all InfoSec news
General Adversary Structures in Byzantine Agreement and Multi-Party Computation with Active and Omission Corruption
Feb. 12, 2024, 2:12 a.m. |
IACR News www.iacr.org
ePrint Report: General Adversary Structures in Byzantine Agreement and Multi-Party Computation with Active and Omission Corruption
Konstantinos Brazitikos, Vassilis Zikas
Typical results in multi-party computation (in short, MPC) capture faulty parties by assuming a threshold adversary corrupting parties actively and/or fail-corrupting. These corruption types are, however, inadequate for capturing correct parties that might suffer temporary network failures and/or localized faults - these are particularly relevant for MPC over large, global scale networks. Omission faults and general adversary structures have been …
adversary capture computation corruption eprint report fail general mpc party report results threshold types
More from www.iacr.org / IACR News
Indistinguishability Obfuscation from Bilinear Maps and LPN Variants
2 days, 5 hours ago |
www.iacr.org
Securing the Future of GenAI: Policy and Technology
2 days, 5 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Sr. Product Manager
@ MixMode | Remote, US
Security Compliance Strategist
@ Grab | Petaling Jaya, Malaysia
Cloud Security Architect, Lead
@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)