pith. machine review for the scientific record. sign in

arxiv: 0706.2010 · v1 · submitted 2007-06-13 · 💻 cs.CR

Recognition: unknown

Information-theoretic security without an honest majority

Authors on Pith no claims yet
classification 💻 cs.CR
keywords protocolshonestmajorityanonymousbroadcastchannelcorruptinformation-theoretic
0
0 comments X
read the original abstract

We present six multiparty protocols with information-theoretic security that tolerate an arbitrary number of corrupt participants. All protocols assume pairwise authentic private channels and a broadcast channel (in a single case, we require a simultaneous broadcast channel). We give protocols for veto, vote, anonymous bit transmission, collision detection, notification and anonymous message transmission. Not assuming an honest majority, in most cases, a single corrupt participant can make the protocol abort. All protocols achieve functionality never obtained before without the use of either computational assumptions or of an honest majority.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 2 Pith papers

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. A process-based dynamic occupancy model to study range dynamics under non-equilibrium conditions

    q-bio.PE 2026-05 unverdicted novelty 7.0

    A new process-based dynamic occupancy model with dispersal-pressure colonization and sparse matrices enables large-scale study of range dynamics and disentangles dispersal from habitat effects in non-equilibrium conditions.

  2. Descriptor: Parasitoid Wasps and Associated Hymenoptera Dataset (DAPWH)

    cs.CV 2026-02 unverdicted novelty 7.0

    Releases the DAPWH dataset of 3556 wasp images including 1739 COCO-annotated examples to enable AI models for identifying Ichneumonoidea and associated families.