UCL logo

UCL Discovery

UCL home » Library Services » Electronic resources » UCL Discovery

Secure protocols with asymmetric trust

Damgard, I; Desmedt, Y; Fitzi, M; Nielsen, JB; (2007) Secure protocols with asymmetric trust. In: Kurosawa, K, (ed.) ADVANCES IN CRYPTOLOGY - ASIACRYPT 2007. (pp. 357 - 375). SPRINGER-VERLAG BERLIN

Full text not available from this repository.


In the standard general-adversary model for multi-party protocols, a global adversary structure is given, and every party must trust in this particular structure. We introduce a more general model, the asymmetric-trust model, wherein every party is allowed to trust in a different, personally customized adversary structure. We have two main contributions. First, we present non-trivial lower and upper bounds for broadcast, verifiable secret sharing, and general multi-party computation in different variations of this new model. The obtained bounds demonstrate that the new model is strictly more powerful than the standard general-adversary model. Second, we propose a framework for expressing and analyzing asymmetric trust in the usual simulation paradigm for defining security of protocols, and in particular show a general composition theorem for protocols with asymmetric trust.

Type: Proceedings paper
Title: Secure protocols with asymmetric trust
Event: 13th International Conference on Theory and Application of Cryptology and Information Security
Location: Kuching, MALAYSIA
Dates: 2007-12-02 - 2007-12-06
ISBN-13: 978-3-540-76899-9
URI: http://discovery.ucl.ac.uk/id/eprint/139140
Downloads since deposit
Download activity - last month
Download activity - last 12 months
Downloads by country - last 12 months

Archive Staff Only

View Item View Item