- How to guarantee the generator’s input consistency
- How to support different outputs for each player without adding extra gates to the circuit of the function f being computed
- How the evaluator can retrieve input keys but avoid selective failure attacks
- Challenging 3/5 of the circuits is near optimal for cut-and-choose (and better than challenging 1/2)
Our protocols require the existence of secure-OT and claw-free functions that have a weak malleability property. We discuss an experimental implementation of our protocol to validate our efficiency claims.
Category / Keywords: applications / Publication Info: full version of our EUROCRYPT'11 paper Date: received 30 Sep 2011, last revised 30 Sep 2011 Contact author: shench at virginia edu Available format(s): PDF | BibTeX Citation Note: remove an redundant table and a repeat section Version: 20111001:045442 (All versions of this report) Short URL: ia.cr/2011/533 Discussion forum: Show discussion | Start new discussion