First page Back Continue Last page Overview Graphics
[GMW87]  Protocol Compilation
- Aim: force the malicious parties to follow the protocol specification.
- How?- Parties commit to inputs
- Parties commit to uniform  random tapes (use secure coin-tossing to ensure uniformity)
- Parties use zero-knowledge protocols to prove that every message sent is according to the protocol (and consistent with the committed input and random-tape).
 
Notes: