Verifiable computation in multiparty protocols with honest majority

8Citations
Citations of this article
18Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We present a generic method for turning passively secure protocols into protocols secure against covert attacks. The method adds a post-execution verification phase to the protocol that allows a misbehaving party to escape detection only with negligible probability. The execution phase, after which the computed protocol result is already available for parties, has only negligible overhead added by our method. The checks, based on linear probabilistically checkable proofs, are done in zero-knowledge, thereby preserving the privacy guarantees of the original protocol. Our method is inspired by recent results in verifiable computation, adapting them to multiparty setting and significantly lowering their computational costs for the provers.

Cite

CITATION STYLE

APA

Laud, P., & Pankova, A. (2014). Verifiable computation in multiparty protocols with honest majority. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8782, 146–161. https://doi.org/10.1007/978-3-319-12475-9_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free