Home  >>  Research

Collusion-free Protocols

Matt Lepinski and Silvio Micali and abhi shelat
Symposium on the Theory of Computation (STOC'05), Baltimore, MD, May 2005, p.543-552.
Secure protocols attempt to minimize the injuries to privacy and correctness inflicted by malicious participants who collude during run-time.  They do not, however, prevent malicious parties from colluding and coordinating their actions in the first place!

Eliminating such collusion of malicious parties during the execution of a protocol is an important and exciting direction for research in Cryptography.  We contribute the first general result in this direction:


  1. We provide a rigorous definition of what a collusion-free protocol is; and
  2. We prove that, under standard physical and computational assumptions ---i.e., plain envelopes and trapdoor permutations---collusion-free protocols exist for all finite protocol tasks with publicly observable actions.

(Note that such tasks are allowed to have secret global state, and thus include Poker, Bridge, and other such games.)

[PDF]

0 TrackBacks

Listed below are links to blogs that reference this entry: Collusion-free Protocols.

TrackBack URL for this entry: http://www.cs.virginia.edu/~shelat/mt/mt-tb.cgi/8

Leave a comment

(If you haven't left a comment here before, you may need to be approved by the site owner before your comment will appear. Until then, it won't appear on the entry. Thanks for waiting.)