Results 1 - 10
of
33
Fail-stop Signatures and their Application
, 1991
"... . The unforgeability of conventional digital signatures is necessarily based on complexity theoretic assumptions, i.e. even the most secure schemes can be broken by an adversary with unexpected computing abilities. Thus we introduce fail-stop signatures: They are as unforgeable as the best conventio ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
. The unforgeability of conventional digital signatures is necessarily based on complexity theoretic assumptions, i.e. even the most secure schemes can be broken by an adversary with unexpected computing abilities. Thus we introduce fail-stop signatures: They are as unforgeable as the best
Fail-stop Signatures; Principles and Applications
- Proceedings of COMPUSEC ’91, Eighth World Conference on Computer Security, Audit, and Control, Elsevier Science Publishers
, 1991
"... Digital signatures are necessary wherever legal certainty is to be achieved for digital message exchange. However, the unforgeability of conventional digital signatures is necessarily based on complexity theoretic assumptions. That is, even the most secure schemes can be broken by an adversary with ..."
Abstract
-
Cited by 6 (2 self)
- Add to MetaCart
with unexpected computing abilities, e.g., one who can factor unexpectedly large numbers. Fail-stop signatures improve upon this: They are as unforgeable as the best conventional signatures; but if someone nevertheless succeeds in forging a signature, this can be proved by the supposed signer. Thus one can
Factorization-based Fail-Stop Signatures Revisited
, 2004
"... Fail-stop signature (FSS) schemes are important primitives because in a fail-stop signature scheme the signer is protected against unlimited powerful adversaries as follows: Even if an adversary breaks the scheme's underlying computational hard problem and hence forges a signature, then with ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
Fail-stop signature (FSS) schemes are important primitives because in a fail-stop signature scheme the signer is protected against unlimited powerful adversaries as follows: Even if an adversary breaks the scheme's underlying computational hard problem and hence forges a signature
Factorization-based Fail-Stop Signatures Revisited
"... Fail-stop signature (FSS) schemes are important primitives because in a fail-stop signature scheme the signer is protected against unlimited powerful adversaries as follows: Even if an adversary breaks the scheme’s underlying computational hard problem and hence forges a signature, then with overw ..."
Abstract
- Add to MetaCart
Fail-stop signature (FSS) schemes are important primitives because in a fail-stop signature scheme the signer is protected against unlimited powerful adversaries as follows: Even if an adversary breaks the scheme’s underlying computational hard problem and hence forges a signature
Mathematical Systems Theory ©1993 Springer-Verlag New York Inc. A Partial Equivalence Between Shared-Memory and Message-Passing in an Asynchronous Fail-Stop Distributed Environment*
"... Abstract. This paper presents a schematic algorithm for distributed systems. This schematic algorithm uses a "black-box " procedure for communication, the output of which must meet two requirements: a global-order requirement and a deadlock-free requirement. This algorithm is valid ..."
Abstract
- Add to MetaCart
and Herlihy [AH] in the shared-memory model. This solution is the fastest known randomized algorithm that solves the consensus problem against a strong fail-stop adversary with one-half resiliency. Second,
Perfectly Reliable and Secure Communication in Directed Networks Tolerating Mixed Adversary
"... In this paper we study the problem of Perfectly Reliable Message Transmission (PRMT) and Perfectly Secure Message Transmission (PSMT) between two nodes S and R in a synchronous network, where S and R are connected by some vertex disjoint paths called wires such that each wire acts as a oneway channe ..."
Abstract
- Add to MetaCart
channel facilitating communication either from S to R or vice-versa. Some of these wires may be corrupted by a mixed adversary (tb, tf), having unbounded computing power, who can corrupt tb, tf wires in Byzantine and fail-stop fashion respectively. In spite of the presence of such an adversary, S wants
On the Black-Box Complexity of Optimally-Fair Coin Tossing
"... Abstract. A fair two-party coin tossing protocol is one in which both parties output the same bit that is almost uniformly distributed (i.e., it equals 0 and 1 with probability that is at most negligibly far from one half). It is well known that it is impossible to achieve fair coin tossing even in ..."
Abstract
-
Cited by 14 (6 self)
- Add to MetaCart
in the presence of fail-stop adversaries (Cleve, FOCS 1986). In fact, Cleve showed that for every coin tossing protocol running for r rounds, an efficient fail-stop adversary can bias the output by Ω(1/r). Since this is the best possible, a protocol that limits the bias of any adversary to O(1/r) is called
Beyond Fail-Stop: Wait-Free Serializability and Resiliency in the Presence of Slow-Down Failures
, 1990
"... Historically, database researchers have dealt with two kinds of process failures: fail-stop failures and malicious failures. Under the fail-stop assumption, processes fail by halting. Such failures are easily detectable. Under the malicious (or Byzantine) failure assumption, processes fail by beh ..."
Abstract
- Add to MetaCart
by behaving unpredictably, perhaps as adversaries. Such failures are not necessarily detectable. When system designers discuss fault tolerance, they typically restrict themselves to the problem of handling fail-stop failures only. This paper proposes an intermediate failure model and presents a practical
Topology-Hiding Computation
, 2015
"... Secure Multi-party Computation (MPC) is one of the foundational achievements of modern cryptog-raphy, allowing multiple, distrusting, parties to jointly compute a function of their inputs, while revealing nothing but the output of the function. Following the seminal works of Yao and Goldreich, Mical ..."
Abstract
- Add to MetaCart
for fail-stop adversaries, there are some strong impossibility results. Despite this, we show that protocols for topology-hiding computation can be constructed in the semi-honest and fail-stop models, if we somewhat restrict the set of nodes the adversary may corrupt.
A Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness ∗
, 2013
"... It is well known that it is impossible for two parties to toss a coin fairly (Cleve, STOC 1986). This result implies that it is impossible to securely compute with fairness any function that can be used to toss a coin fairly. In this paper, we focus on the class of deterministic Boolean functions wi ..."
Abstract
-
Cited by 2 (2 self)
- Add to MetaCart
by the impossibility result of Cleve (which is the only known impossibility result for fairness). In addition to the above, we draw corollaries to the feasibility of achieving fairness in two possible fail-stop models. Keywords: Fairness, coin tossing, secure computation, malicious and fail-stop adversaries
Results 1 - 10
of
33