[Resource Topic] 2014/060: Verifiable Computation in Multiparty Protocols with Honest Majority

Welcome to the resource topic for 2014/060

Title:
Verifiable Computation in Multiparty Protocols with Honest Majority

Authors: Peeter Laud, Alisa Pankova

Abstract:

We present a generic method for turning passively secure protocols into protocols secure against covert attacks. The method adds a post-execution verification phase to the protocol that allows a misbehaving party to escape detection only with negligible probability. The execution phase, after which the computed protocol result is already available for parties, has only negligible overhead added by our method. The checks, based on linear probabilistically checkable proofs, are done in zero-knowledge, thereby preserving the privacy guarantees of the original protocol. Our method is inspired by recent results in verifiable computation, adapting them to multiparty setting and significantly lowering their computational costs for the provers.

ePrint: https://eprint.iacr.org/2014/060

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .