In this work we revisit the SPDZ multiparty computation protocol by Damgård et al. for securely computing a function in the presence of an unbounded number of ...
Nov 10, 2016 · In contrast to the original protocol, our version allows for cheater detection. As such, our protocol is much less vulnerable to a “denial of ...
Oct 26, 2024 · In this work we revisit the SPDZ multiparty computation protocol by Damgård et al. for securely computing a function in the presence of an ...
Aug 12, 2021 · In this paper, we propose an SMC protocol that guarantees fairness by detecting a cheater prior to computing the final output. The proposed ...
To prevent malicious parties from providing incorrect shares during these reconstructions, SPDZ uses a linear MAC of the form MAC(x) = αx, where α is the MAC ...
A possible mitigation to this problem in the context of SPDZ- based protocols was introduced in the form of cheater detection [41], where dishonest parties can ...
Settling for the second best, there are many works focusing on the detection of the cheaters. We construct a SPDZ-like protocol which achieves fairness when ...
Secure multi-party computation (MPC) protocols do not completely prevent malicious parties from cheating or disrupting the computation.
People also ask
What is the cheating detection mechanism?
Which privacy design strategy is secure multi-party computation?
What is an example of a multi-party computation?
What is spdz?
In this paper, we construct a SPDZ-like protocol that achieves fairness when there are at most n/2 cheaters and identifiable abort for dishonest majority ...
Aug 18, 2024 · Cheater identification in secure multi-party computation (MPC) allows the honest parties to agree upon the identity of a cheating party, ...