“In the dishonest-majority setting, generic secure multiparty computation (MPC) protocols are fundamentally vulnerable to attacks in which malicious participants learn their outputs and then force the protocol to abort before outputs are delivered to the honest participants. … We present a novel approach for realizing functionalities with a weak form of input-revealing [identifiable abort], which is based on delicate and selective revealing of committed input values. We refer to this new approach as vindicating release.”
Find the paper and full list of authors at Cryptology ePrint Archive.