Abstract
The use of a broadcast channel is essential for achieving meaningful secure multi-party computation whenever a third or more of the parties were corrupted. A mild relaxation of the definition of secure computation allowing abort was also presented. It was shown that the relaxation suffices for achieving secure computation in a point-to-point network. It was also shown that the secure multi-party computation for this definition can be achieved for any number of corrupted parties and without a broadcast channel. The result enables to obtain multi-party protocols that remained secure under composition without assuming a broadcast channel.
Original language | English |
---|---|
Pages (from-to) | 247-287 |
Number of pages | 41 |
Journal | Journal of Cryptology |
Volume | 18 |
Issue number | 3 |
DOIs | |
State | Published - Jul 2005 |
Keywords
- Broadcast
- Protocol composition
- Secure multi-party computation