all InfoSec news
General Adversary Structures in Byzantine Agreement and Multi-Party Computation with Active and Omission Corruption
Feb. 12, 2024, 2:12 a.m. |
IACR News www.iacr.org
ePrint Report: General Adversary Structures in Byzantine Agreement and Multi-Party Computation with Active and Omission Corruption
Konstantinos Brazitikos, Vassilis Zikas
Typical results in multi-party computation (in short, MPC) capture faulty parties by assuming a threshold adversary corrupting parties actively and/or fail-corrupting. These corruption types are, however, inadequate for capturing correct parties that might suffer temporary network failures and/or localized faults - these are particularly relevant for MPC over large, global scale networks. Omission faults and general adversary structures have been …
adversary capture computation corruption eprint report fail general mpc party report results threshold types
More from www.iacr.org / IACR News
Blockchain Price vs. Quantity Controls
1 day, 1 hour ago |
www.iacr.org
Agile, Post-quantum Secure Cryptography in Avionics
1 day, 8 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
Social Engineer For Reverse Engineering Exploit Study
@ Independent study | Remote
SITEC- Systems Security Administrator- Camp HM Smith
@ Peraton | Camp H.M. Smith, HI, United States
Cyberspace Intelligence Analyst
@ Peraton | Fort Meade, MD, United States
General Manager, Cybersecurity, Google Public Sector
@ Google | Virginia, USA; United States
Cyber Security Advisor
@ H&M Group | Stockholm, Sweden
Engineering Team Manager – Security Controls
@ H&M Group | Stockholm, Sweden