Our method uses shared verification based on precomputed multiplication triples. Such triples are often used to make the protocol execution itself faster, but in this work we make use of these triples especially for verification. The verification preserves the privacy guarantees of the original protocol, and it can be straightforwardly applied to protocols over finite rings, even if the same protocol performs its computation over several distinct rings at once.
Category / Keywords: cryptographic protocols / secure multiparty computation, verification Date: received 4 Jul 2015 Contact author: peeter at cyber ee Available format(s): PDF | BibTeX Citation Version: 20150705:180527 (All versions of this report) Short URL: ia.cr/2015/674 Discussion forum: Show discussion | Start new discussion