Sciweavers

ASIACRYPT
2007
Springer

Secure Protocols with Asymmetric Trust

14 years 5 months ago
Secure Protocols with Asymmetric Trust
Abstract. In the standard general-adversary model for multi-party protocols, a global adversary structure is given, and every party must trust in this particular structure. We introduce a more general model, the asymmetric-trust model, wherein every party is allowed to trust in a different, personally customized adversary structure. We have two main contributions. First, we present non-trivial lower and upper bounds for broadcast, verifiable secret sharing, and general multi-party computation in different variations of this new model. The obtained bounds demonstrate that the new model is strictly more powerful than the standard general-adversary model. Second, we propose a framework for expressing and analyzing asymmetric trust in the usual simulation paradigm for defining security of protocols, and in particular show a general composition theorem for protocols with asymmetric trust.
Ivan Damgård, Yvo Desmedt, Matthias Fitzi, J
Added 07 Jun 2010
Updated 07 Jun 2010
Type Conference
Year 2007
Where ASIACRYPT
Authors Ivan Damgård, Yvo Desmedt, Matthias Fitzi, Jesper Buus Nielsen
Comments (0)