We initiate a study of security in asynchronous networks. We consider a completely asynchronous network where every two parties are connected via a private channel, and some of the parties may be faulty. We start by defining secure computation in this model. Our definition adapts the underlying principles of defining security (i.e., comparing the computation to a computation in the presence of a trusted party) to the asynchronous model. In particular, our definition takes into account the fact that the computation must be completed even if we never hear from the faulty parties. Next, we show that whatever can be securely computed in an asynchronous network in the presence of a trusted party, can be securely computed in a network in which no such trusted party exists. We distinguish two types of faults. In case of Fail-Stop faults, our construction is valid as long as the faulty parties constitute less than a thzr-d of the parties in the network. In case of general (i.e., Byzantine) faults, our construction requires that the faulty parties are less than a fourth fraction. In both cases, the resilience of our construction is optimal. Our construction generalizes known synchronous constructions by Ben-Or, Goldwasser and Wigderson. In addition, we introduce and implement several new asynchronous primitives. Among these, we note an errorless asynchronous verifiable secret sharing scheme, an asynchronous agreement on a large set that is contained in the dynamical y growing inputs of all non-faulty parties, and an on-line error-correcting procedure. * email: benor@cs.huji.ac.il t ~~ail.. canetti@tx .technion.ac.il %email: odedrfiks.technion. ac.il. Supported by grant no. 8900312 from the United States — Israel Binational Science Foundation, Jerusalem, Israel Permission to copy without fee all or part of this material ia granted provided that the copies are not made or distributed for direct commercial advantage, the ACM copyright notice and the title of the publication and its date appaar, and notice is given that copying is by permission of the Association for Computing Machinery. To copy otherwiee, or to republish, requiree a fee and/or specific permission. 25th ACM STOC ‘93-5 /93/CA, USA G 1993 ACM 0-89791 -591 -7/93 /0005 [0052 . ..$1 .50 Computer Science Dept. of Computer Science
[1]
Avi Wigderson,et al.
Completeness theorems for non-cryptographic fault-tolerant distributed computation
,
1988,
STOC '88.
[2]
Adi Shamir,et al.
How to share a secret
,
1979,
CACM.
[3]
Nathan Linial,et al.
Fault-tolerant computation in the full information model
,
1991,
[1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science.
[4]
Benny Chor,et al.
Solvability in asynchronous environments
,
1989,
30th Annual Symposium on Foundations of Computer Science.
[5]
F. MacWilliams,et al.
The Theory of Error-Correcting Codes
,
1977
.
[6]
David S. Johnson,et al.
Computers and Intractability: A Guide to the Theory of NP-Completeness
,
1978
.
[7]
Silvio Micali,et al.
Byzantine agreement in constant expected time
,
1985,
26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[8]
J. Edmonds.
Paths, Trees, and Flowers
,
1965,
Canadian Journal of Mathematics.
[9]
David Chaum,et al.
Multiparty unconditionally secure protocols
,
1988,
STOC '88.
[10]
Silvio Micali,et al.
How to play ANY mental game
,
1987,
STOC.
[11]
Eyal Kushilevitz,et al.
A zero-one law for Boolean privacy
,
1989,
STOC '89.
[12]
Gabriel Bracha,et al.
An asynchronous [(n - 1)/3]-resilient consensus protocol
,
1984,
PODC '84.
[13]
Nancy A. Lynch,et al.
Impossibility of distributed consensus with one faulty process
,
1983,
PODS '83.
[14]
Leonid A. Levin,et al.
Fair Computation of General Functions in Presence of Immoral Majority
,
1990,
CRYPTO.
[15]
Baruch Awerbuch,et al.
Complexity of network synchronization
,
1985,
JACM.
[16]
Ran Canetti,et al.
Fast asynchronous Byzantine agreement with optimal resilience
,
1993,
STOC.
[17]
O. Antoine,et al.
Theory of Error-correcting Codes
,
2022
.