Show simple item record

dc.contributor.authorBoyle, Elette
dc.contributor.authorGoldwasser, Shafi
dc.date.accessioned2012-07-18T13:06:47Z
dc.date.available2012-07-18T13:06:47Z
dc.date.issued2011-01
dc.date.submitted2011-06
dc.identifier.isbn978-3-642-24099-7
dc.identifier.issn0302-9743
dc.identifier.issn1611-3349
dc.identifier.urihttp://hdl.handle.net/1721.1/71675
dc.descriptionProceedings 25th International Symposium, DISC 2011, Rome, Italy, September 20-22, 2011.en_US
dc.description.abstractThe ability to collectively toss a common coin among n parties in the presence of faults is an important primitive in the arsenal of randomized distributed protocols. In the case of dishonest majority, it was shown to be impossible to achieve less than 1 r bias in O(r) rounds (Cleve STOC ’86). In the case of honest majority, in contrast, unconditionally secure O(1)-round protocols for generating common unbiased coins follow from general completeness theorems on multi-party secure protocols in the secure channels model (e.g., BGW, CCD STOC ’88). However, in the O(1)-round protocols with honest majority, parties generate and hold secret values which are assumed to be perfectly hidden from malicious parties: an assumption which is crucial to proving the resulting common coin is unbiased. This assumption unfortunately does not seem to hold in practice, as attackers can launch side-channel attacks on the local state of honest parties and leak information on their secrets. In this work, we present an O(1)-round protocol for collectively generating an unbiased common coin, in the presence of leakage on the local state of the honest parties. We tolerate t ≤ ( 1 3 − )n computationallyunbounded Byzantine faults and in addition a Ω(1)-fraction leakage on each (honest) party’s secret state. Our results hold in the memory leakage model (of Akavia, Goldwasser, Vaikuntanathan ’08) adapted to the distributed setting. Additional contributions of our work are the tools we introduce to achieve the collective coin toss: a procedure for disjoint committee election, and leakage-resilient verifiable secret sharing.en_US
dc.description.sponsorshipNational Defense Science and Engineering Graduate Fellowshipen_US
dc.description.sponsorshipNational Science Foundation (U.S.) (CCF-1018064)en_US
dc.language.isoen_US
dc.publisherSpring Berlin/Heidelbergen_US
dc.relation.isversionofhttp://dx.doi.org/ 10.1007/978-3-642-24100-0_16en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alike 3.0en_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/3.0/en_US
dc.sourceMIT web domainen_US
dc.titleLeakage-resilient coin tossingen_US
dc.typeBook chapteren_US
dc.identifier.citationBoyle, Elette, Shafi Goldwasser, and Yael Tauman Kalai. “Leakage-Resilient Coin Tossing.” Distributed Computing. Ed. David Peleg. Vol. 6950. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. 181-196. © 2011 Springeren_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.approverGoldwasser, Shafrira
dc.contributor.mitauthorBoyle, Elette
dc.contributor.mitauthorGoldwasser, Shafi
dc.relation.journalDistributed Computingen_US
dc.eprint.versionFinal published versionen_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
dspace.orderedauthorsBoyle, Elette; Goldwasser, Shafi; Kalai, Yael Taumanen
dc.identifier.orcidhttps://orcid.org/0000-0003-4728-1535
mit.licenseOPEN_ACCESS_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record