International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR News item: 05 July 2015

Peeter Laud, Alisa Pankova
ePrint Report ePrint Report
This paper presents a generic method for turning passively secure protocols into protocols secure against covert attacks, adding an offline preprocessing and a cheap post-execution verification phase. The execution phase, after which the computed result is already available to the parties, has only negligible overhead.

Our method uses shared verification based on precomputed multiplication triples. Such triples are often used to make the protocol execution itself faster, but in this work we make use of these triples especially for verification. The verification preserves the privacy guarantees of the original protocol, and it can be straightforwardly applied to protocols over finite rings, even if the same protocol performs its computation over several distinct rings at once.

Expand

Additional news items may be found on the IACR news page.