First page Back Continue Last page Overview Graphics
[GMW87] Protocol Compilation
Aim: force the malicious parties to follow the protocol specification.
How?
- Parties commit to inputs
- Parties commit to uniform random tapes (use secure coin-tossing to ensure uniformity)
- Parties use zero-knowledge protocols to prove that every message sent is according to the protocol (and consistent with the committed input and random-tape).
Notes: