PriVeto: a fully private two round veto protocol.
|Authors||Samiran, Bag, Muhammad Ajmal, Azad and Feng, Hao|
Veto is a prerogative to unilaterally overrule a decision. A private veto protocol consists of a number of participants who wish to decide whether or not to veto a particular motion without revealing the individual opinions. Essentially all participants jointly perform a multi-party computation (MPC) on a boolean-OR function where an input of "1" represents veto and "0" represents not veto. In 2006, Hao and Zieli´ nski presented a two round veto protocol named Anonymous Veto network (AV-net), which is exceptionally efficient in terms of the number of rounds, computation and bandwidth usage. However, AV-net has two generic issues: 1) a participant who has submitted a veto can find out whether she is the only one who vetoed; 2) the last participant who submits her input can pre-compute the boolean-OR result before submission, and may amend her input based on that knowledge. These two issues generally apply to any multi-round veto protocol where participants commit their input in the last round. In this paper, we propose a novel solution to address both issues within two rounds, which are the best possible round efficiency for a veto protocol. Our new private veto protocol, called PriVeto, has similar system complexities to AV-net, but it binds participants to their inputs in the very first round, eliminating the possibility of runtime changes to any of the inputs. At the end of the protocol, participants are strictly limited to learning nothing more than the output of the boolean-OR function and their own inputs.
|Journal||IET Information Security|
|Publisher||Institution of Engineering and Technology|
|Digital Object Identifier (DOI)||https://doi.org/10.1049/iet-ifs.2018.5115|
|Web address (URL)||http://hdl.handle.net/10545/623838|
|Publication dates||04 Dec 2018|
|Publication process dates|
|Deposited||12 Jun 2019, 08:36|
|Accepted||30 Nov 2018|
This paper is a postprint of a paper submitted to and accepted for publication in IET Information Security and is subject to Institution of Engineering and Technology Copyright. The copy of record is available at the IET Digital Library.
|Contributors||Warwick University and Derby University|
File Access Level
File Access Level
1views this month
0downloads this month