@inproceedings{9d312b8b252e4a2794bc31b7fde41004,
title = "Quorum-based secure multi-party computation",
abstract = "This paper describes efficient protocols for multi-party computations that are information-theoretically secure against passive attacks. The results presented here apply to access structures based on quorum systems, which are collections of sets enjoying a naturally-motivated self-intersection property. Quorum-based access structures include threshold systems but are far richer and more general, and they have specific applicability to several problems in distributed control and management. The achievable limits of security in quorum-based multi-party computation are shown to be equivalent to those determined by Hirt and Maurer in [HM97], drawing a natural but non-obvious connection between quorum systems and the extremes of secure multi-party computation. Moreover, for both the general case and for specific applications, the protocols presented here are simpler and more efficient.",
author = "Donald Beaver and Avishai Wool",
note = "Publisher Copyright: {\textcopyright} Springer-Verlag Berlin Heidelberg 1998.; null ; Conference date: 31-05-1998 Through 04-06-1998",
year = "1998",
doi = "10.1007/BFb0054140",
language = "אנגלית",
isbn = "3540645187",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "375--390",
editor = "Kaisa Nyberg",
booktitle = "Advances in Cryptology — EUROCRYPT 1998, International Conference on the Theory and Application of Cryptographic Techniques, Proceedings",
}