SBA. In Section G, we present a broadcast protocol Πta,ts Πta,ts running in a fixed number of rounds that is weakly valid in asynchronous networks. Our solution is inspired by a synchronous construction that obtains BC from BA, but requires some modifications to achieve security guarantees in asynchronous networks. Combining this with results from previous sections, we obtain an MPC protocol running in O(κ) rounds with respect to n. More specifically, HBA SBA ABA – Lemma 1 (or Lemma 9), Lemma 2, and Lemma 4, guarantee protocol Πta,ts Πta,ts , Πta,ts from Section 5 (which runs in O(κ) rounds with respect to the number of parties n) achieves the security guarantees (i); SBC
Appears in 2 contracts
Samples: www.research-collection.ethz.ch, www.research-collection.ethz.ch
SBA. In Section G, we present a broadcast protocol Πta,ts Πta,ts running in a fixed number of rounds that is weakly valid in asynchronous networks. Our solution is inspired by a synchronous construction that obtains BC from BA, but requires some modifications to achieve security guarantees in asynchronous networks. Combining this with results from previous sections, we obtain an MPC protocol running in O(κ) rounds with respect to n. More specifically, HBA SBA ABA – Lemma 1 (or Lemma 9), Lemma 2, and Lemma Xxxxx 4, guarantee protocol Πta,ts Πta,ts , Πta,ts from Section 5 (which runs in O(κ) rounds with respect to the number of parties n) achieves the security guarantees (i); SBC
Appears in 1 contract
Samples: www.research-collection.ethz.ch