A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
[chapter]
2009
Lecture Notes in Computer Science
While general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model, there are SFE protocols (Goldreich et al. [STOC'87]) that are computationally secure (without fairness) in presence of an actively corrupted majority of the participants. Now, computational assumptions can usually be well justified at the time of protocol execution. The concern is rather a potential violation of the privacy of
doi:10.1007/978-3-642-00457-5_15
fatcat:adwisetkbrexpgrul5fsiv65mq