MASCOT Association for Computing Machinery
Our protocol is based on an arithmetic view of oblivious transfer, with careful consistency checks and other techniques to obtain malicious security at a cost of less than 6 times that of semihonest security. We describe a highly optimized implementation together with experimental results for up to five parties.