Sciweavers

SSS
2010
Springer

Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure

13 years 2 months ago
Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure
Abstract. Given a public-key infrastructure (PKI) and digital signatures, it is possible to construct broadcast protocols tolerating any number of corrupted parties. Almost all existing protocols, however, do not distinguish between corrupted parties (who do not follow the protocol), and honest parties whose secret (signing) keys have been compromised (but who continue to behave honestly). We explore conditions under which it is possible to construct broadcast protocols that still provide the usual guarantees (i.e., validity/agreement) to the latter. Consider a network of n parties, where an adversary has compromised the secret keys of up to tc honest parties and, in addition, fully controls the behavior of up to ta other parties. We show that for any fixed tc > 0, and any fixed ta, there exists an efficient protocol for broadcast if and only if 2ta + min(ta, tc) < n. (When tc = 0, standard results imply feasibility.) We also show that if tc, ta are not fixed, but are only gua...
S. Dov Gordon, Jonathan Katz, Ranjit Kumaresan, Ar
Added 30 Jan 2011
Updated 30 Jan 2011
Type Journal
Year 2010
Where SSS
Authors S. Dov Gordon, Jonathan Katz, Ranjit Kumaresan, Arkady Yerukhimovich
Comments (0)