Skip to main content

Showing 1–3 of 3 results for author: Liu-Zhang, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.02431  [pdf, other

    cs.DC cs.CR

    Delphi: Efficient Asynchronous Approximate Agreement for Distributed Oracles

    Authors: Akhil Bandarupalli, Adithya Bhat, Saurabh Bagchi, Aniket Kate, Chen-Da Liu-Zhang, Michael K. Reiter

    Abstract: Agreement protocols are crucial in various emerging applications, spanning from distributed (blockchains) oracles to fault-tolerant cyber-physical systems. In scenarios where sensor/oracle nodes measure a common source, maintaining output within the convex range of correct inputs, known as convex validity, is imperative. Present asynchronous convex agreement protocols employ either randomization,… ▽ More

    Submitted 7 May, 2024; v1 submitted 3 May, 2024; originally announced May 2024.

    Comments: 14 pages, 8 figures, Accepted to DSN 2024

  2. arXiv:2309.01466  [pdf, ps, other

    cs.CR cs.DC

    Communication Lower Bounds for Cryptographic Broadcast Protocols

    Authors: Erica Blum, Elette Boyle, Ran Cohen, Chen-Da Liu-Zhang

    Abstract: Broadcast protocols enable a set of $n$ parties to agree on the input of a designated sender, even facing attacks by malicious parties. In the honest-majority setting, randomization and cryptography were harnessed to achieve low-communication broadcast with sub-quadratic total communication and balanced sub-linear cost per party. However, comparatively little is known in the dishonest-majority set… ▽ More

    Submitted 4 September, 2023; originally announced September 2023.

    Comments: A preliminary version of this work appeared in DISC 2023

  3. arXiv:2305.00356  [pdf

    quant-ph cs.CR

    Computational Quantum Secret Sharing

    Authors: Alper Çakan, Vipul Goyal, Chen-Da Liu-Zhang, João Ribeiro

    Abstract: Quantum secret sharing (QSS) allows a dealer to distribute a secret quantum state among a set of parties so that certain subsets can reconstruct the secret, while unauthorized subsets obtain no information. While QSS was introduced over twenty years ago, previous works focused only on existence of perfectly secure schemes, and the share size of the known schemes is exponential even for access stru… ▽ More

    Submitted 29 April, 2023; originally announced May 2023.