[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-dev] A threshold signature-based proposal for a shared RNG
On Mon, Jan 20, 2014 at 7:32 AM, Ian Goldberg <iang@xxxxxxxxxxxxxxx> wrote:
>> > Then again, if *that* code is written, then just having each authority
>> > operator run an instance of that code in the role of Nick, and having
>> > everyone add their results, works fine if everyone is online. It's also
>> > easy to check that the protocol succeeeded, by interpolating the
>> > resulting public keys. An actively malicious adversary during this
>> > phase would cause the protocol to fail, but I think it would be good to
>> > know that we have an actively malicious authority. ;-)
>>
>> Let's call this the "optimistic approach", and it would certainly be
>> an option, although one issue is that when it fails we can say that
>> someone is malicious but not which authority(s). Although one
>> possibility is to have the ability to fall back to a full
>> byzantine-tolerant protocol in that event.
>
> Actually, I think the above "optimistic" protocol _would_ let you
> identify the misbehaving party if each message is signed by its sender.
This runs into problems when parties claim *not* to have received
messages from others. (e.g. imagine that floor(n/2) authorities are
corrupted and claim that an uncorrupted party did not send them any
input)
--
------------------------------------------------------------------------
Nicholas Hopper
Associate Professor, Computer Science & Engineering, University of Minnesota
Visiting Research Director, The Tor Project
------------------------------------------------------------------------
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev