Sciweavers

Share
PODC
2015
ACM

Adaptively Secure Computation with Partial Erasures

3 years 3 months ago
Adaptively Secure Computation with Partial Erasures
Adaptive security is a strong corruption model that captures “hacking” attacks where an external attacker breaks into parties’ machines in the midst of a protocol execution. There are two types of adaptively-secure protocols: adaptive with erasures and adaptive without erasures. Achieving adaptivity without erasures is preferable, since secure erasures are not always trivial. However, it seems far harder. We introduce a new model of adaptive security called adaptive security with partial erasures that allows erasures, but only assumes them in a minimal sense. Specifically, if all parties are corrupted then security holds as long as any single party successfully erases. In addition, security holds if any proper subset of the parties is corrupted without erasures. We initiate a theoretical study of this new notion and demonstrate that secure computation in this setting is as efficient as static secure computation. In addition, we study the relations between semi-adaptive securit...
Carmit Hazay, Yehuda Lindell, Arpita Patra
Added 16 Apr 2016
Updated 16 Apr 2016
Type Journal
Year 2015
Where PODC
Authors Carmit Hazay, Yehuda Lindell, Arpita Patra
Comments (0)
books