eprint.iacr.org will be offline for approximately an hour for routine maintenance at 11pm UTC on Tuesday, April 16. We lost some data between April 12 and April 14, and some authors have been notified that they need to resubmit their papers.
You are looking at a specific version 20140807:165329 of this paper. See the latest version.

Paper 2014/060

Verifiable Computation in Multiparty Protocols with Honest Majority

Peeter Laud and Alisa Pankova

Abstract

We present a generic method for turning passively secure protocols into protocols secure against covert attacks. The method adds a post-execution verification phase to the protocol that allows a misbehaving party to escape detection only with negligible probability. The execution phase, after which the computed protocol result is already available for parties, has only negligible overhead added by our method. The checks, based on linear probabilistically checkable proofs, are done in zero-knowledge, thereby preserving the privacy guarantees of the original protocol. Our method is inspired by recent results in verifiable computation, adapting them to multiparty setting and significantly lowering their computational costs for the provers.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Major revision. ProvSec 2014
Keywords
Secure multiparty computationverifiable computationlinear PCP
Contact author(s)
peeter @ cyber ee
History
2014-08-07: last of 2 revisions
2014-01-28: received
See all versions
Short URL
https://ia.cr/2014/060
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.