Paper 2020/1249
Adversarial Level Agreements for Two-Party Protocols
Marilyn George and Seny Kamara
Abstract
Adversaries in cryptography have traditionally been modeled as either semi-honest or malicious. Over the years, however, several lines of work have investigated the design of cryptographic protocols against rational adversaries. The most well-known example are covert adversaries in secure computation (Aumann & Lindell, TCC '07) which are adversaries that wish to deviate from the protocol but without being detected. To protect against such adversaries, protocols secure in the covert model guarantee that deviations are detected with probability at least
Metadata
- Available format(s)
-
PDF
- Category
- Cryptographic protocols
- Publication info
- Preprint. MINOR revision.
- Keywords
- Adversarial Level Agreements2PCCovert SecurityGame TheoryRational CryptographyProofs of Storage
- Contact author(s)
- marilyn_george @ brown edu
- History
- 2020-10-09: received
- Short URL
- https://ia.cr/2020/1249
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2020/1249, author = {Marilyn George and Seny Kamara}, title = {Adversarial Level Agreements for Two-Party Protocols}, howpublished = {Cryptology {ePrint} Archive, Paper 2020/1249}, year = {2020}, url = {https://eprint.iacr.org/2020/1249} }