Results 1 
5 of
5
Authenticated Broadcast with a Partially Compromised PublicKey Infrastructure
"... Abstract. Given a publickey infrastructure (PKI) and digital signatures, it is possible to construct broadcast protocols tolerating any number of corrupted parties. Almost all existing protocols, however, do not distinguish between corrupted parties (who do not follow the protocol), and honest part ..."
Abstract

Cited by 1 (0 self)
 Add to MetaCart
(Show Context)
Abstract. Given a publickey infrastructure (PKI) and digital signatures, it is possible to construct broadcast protocols tolerating any number of corrupted parties. Almost all existing protocols, however, do not distinguish between corrupted parties (who do not follow the protocol), and honest parties whose secret (signing) keys have been compromised (but who continue to behave honestly). We explore conditions under which it is possible to construct broadcast protocols that still provide the usual guarantees (i.e., validity/agreement) to the latter. Consider a network of n parties, where an adversary has compromised the secret keys of up to tc honest parties and, in addition, fully controls the behavior of up to ta other parties. We show that for any fixed tc> 0, and any fixed ta, there exists an efficient protocol for broadcast if and only if 2ta + min(ta, tc) < n. (When tc = 0, standard results imply feasibility.) We also show that if tc, ta are not fixed, but are only guaranteed to satisfy the bound above, then broadcast is impossible to achieve except for a few specific values of n; for these “exceptional ” values of n, we demonstrate a broadcast protocol. Taken together, our results give a complete characterization of this problem. 1
présentée par Hung TRANTHE
"... Comme une évidence pour débuter ces remerciements, je voudrais remercier chaudement Carole Delporte et Hugues Fauconnier, directeurs de ma thèse. Je vous remercie beaucoup ..."
Abstract
 Add to MetaCart
(Show Context)
Comme une évidence pour débuter ces remerciements, je voudrais remercier chaudement Carole Delporte et Hugues Fauconnier, directeurs de ma thèse. Je vous remercie beaucoup
Authenticated Broadcast with a Partially Compromised PublicKey Infrastructure
"... Given a publickey infrastructure (PKI) and digital signatures, it is possible to construct broadcast protocols tolerating any number of corrupted parties. Almost all existing protocols, however, do not distinguish between corrupted parties who do not follow the protocol, and honest parties whose se ..."
Abstract
 Add to MetaCart
(Show Context)
Given a publickey infrastructure (PKI) and digital signatures, it is possible to construct broadcast protocols tolerating any number of corrupted parties. Almost all existing protocols, however, do not distinguish between corrupted parties who do not follow the protocol, and honest parties whose secret (signing) keys have been compromised but continue to behave honestly. We explore conditions under which it is possible to construct broadcast protocols that still provide the usual guarantees (i.e., validity/agreement) to the latter. Consider a network of n parties, where an adversary has compromised the secret keys of up to tc honest parties and, in addition, fully controls the behavior of up to ta other parties. We show that for any fixed tc> 0, and any fixed ta, there exists an efficient protocol for broadcast if and only if 2ta+min(ta, tc) < n. (When tc = 0, standard results imply feasibility.) We also show that if tc, ta are not fixed, but are only guaranteed to satisfy the bound above, then broadcast is impossible to achieve except for a few specific values of n; for these “exceptional” values of n, we demonstrate a broadcast protocol. Taken together, our results give a complete characterization of this problem. Keywords: Broadcast protocols, publickey infrastructure (PKI)
Authenticated Broadcast with a Partially Compromised PublicKey Infrastructure
"... Given a publickey infrastructure (PKI) and digital signatures, it is possible to construct broadcast protocols tolerating any number of corrupted parties. Almost all existing protocols, however, do not distinguish between corrupted parties (who do not follow the protocol), and honest parties whose ..."
Abstract
 Add to MetaCart
(Show Context)
Given a publickey infrastructure (PKI) and digital signatures, it is possible to construct broadcast protocols tolerating any number of corrupted parties. Almost all existing protocols, however, do not distinguish between corrupted parties (who do not follow the protocol), and honest parties whose secret (signing) keys have been compromised (but who continue to behave honestly). We explore conditions under which it is possible to construct broadcast protocols that still provide the usual guarantees (i.e., validity/agreement) to the latter. Consider a network of n parties, where an adversary has compromised the secret keys of up to tc honest parties and, in addition, fully controls the behavior of up to ta other parties. We show that for any fixed tc, ta there exists an efficient protocol for broadcast if and only if 2ta +min(ta, tc) < n. We also show that if tc, ta are not fixed, but are only guaranteed to satisfy the bound above, then broadcast is impossible to achieve except for a few specific values of n; for these “exceptional ” values of n, we demonstrate a broadcast protocol. Taken together, our results give a complete characterization of this problem.