dc.contributor.author | Boyle, Elette | |
dc.contributor.author | Goldwasser, Shafi | |
dc.date.accessioned | 2012-07-18T13:06:47Z | |
dc.date.available | 2012-07-18T13:06:47Z | |
dc.date.issued | 2011-01 | |
dc.date.submitted | 2011-06 | |
dc.identifier.isbn | 978-3-642-24099-7 | |
dc.identifier.issn | 0302-9743 | |
dc.identifier.issn | 1611-3349 | |
dc.identifier.uri | http://hdl.handle.net/1721.1/71675 | |
dc.description | Proceedings 25th International Symposium, DISC 2011, Rome, Italy, September 20-22, 2011. | en_US |
dc.description.abstract | The ability to collectively toss a common coin among n parties
in the presence of faults is an important primitive in the arsenal of
randomized distributed protocols. In the case of dishonest majority, it
was shown to be impossible to achieve less than 1
r bias in O(r) rounds
(Cleve STOC ’86). In the case of honest majority, in contrast, unconditionally
secure O(1)-round protocols for generating common unbiased
coins follow from general completeness theorems on multi-party secure
protocols in the secure channels model (e.g., BGW, CCD STOC ’88).
However, in the O(1)-round protocols with honest majority, parties
generate and hold secret values which are assumed to be perfectly hidden
from malicious parties: an assumption which is crucial to proving the
resulting common coin is unbiased. This assumption unfortunately does
not seem to hold in practice, as attackers can launch side-channel attacks
on the local state of honest parties and leak information on their secrets.
In this work, we present an O(1)-round protocol for collectively generating
an unbiased common coin, in the presence of leakage on the local
state of the honest parties. We tolerate t ≤ ( 1
3
− )n computationallyunbounded
Byzantine faults and in addition a Ω(1)-fraction leakage on
each (honest) party’s secret state. Our results hold in the memory leakage
model (of Akavia, Goldwasser, Vaikuntanathan ’08) adapted to the
distributed setting.
Additional contributions of our work are the tools we introduce to
achieve the collective coin toss: a procedure for disjoint committee election,
and leakage-resilient verifiable secret sharing. | en_US |
dc.description.sponsorship | National Defense Science and Engineering Graduate Fellowship | en_US |
dc.description.sponsorship | National Science Foundation (U.S.) (CCF-1018064) | en_US |
dc.language.iso | en_US | |
dc.publisher | Spring Berlin/Heidelberg | en_US |
dc.relation.isversionof | http://dx.doi.org/ 10.1007/978-3-642-24100-0_16 | en_US |
dc.rights | Creative Commons Attribution-Noncommercial-Share Alike 3.0 | en_US |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/3.0/ | en_US |
dc.source | MIT web domain | en_US |
dc.title | Leakage-resilient coin tossing | en_US |
dc.type | Book chapter | en_US |
dc.identifier.citation | Boyle, Elette, Shafi Goldwasser, and Yael Tauman Kalai. “Leakage-Resilient Coin Tossing.” Distributed Computing. Ed. David Peleg. Vol. 6950. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. 181-196. © 2011 Springer | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | en_US |
dc.contributor.approver | Goldwasser, Shafrira | |
dc.contributor.mitauthor | Boyle, Elette | |
dc.contributor.mitauthor | Goldwasser, Shafi | |
dc.relation.journal | Distributed Computing | en_US |
dc.eprint.version | Final published version | en_US |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | en_US |
dspace.orderedauthors | Boyle, Elette; Goldwasser, Shafi; Kalai, Yael Tauman | en |
dc.identifier.orcid | https://orcid.org/0000-0003-4728-1535 | |
mit.license | OPEN_ACCESS_POLICY | en_US |
mit.metadata.status | Complete | |