Quorum-based secure multi-party computation

Donald Beaver, Avishai Wool

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper describes efficient protocols for multi-party computations that are information-theoretically secure against passive attacks. The results presented here apply to access structures based on quorum systems, which are collections of sets enjoying a naturally-motivated self-intersection property. Quorum-based access structures include threshold systems but are far richer and more general, and they have specific applicability to several problems in distributed control and management. The achievable limits of security in quorum-based multi-party computation are shown to be equivalent to those determined by Hirt and Maurer in [HM97], drawing a natural but non-obvious connection between quorum systems and the extremes of secure multi-party computation. Moreover, for both the general case and for specific applications, the protocols presented here are simpler and more efficient.

Original languageEnglish
Title of host publicationAdvances in Cryptology — EUROCRYPT 1998, International Conference on the Theory and Application of Cryptographic Techniques, Proceedings
EditorsKaisa Nyberg
PublisherSpringer Verlag
Pages375-390
Number of pages16
ISBN (Print)3540645187, 9783540645184
DOIs
StatePublished - 1998
Externally publishedYes
EventInternational Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT 1998 - Espoo, Finland
Duration: 31 May 19984 Jun 1998

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1403
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceInternational Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT 1998
Country/TerritoryFinland
CityEspoo
Period31/05/984/06/98

Fingerprint

Dive into the research topics of 'Quorum-based secure multi-party computation'. Together they form a unique fingerprint.

Cite this