International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR News item: 02 September 2015

Ran Cohen, Iftach Haitner, Eran Omri, Lior Rotem
ePrint Report ePrint Report
A major challenge in the study of cryptography is characterizing the necessary and sufficient assumptions required to carry out a given cryptographic task. The focus of this work is the necessity of a broadcast channel for securely computing symmetric functionalities (where all the parties receive the same output) when one third of the parties, or more, might be corrupted. Assuming all parties are connected via a peer-to-peer network, but no broadcast channel (nor a secure setup phase) is available, we prove the following characterization:

* A symmetric $n$-party functionality can be securely computed facing $n/3\\le t

Expand

Additional news items may be found on the IACR news page.