Abstract
We present a unified view of the two-party and multi-party computation protocols based on oblivious transfer first outlined in Nielsen et al. (CRYPTO 2012) and Larraia et al. (CRYPTO 2014). We present a number of modifications and improvements to these earlier presentations, as well as full proofs of the entire protocol. Improvements include a unified pre-processing and online MAC methodology, mechanisms to pass between different MAC variants and fixing a minor bug in the protocol of Larraia et al. in relation to a selective failure attack. It also fixes a minor bug in Nielsen et al. resulting from using Jensen’s inequality in the wrong direction in an analysis.
| Original language | English |
|---|---|
| Article number | 34 |
| Journal | Journal of Cryptology |
| Volume | 34 |
| Issue | 3 |
| Number of pages | 87 |
| ISSN | 0933-2790 |
| DOIs | |
| Publication status | Published - Jul 2021 |
Keywords
- Multi-party computation
- Oblivious transfer
- Secret sharing