A pragmatic introduction to secure multi-party computation

D Evans, V Kolesnikov, M Rosulek - Foundations and Trends® …, 2018 - nowpublishers.com
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …

[HTML][HTML] Secure multiparty computation

Y Lindell - Communications of the ACM, 2020 - dl.acm.org
Secure multiparty computation Page 1 86 COMMUNICATIONS OF THE ACM | JANUARY 2021 |
VOL. 64 | NO. 1 review articles DISTRIBUTED COMPUTING CONSIDERS the scenario where a …

Secure multi-party computation: theory, practice and applications

C Zhao, S Zhao, M Zhao, Z Chen, CZ Gao, H Li… - Information Sciences, 2019 - Elsevier
Abstract Secure Multi-Party Computation (SMPC) is a generic cryptographic primitive that
enables distributed parties to jointly compute an arbitrary functionality without revealing their …

Outsourcing multi-party computation

S Kamara, P Mohassel, M Raykova - Cryptology ePrint Archive, 2011 - eprint.iacr.org
We initiate the study of secure multi-party computation (MPC) in a server-aided setting,
where the parties have access to a single server that (1) does not have any input to the …

MP-SPDZ: A versatile framework for multi-party computation

M Keller - Proceedings of the 2020 ACM SIGSAC conference on …, 2020 - dl.acm.org
Multi-Protocol SPDZ (MP-SPDZ) is a fork of SPDZ-2 (Keller et al., CCS'13), an
implementation of the multi-party computation (MPC) protocol called SPDZ (Damgård et al …

Secure multiparty computation goes live

P Bogetoft, DL Christensen, I Damgård… - … Conference on Financial …, 2009 - Springer
Secure Multiparty Computation Goes Live Page 1 Secure Multiparty Computation Goes Live *
Peter Bogetoft3, Dan Lund Christensen4, Ivan Damgård2, Martin Geisler2, Thomas Jakobsen4 …

Scapi: The secure computation application programming interface

Y Ejgenberg, M Farbstein, M Levy… - Cryptology ePrint Archive, 2012 - eprint.iacr.org
Secure two-party and multiparty computation has long stood at the center of the foundations
of theoretical cryptography. Recently, however, interest has grown regarding the efficiency of …

Fluid MPC: secure multiparty computation with dynamic participants

AR Choudhuri, A Goel, M Green, A Jain… - Advances in Cryptology …, 2021 - Springer
Existing approaches to secure multiparty computation (MPC) require all participants to
commit to the entire duration of the protocol. As interest in MPC continues to grow, it is …

High-throughput secure three-party computation for malicious adversaries and an honest majority

J Furukawa, Y Lindell, A Nof, O Weinstein - … international conference on …, 2017 - Springer
In this paper, we describe a new protocol for secure three-party computation of any
functionality, with an honest majority and a malicious adversary. Our protocol has both an …

[HTML][HTML] Secure multi-party computation made simple

U Maurer - Discrete Applied Mathematics, 2006 - Elsevier
Known secure multi-party computation protocols are quite complex, involving non-trivial
mathematical structures and sub-protocols. The purpose of this paper is to present a very …