• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 33
Next 10 →

Fail-stop Signatures and their Application

by Birgit Pfitzmann, Michael Waidner , 1991
"... . The unforgeability of conventional digital signatures is necessarily based on complexity theoretic assumptions, i.e. even the most secure schemes can be broken by an adversary with unexpected computing abilities. Thus we introduce fail-stop signatures: They are as unforgeable as the best conventio ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
. The unforgeability of conventional digital signatures is necessarily based on complexity theoretic assumptions, i.e. even the most secure schemes can be broken by an adversary with unexpected computing abilities. Thus we introduce fail-stop signatures: They are as unforgeable as the best

Fail-stop Signatures; Principles and Applications

by Birgit Pfitzmann, Universitt Hildesheim - Proceedings of COMPUSEC ’91, Eighth World Conference on Computer Security, Audit, and Control, Elsevier Science Publishers , 1991
"... Digital signatures are necessary wherever legal certainty is to be achieved for digital message exchange. However, the unforgeability of conventional digital signatures is necessarily based on complexity theoretic assumptions. That is, even the most secure schemes can be broken by an adversary with ..."
Abstract - Cited by 6 (2 self) - Add to MetaCart
with unexpected computing abilities, e.g., one who can factor unexpectedly large numbers. Fail-stop signatures improve upon this: They are as unforgeable as the best conventional signatures; but if someone nevertheless succeeds in forging a signature, this can be proved by the supposed signer. Thus one can

Factorization-based Fail-Stop Signatures Revisited

by Katja Schmidt-Samoa , 2004
"... Fail-stop signature (FSS) schemes are important primitives because in a fail-stop signature scheme the signer is protected against unlimited powerful adversaries as follows: Even if an adversary breaks the scheme's underlying computational hard problem and hence forges a signature, then with ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Fail-stop signature (FSS) schemes are important primitives because in a fail-stop signature scheme the signer is protected against unlimited powerful adversaries as follows: Even if an adversary breaks the scheme's underlying computational hard problem and hence forges a signature

Factorization-based Fail-Stop Signatures Revisited

by n.n.
"... Fail-stop signature (FSS) schemes are important primitives because in a fail-stop signature scheme the signer is protected against unlimited powerful adversaries as follows: Even if an adversary breaks the scheme’s underlying computational hard problem and hence forges a signature, then with overw ..."
Abstract - Add to MetaCart
Fail-stop signature (FSS) schemes are important primitives because in a fail-stop signature scheme the signer is protected against unlimited powerful adversaries as follows: Even if an adversary breaks the scheme’s underlying computational hard problem and hence forges a signature

Mathematical Systems Theory ©1993 Springer-Verlag New York Inc. A Partial Equivalence Between Shared-Memory and Message-Passing in an Asynchronous Fail-Stop Distributed Environment*

by Amotz Bar-noy R, Danny Dolev, A. Bar-noy, D Dolev
"... Abstract. This paper presents a schematic algorithm for distributed systems. This schematic algorithm uses a "black-box " procedure for communication, the output of which must meet two requirements: a global-order requirement and a deadlock-free requirement. This algorithm is valid ..."
Abstract - Add to MetaCart
and Herlihy [AH] in the shared-memory model. This solution is the fastest known randomized algorithm that solves the consensus problem against a strong fail-stop adversary with one-half resiliency. Second,

Perfectly Reliable and Secure Communication in Directed Networks Tolerating Mixed Adversary

by U Rangan
"... In this paper we study the problem of Perfectly Reliable Message Transmission (PRMT) and Perfectly Secure Message Transmission (PSMT) between two nodes S and R in a synchronous network, where S and R are connected by some vertex disjoint paths called wires such that each wire acts as a oneway channe ..."
Abstract - Add to MetaCart
channel facilitating communication either from S to R or vice-versa. Some of these wires may be corrupted by a mixed adversary (tb, tf), having unbounded computing power, who can corrupt tb, tf wires in Byzantine and fail-stop fashion respectively. In spite of the presence of such an adversary, S wants

On the Black-Box Complexity of Optimally-Fair Coin Tossing

by Dana Dachman-soled, Yehuda Lindell, Mohammad Mahmoody
"... Abstract. A fair two-party coin tossing protocol is one in which both parties output the same bit that is almost uniformly distributed (i.e., it equals 0 and 1 with probability that is at most negligibly far from one half). It is well known that it is impossible to achieve fair coin tossing even in ..."
Abstract - Cited by 14 (6 self) - Add to MetaCart
in the presence of fail-stop adversaries (Cleve, FOCS 1986). In fact, Cleve showed that for every coin tossing protocol running for r rounds, an efficient fail-stop adversary can bias the output by Ω(1/r). Since this is the best possible, a protocol that limits the bias of any adversary to O(1/r) is called

Beyond Fail-Stop: Wait-Free Serializability and Resiliency in the Presence of Slow-Down Failures

by Dennis Shasha John, John Turek , 1990
"... Historically, database researchers have dealt with two kinds of process failures: fail-stop failures and malicious failures. Under the fail-stop assumption, processes fail by halting. Such failures are easily detectable. Under the malicious (or Byzantine) failure assumption, processes fail by beh ..."
Abstract - Add to MetaCart
by behaving unpredictably, perhaps as adversaries. Such failures are not necessarily detectable. When system designers discuss fault tolerance, they typically restrict themselves to the problem of handling fail-stop failures only. This paper proposes an intermediate failure model and presents a practical

Topology-Hiding Computation

by Tal Moran, Ilan Orlov, Silas Richelson , 2015
"... Secure Multi-party Computation (MPC) is one of the foundational achievements of modern cryptog-raphy, allowing multiple, distrusting, parties to jointly compute a function of their inputs, while revealing nothing but the output of the function. Following the seminal works of Yao and Goldreich, Mical ..."
Abstract - Add to MetaCart
for fail-stop adversaries, there are some strong impossibility results. Despite this, we show that protocols for topology-hiding computation can be constructed in the semi-honest and fail-stop models, if we somewhat restrict the set of nodes the adversary may corrupt.

A Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness ∗

by Gilad Asharov, Yehuda Lindell, Tal Rabin , 2013
"... It is well known that it is impossible for two parties to toss a coin fairly (Cleve, STOC 1986). This result implies that it is impossible to securely compute with fairness any function that can be used to toss a coin fairly. In this paper, we focus on the class of deterministic Boolean functions wi ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
by the impossibility result of Cleve (which is the only known impossibility result for fairness). In addition to the above, we draw corollaries to the feasibility of achieving fairness in two possible fail-stop models. Keywords: Fairness, coin tossing, secure computation, malicious and fail-stop adversaries
Next 10 →
Results 1 - 10 of 33
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University