2015
DOI: 10.1007/978-3-319-28166-7_1
|View full text |Cite
|
Sign up to set email alerts
|

Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems

Abstract: Abstract. Multiparty computation can be used for privacy-friendly outsourcing of computations on private inputs of multiple parties. A computation is outsourced to several computation parties; if not too many are corrupted (e.g., no more than half), then they cannot determine the inputs or produce an incorrect output. However, in many cases, these guarantees are not enough: we need correctness even if all computation parties may be corrupted; and we need that correctness can be verified even by parties that di… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
41
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 33 publications
(41 citation statements)
references
References 23 publications
0
41
0
Order By: Relevance
“…Combining verifiability with privacy has traditionally only been considered for particular applications such as e-voting [CF85,SK95], but recent works [dH12,BDO14,SV15] have also started studying the problem of verifiability for general multiparty computation. In essence (like in our work) the correctness proofs of these works rely on zero-knowledge proofs of correct multiplication and decryption: of Paillier encryptions in [dH12,SV15], and of somewhat homomorphic encryptions in [BDO14].…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Combining verifiability with privacy has traditionally only been considered for particular applications such as e-voting [CF85,SK95], but recent works [dH12,BDO14,SV15] have also started studying the problem of verifiability for general multiparty computation. In essence (like in our work) the correctness proofs of these works rely on zero-knowledge proofs of correct multiplication and decryption: of Paillier encryptions in [dH12,SV15], and of somewhat homomorphic encryptions in [BDO14].…”
Section: Related Workmentioning
confidence: 99%
“…In essence (like in our work) the correctness proofs of these works rely on zero-knowledge proofs of correct multiplication and decryption: of Paillier encryptions in [dH12,SV15], and of somewhat homomorphic encryptions in [BDO14]. Compared to these works, this work proposes a private multiplier approach that enables the use of the much more efficient ElGamal encryption scheme (besides introducing the approach of certificate validation).…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations