scispace - formally typeset
C

Chen-Da Liu-Zhang

Researcher at ETH Zurich

Publications -  16
Citations -  128

Chen-Da Liu-Zhang is an academic researcher from ETH Zurich. The author has contributed to research in topics: Asynchronous communication & Models of communication. The author has an hindex of 4, co-authored 16 publications receiving 44 citations. Previous affiliations of Chen-Da Liu-Zhang include Carnegie Mellon University.

Papers
More filters
Book ChapterDOI

Asynchronous Byzantine Agreement with Subquadratic Communication

TL;DR: This work shows asynchronous BA protocols with (expected) subquadratic communication complexity tolerating an adaptive adversary who can corrupt f ≤ (1− )n/3 of the parties (for any > 0) and shows a secure-computation protocol in the same threat model that has o(n) communication when computing no-input functionalities with short output.
Book ChapterDOI

Always Have a Backup Plan: Fully Secure Synchronous MPC with Asynchronous Fallback

TL;DR: In this article, the authors classified protocols for secure multi-party computation (MPC) protocols according to the underlying communication model and proposed two communication models, synchronous and asynchronous MPC protocols, which differ in terms of the achievable security guarantees.
Book ChapterDOI

MPC with Synchronous Security and Asynchronous Responsiveness

TL;DR: This work concludes that setting t = n4 allows to achieve a fully secure MPC for honest majority, which in addition benefits from having substantial responsiveness, by providing matching feasibility and impossibility results.
Posted Content

Multi-Threshold Asynchronous Reliable Broadcast and Consensus.

TL;DR: This work considers the relaxed notion of multi-threshold reliable broadcast and consensus where validity, consistency and termination are guaranteed as long as f ≤ tv, f ≤ tc and f ≤ tt respectively.
Proceedings ArticleDOI

Round-Efficient Byzantine Agreement and Multi-party Computation with Asynchronous Fallback.

TL;DR: The two most commonly considered models are the synchronous one and the asynchronous one as discussed by the authors, which typically lose their security guarantees as soon as the network violates the synchrony assumptions, and asynchronous protocols remain secure regardless of the network conditions, but achieve weaker security guarantees even when the network is synchronous.