Abstract
The use of a broadcast channel is essential for achieving meaningful secure multi-party computation whenever a third or more of the parties were corrupted. A mild relaxation of the definition of secure computation allowing abort was also presented. It was shown that the relaxation suffices for achieving secure computation in a point-to-point network. It was also shown that the secure multi-party computation for this definition can be achieved for any number of corrupted parties and without a broadcast channel. The result enables to obtain multi-party protocols that remained secure under composition without assuming a broadcast channel.
| Original language | English |
|---|---|
| Pages (from-to) | 247-287 |
| Number of pages | 41 |
| Journal | Journal of Cryptology |
| Volume | 18 |
| Issue number | 3 |
| DOIs | |
| State | Published - Jul 2005 |
Keywords
- Broadcast
- Protocol composition
- Secure multi-party computation
Fingerprint
Dive into the research topics of 'Secure multi-party computation without agreement'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver