Adaptively Secure Broadcast

被引:0
|
作者
Hirt, Martin [1 ]
Zikas, Vassilis [1 ]
机构
[1] ETH, Dept Comp Sci, Zurich, Switzerland
来源
关键词
BYZANTINE AGREEMENT; ALGORITHMS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A broadcast protocol allows a sender to distribute a message through a point-to-point network to a set of parties, such that (i) all parties receive the same message, even if the sender is corrupted, and (ii) this is the sender's message, if he is honest. Broadcast protocols satisfying these properties are known to exist if and only if t < n/3, where n denotes the total number of parties, and t denotes the maximal number of corruptions. When a setup allowing signatures is available to the parties, then such protocols exist even for t < n. Since its invention in [LSP82], broadcast has been used as a primitive in numerous multi-party protocols making it one of the fundamental primitives in the distributed-protocols literature. The security of these protocols is analyzed in a model where a broadcast primitive which behaves in an ideal way is assumed. Clearly, a definition of broadcast should allow for secure composition, namely, it should be secure to replace an assumed broadcast primitive by a protocol satisfying this definition. Following recent cryptographic reasoning, to allow secure composition the ideal behavior of broadcast can be described as an ideal functionality, and a simulation-based definition can be used. In this work, we show that the property-based definition of broadcast does not imply the simulation-based definition for the natural broadcast functionality. In fact, most broadcast protocols in the literature do not securely realize this functionality, which raises a composability issue for these broadcast protocols. In particular, we do not know of any broadcast protocol which could be securely invoked in a multi-party computation protocol in the secure-channels model. The problem is that existing protocols for broadcast do not preserve the secrecy of the message while being broadcasted, and in particular allow the adversary to corrupt the sender (and change the message), depending on the message being broadcasted. For example, when every party should broadcast a random bit, the adversary could corrupt those parties who intend to broadcast 0, and make them broadcast I. More concretely, we show that simulatable broadcast in a model with secure channels is possible if and only if t < n/3, respectively t <= n/2 when a signature setup is available. The positive results are proven by constructing secure broadcast protocols.
引用
收藏
页码:466 / 485
页数:20
相关论文
共 50 条
  • [21] Adaptively Secure Strong Designated Signature
    Sharma, Neetu
    Sahu, Rajeev Anand
    Saraswat, Vishal
    Sharma, Birendra Kumar
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2016, 2016, 10095 : 43 - 60
  • [22] Adaptively Secure Constrained Pseudorandom Functions
    Hofheinz, Dennis
    Kamath, Akshay
    Koppula, Venkata
    Waters, Brent
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2019, 2019, 11598 : 357 - 376
  • [23] Adaptively Secure Computation with Partial Erasures
    Hazay, Carmit
    Lindell, Yehuda
    Patra, Arpita
    PODC'15: PROCEEDINGS OF THE 2015 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, 2015, : 291 - 300
  • [24] An Adaptively Secure Functional Encryption for Randomized Functions
    Liu, Muhua
    Zhang, Ping
    COMPUTER JOURNAL, 2020, 63 (08): : 1247 - 1258
  • [25] Adaptively Secure Random Beacons for Ungrindable Blockchains
    Kiayias, Aggelos
    Moore, Cristopher
    Quader, Saad
    Russell, Alexander
    2023 IEEE 43RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, ICDCS, 2023, : 62 - 72
  • [26] Adaptively Secure Coin-Flipping, Revisited
    Goldwasser, Shafi
    Kalai, Yael Tauman
    Park, Sunoo
    AUTOMATA, LANGUAGES, AND PROGRAMMING, PT II, 2015, 9135 : 663 - 674
  • [27] On Adaptively Secure Multiparty Computation with a Short CRS
    Cohen, Ran
    Peikert, Chris
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2016, 2016, 9841 : 129 - 146
  • [28] Adaptively Secure MPC with Sublinear Communication Complexity
    Cohen, Ran
    Shelat, Abhi
    Wichs, Daniel
    JOURNAL OF CRYPTOLOGY, 2023, 36 (02)
  • [29] Adaptively Secure Garbling Schemes for Parallel Computations
    Chung, Kai-Min
    Qian, Luowen
    THEORY OF CRYPTOGRAPHY, TCC 2019, PT II, 2019, 11892 : 285 - 310
  • [30] Adaptively Secure Constrained Verifiable Random Function
    Zan, Yao
    Li, Hongda
    Xu, Haixia
    SCIENCE OF CYBER SECURITY, SCISEC 2023, 2023, 14299 : 367 - 385