A pragmatic introduction to secure multi-party computation

D Evans, V Kolesnikov, M Rosulek - Foundations and Trends® …, 2018 - nowpublishers.com
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …

Secure multi-party computation: theory, practice and applications

C Zhao, S Zhao, M Zhao, Z Chen, CZ Gao, H Li… - Information Sciences, 2019 - Elsevier
Abstract Secure Multi-Party Computation (SMPC) is a generic cryptographic primitive that
enables distributed parties to jointly compute an arbitrary functionality without revealing their …

Ciphers for MPC and FHE

MR Albrecht, C Rechberger, T Schneider… - Advances in Cryptology …, 2015 - Springer
Designing an efficient cipher was always a delicate balance between linear and non-linear
operations. This goes back to the design of DES, and in fact all the way back to the seminal …

Authenticated garbling and efficient maliciously secure two-party computation

X Wang, S Ranellucci, J Katz - Proceedings of the 2017 ACM SIGSAC …, 2017 - dl.acm.org
We propose a simple and efficient framework for obtaining efficient constant-round protocols
for maliciously secure two-party computation. Our framework uses a function-independent …

A survey on cryptographic techniques for protecting big data security: present and forthcoming

S Lu, J Zheng, Z Cao, Y Wang, C Gu - Science China Information …, 2022 - Springer
Big data drive multidimensional convergence and profound innovations among industries
and provide novel ways of exploring the world. As they significantly create economic and …

Obliv-C: A language for extensible data-oblivious computation

S Zahur, D Evans - Cryptology ePrint Archive, 2015 - eprint.iacr.org
Many techniques for secure or private execution depend on executing programs in a data-
oblivious way, where the same instructions execute independent of the private inputs which …

Concretely efficient secure multi-party computation protocols: survey and more

D Feng, K Yang - Security and Safety, 2022 - sands.edpsciences.org
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on
their private inputs, and reveals nothing but the output of the function. In the last decade …

Senate: a {Maliciously-Secure}{MPC} platform for collaborative analytics

R Poddar, S Kalra, A Yanai, R Deng, RA Popa… - 30th USENIX Security …, 2021 - usenix.org
Many organizations stand to benefit from pooling their data together in order to draw
mutually beneficial insights—eg, for fraud detection across banks, better medical studies …

Zero-knowledge using garbled circuits: how to prove non-algebraic statements efficiently

M Jawurek, F Kerschbaum, C Orlandi - Proceedings of the 2013 ACM …, 2013 - dl.acm.org
Zero-knowledge protocols are one of the fundamental concepts in modern cryptography and
have countless applications. However, after more than 30 years from their introduction, there …

Scalable multi-party private set-intersection

C Hazay, M Venkitasubramaniam - IACR international workshop on public …, 2017 - Springer
In this work we study the problem of private set-intersection in the multi-party setting and
design two protocols with the following improvements compared to prior work. First, our …