Secure multi-party computation without agreement'. Together they form a unique fingerprint.

Cite this