A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems
[chapter]
2015
Lecture Notes in Computer Science
Multiparty computation can be used for privacy-friendly outsourcing of computations on private inputs of multiple parties. A computation is outsourced to several computation parties; if not too many are corrupted (e.g., no more than half), then they cannot determine the inputs or produce an incorrect output. However, in many cases, these guarantees are not enough: we need correctness even if all computation parties may be corrupted; and we need that correctness can be verified even by parties
doi:10.1007/978-3-319-28166-7_1
fatcat:bikukz4nqbcxfeo7dg2ww76nne