Cryptography Reference
In-Depth Information
This result makes no computational assumptions, allows
computationally-unbounded adversaries, but assumes pri-
vate channels .
Assuming the existence of enhanced trapdoor permutations ,
secure multi-party computation is possible in a model
allowing an active and adaptive computationally-bounded
adversary that may control only less than one third of the
parties (37; 48). We stress that this result does not assume
“private channels”.
Results for asynchronous communication and arbitrary networks of
point-to-point channels were presented in (23; 26) and (51), respec-
tively.
Note that the implementation of a broadcast channel can be
cast as a cryptographic protocol problem (i.e., for the functionality
( v, λ, ..., λ )
( v, v, ..., v ), where λ denotes the empty string). Thus,
it is not surprising that the results regarding active adversaries either
assume the existence of such a channel or require a setting in which
the latter can be implemented.
Secure reactive computation: All the above results (easily) extend
to a reactive model of computation in which each party interacts with a
high-level process (or application). The high-level process supplies each
party with a sequence of inputs, one at a time, and expect to receive
corresponding outputs from the parties. That is, a reactive system goes
through (a possibly unbounded number of) iterations of the following
type:
Parties are given inputs for the current iteration.
Depending on the current inputs, the parties are supposed
to compute outputs for the current iteration. That is, the
outputs in iteration j are determined by the inputs of the
j th iteration.
A more general formulation allows the outputs of each iteration to
depend also on a global state, which is possibly updated in each itera-
tion. The global state may include all inputs and outputs of previous
Search WWH ::




Custom Search