The Library
PriVeto : a fully private two round veto protocol
Tools
Bag, Samiran, Azad, Muhammad Ajmal and Hao, Feng (2019) PriVeto : a fully private two round veto protocol. IET Control Theory and Applications, 13 (4). pp. 311-320. doi:10.1049/iet-ifs.2018.5115 ISSN 1751-8644.
|
PDF
WRAP-PriVeto-fully-private-two-round-veto-protocol-Hao-2018.pdf - Accepted Version - Requires a PDF viewer. Download (590Kb) | Preview |
Official URL: https://doi.org/10.1049/iet-ifs.2018.5115
Abstract
Veto is a prerogative to unilaterally overrule a decision. A private veto protocol consists of a number of participants who wish to decide whether or not to veto a particular motion without revealing the individual opinions. Essentially all participants jointly perform a multi-party computation (MPC) on a boolean-OR function where an input of "1" represents veto and "0" represents not veto. In 2006, Hao and Zieli´ nski presented a two round veto protocol named Anonymous Veto network (AV-net), which is exceptionally efficient in terms of the number of rounds, computation and bandwidth usage. However, AV-net has two generic issues: 1) a participant who has submitted a veto can find out whether she is the only one who vetoed; 2) the last participant who submits her input can pre-compute the boolean-OR result before submission, and may amend her input based on that knowledge. These two issues generally apply to any multi-round veto protocol where participants commit their input in the last round. In this paper, we propose a novel solution to address both issues within two rounds, which are the best possible round efficiency for a veto protocol. Our new private veto protocol, called PriVeto, has similar system complexities to AV-net, but it binds participants to their inputs in the very first round, eliminating the possibility of runtime changes to any of the inputs. At the end of the protocol, participants are strictly limited to learning nothing more than the output of the boolean-OR function and their own inputs.
Item Type: | Journal Article | ||||||||
---|---|---|---|---|---|---|---|---|---|
Subjects: | Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software | ||||||||
Divisions: | Faculty of Science, Engineering and Medicine > Engineering > Engineering | ||||||||
Library of Congress Subject Headings (LCSH): | Computer security , Formal methods (Computer science) , Computer networks -- Security measures , Data protection, Cryptography | ||||||||
Journal or Publication Title: | IET Control Theory and Applications | ||||||||
Publisher: | Institution of Engineering and Technology | ||||||||
ISSN: | 1751-8644 | ||||||||
Official Date: | July 2019 | ||||||||
Dates: |
|
||||||||
Volume: | 13 | ||||||||
Number: | 4 | ||||||||
Page Range: | pp. 311-320 | ||||||||
DOI: | 10.1049/iet-ifs.2018.5115 | ||||||||
Institution: | University of Warwick | ||||||||
Status: | Peer Reviewed | ||||||||
Publication Status: | Published | ||||||||
Reuse Statement (publisher, data, author rights): | This paper is a postprint of a paper submitted to and accepted for publication in IET Control Theory and Applications and is subject to Institution of Engineering and Technology Copyright. The copy of record is available at the IET Digital Library | ||||||||
Access rights to Published version: | Restricted or Subscription Access | ||||||||
Date of first compliant deposit: | 5 December 2018 | ||||||||
Date of first compliant Open Access: | 3 January 2019 | ||||||||
Funder: | ERC | ||||||||
RIOXX Funder/Project Grant: |
|
||||||||
Related URLs: |
Request changes or add full text files to a record
Repository staff actions (login required)
View Item |
Downloads
Downloads per month over past year