The Security Power of the Ballot Box

We show that any function F can be securely evaluated by a protocolwith ballots and a ballot box. That is, N mutually suspicious players,each player possessing a secret input, can use ballots and a ballotbox to jointly evaluate F on their secret inputs so that (no matterhow many players may collude...

Full description

Bibliographic Details
Main Authors: Lepinski, Matt, Izmalkov, Sergei
Other Authors: Cryptography and Information Security
Language:en_US
Published: 2005
Online Access:http://hdl.handle.net/1721.1/30519