Efficient Two Party and Multi Party Computation Against Covert Adversaries

  title={Efficient Two Party and Multi Party Computation Against Covert Adversaries},
  author={Vipul Goyal and Payman Mohassel and Adam D. Smith},
Recently, Aumann and Lindell introduced a new realistic security model for secure computation, namely, security against covert adversaries. The main motivation was to obtain secure computation protocols which are efficient enough to be usable in practice. Aumann and Lindell presented an efficient two party computation protocol secure against covert adversaries. They were able to utilize cut and choose techniques rather than relying on expensive zero knowledge proofs. In this paper, we design an… CONTINUE READING
Highly Influential
This paper has highly influenced 10 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 108 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 67 extracted citations

109 Citations

Citations per Year
Semantic Scholar estimates that this publication has 109 citations based on the available data.

See our FAQ for additional information.

Similar Papers

Loading similar papers…