Abstract
Security of distributed cryptographic protocols usually requires privacy (inputs of the honest parties remain hidden), correctness (the adversary cannot improperly affect the outcome), and fairness (if the adversary learns the output, all honest parties do also). Cleve's seminal result (STOC '86) implies that satisfying these properties simultaneously is impossible in the presence of dishonest majorities, and led to several proposals for relaxed notions of fairness. While these works also suggest completeness results (i.e., the ability to design protocols which achieve their fairness notion), their assessment is typically of an all-or-nothing nature. In this work we put forth a new approach for defining relaxed fairness guarantees that allows for a quantitative comparison between protocols with regard to the level of fairness they achieve. The basic idea is to use an appropriate utility function to express the preferences of an adversary who wants to violate fairness. We also show optimal protocols with respect to our notion, in both the two-party and multiparty settings.
Original language | English |
---|---|
Title of host publication | Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing |
Publisher | ACM Association for Computing Machinery |
Pages | 281-290 |
Number of pages | 10 |
ISBN (Electronic) | 9781450336178 |
DOIs | |
Publication status | Published - 21 Jul 2015 |
Event | ACM Symposium on Principles of Distributed Computing - Donostia-San Sebastian, Spain Duration: 21 Jul 2015 → 23 Jul 2015 https://www.podc.org/podc2015/ |
Symposium
Symposium | ACM Symposium on Principles of Distributed Computing |
---|---|
Abbreviated title | PODC 2015 |
Country/Territory | Spain |
City | Donostia-San Sebastian |
Period | 21/07/15 → 23/07/15 |
Internet address |
Keywords / Materials (for Non-textual outputs)
- Security
- Theory