6 research outputs found

    Finding traitors in secure networks using Byzantine agreements

    Get PDF
    Secure networks rely upon players to maintain security and reliability. However not every player can be assumed to have total loyalty and one must use methods to uncover traitors in such networks. We use the original concept of the Byzantine Generals Problem by Lamport [8], and the more formal Byzantine Agreement describe by Linial [10], to find traitors in secure networks. By applying general fault-tolerance methods to develop a more formal design of secure networks we are able to uncover traitors amongst a group of players. We also propose methods to integrate this system with insecure channels. This new resiliency can be applied to broadcast and peer-to-peer secure com- munication systems where agents may be traitors or be- come unreliable due to faults

    Efficient TTP-free mental poker protocols

    Get PDF
    Zhao et al proposed an efficient mental poker protocol which did not require using a trusted third party (TTP). The protocol is efficient and suitable for any number of players but it introduces a security flaw. In this paper, we propose two mental poker protocols based on Zhao's previous work. The security flaw has been removed and the additional computing cost is small.6 page(s

    A Fast Mental Poker Protocol

    Get PDF
    Abstract. We present a fast and secure mental poker protocol. It is twice as fast as Barnett-Smart\u27s and CastellĂ -Roca\u27s protocols. This protocol is provably secure under DDH assumption

    Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement

    Get PDF
    The research on secure poker protocols without trusted intermediaries has a long history that dates back to modern cryptography\u27s infancy. Two main challenges towards bringing it into real-life are enforcing the distribution of the rewards, and penalizing misbehaving/aborting parties. Using recent advances on cryptocurrencies and blockchain technologies, Andrychowicz et al. (IEEE S\&P 2014 and FC 2014 BITCOIN Workshop) were able to address those problems. Improving on these results, Kumaresan et al. (CCS 2015) and Bentov et al. (ASIACRYPT 2017) proposed specific purpose poker protocols that made significant progress towards meeting the real-world deployment requirements. However, their protocols still lack either efficiency or a formal security proof in a strong model. Specifically, the work of Kumaresan et al. relies on Bitcoin and simple contracts, but is not very efficient as it needs numerous interactions with the cryptocurrency network as well as a lot of collateral. Bentov et al. achieve further improvements by using stateful contracts and off-chain execution: they show a solution based on general multiparty computation that has a security proof in a strong model, but is also not very efficient. Alternatively, it proposes to use tailor-made poker protocols as a building block to improve the efficiency. However, a security proof is unfortunately still missing for the latter case: the security properties the tailor-made protocol would need to meet were not even specified, let alone proven to be met by a given protocol. Our solution closes this undesirable gap as it concurrently: (1) enforces the rewards\u27 distribution; (2) enforces penalties on misbehaving parties; (3) has efficiency comparable to the tailor-made protocols; (4) has a security proof in a simulation-based model of security. Combining techniques from the above works, from tailor-made poker protocols and from efficient zero-knowledge proofs for shuffles, and performing optimizations, we obtain a solution that satisfies all four desired criteria and does not incur a big burden on the blockchain

    Discrete Geometry and Convexity in Honour of Imre Bárány

    Get PDF
    This special volume is contributed by the speakers of the Discrete Geometry and Convexity conference, held in Budapest, June 19–23, 2017. The aim of the conference is to celebrate the 70th birthday and the scientific achievements of professor Imre Bárány, a pioneering researcher of discrete and convex geometry, topological methods, and combinatorics. The extended abstracts presented here are written by prominent mathematicians whose work has special connections to that of professor Bárány. Topics that are covered include: discrete and combinatorial geometry, convex geometry and general convexity, topological and combinatorial methods. The research papers are presented here in two sections. After this preface and a short overview of Imre Bárány’s works, the main part consists of 20 short but very high level surveys and/or original results (at least an extended abstract of them) by the invited speakers. Then in the second part there are 13 short summaries of further contributed talks. We would like to dedicate this volume to Imre, our great teacher, inspiring colleague, and warm-hearted friend
    corecore