Show simple item record

dc.contributor.authorBoyle, Elette
dc.contributor.authorGoldwasser, Shafi
dc.contributor.authorKalai, Yael Tauman
dc.date.accessioned2021-10-27T20:05:06Z
dc.date.available2021-10-27T20:05:06Z
dc.date.issued2014
dc.identifier.urihttps://hdl.handle.net/1721.1/134461
dc.description.abstractThe ability to collectively toss a common coin among n n parties in the presence of faults is an important primitive in the arsenal of randomized distributed protocols. In the case of dishonest majority, it was shown to be impossible to achieve less than 1/r bais in O(r) rounds (Cleve STOC '86). In the case of honest majority, in contrast, unconditionally secure O (1) -round protocols for generating common perfectly unbiased coins follow from general completeness theorems on multi-party secure protocols in the perfectly secure channels model (e.g.; BGW, CCD STOC '88). However, in the multi-party protocols with honest majority, parties must generate and hold local secret values which are assumed to be perfectly hidden from malicious parties: an assumption which is crucial to proving the resulting common coin is unbiased. This assumption unfortunately does not seem to hold in practice, as attackers can launch side-channel attacks on the local state of honest parties and leak information on their secrets. In this work, we present an O (1) -round protocol for collectively generating an unbiased common coin, in the presence of leakage on the local state of the honest parties. We tolerate t ≤ (1/3 - ε)n computationally unbounded statically scheduled Byzantine faults and in addition a Θ (1) -fraction leakage on each (honest) party's secret state. Our results hold in the memory leakage model (of Akavia, Goldwasser, Vaikuntanathan '08) adapted to the distributed setting. Another contribution of our work is a tool we use to achieve collective coin flipping - leakage-resilient verifiable secret sharing (VSS). Informally, this is a variant of ordinary VSS in which secrecy guarantees are maintained even if information is leaked on individual shares of the secret. © 2014 Springer-Verlag Berlin Heidelberg.
dc.language.isoen
dc.publisherSpringer Nature America, Inc
dc.relation.isversionof10.1007/S00446-013-0206-Z
dc.rightsCreative Commons Attribution-Noncommercial-Share Alike
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/
dc.sourceOther repository
dc.titleLeakage-resilient coin tossing
dc.typeArticle
dc.contributor.departmentMassachusetts Institute of Technology. Department of Mathematics
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
dc.relation.journalDistributed Computing
dc.eprint.versionAuthor's final manuscript
dc.type.urihttp://purl.org/eprint/type/JournalArticle
eprint.statushttp://purl.org/eprint/status/PeerReviewed
dc.date.updated2019-05-29T15:16:03Z
dspace.orderedauthorsBoyle, E; Goldwasser, S; Kalai, YT
dspace.date.submission2019-05-29T15:16:04Z
mit.journal.volume27
mit.journal.issue3
mit.metadata.statusAuthority Work and Publication Information Needed


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record