Secure multi-party computation: A tutorial

Manoj M. Prabhakaran

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Secure Multi-Party Computation (MPC) is a central problem in modern cryptography, that allows mutually distrusting parties to collaborate with each other on computational tasks, without compromising their private data (beyond what the output of the computation reveals). In this tutorial we shall cover some of the basic concepts behind MPC, informed by recent developments in the field. The first half of the tutorial will introduce the concept of MPC and briefly present some of the classic constructions, including Yao’s Garbled Circuits, the GMW protocol and the BGW protocol. We shall then see some blackbox transformations that can be applied to simpler protocols, to achieve higher security or efficiency goals. The second half of the tutorial will deal with fundamental issues in the theory of MPC. These include definitions of security, classification of MPC tasks according to their cryptographic complexity (including characterization of tasks as possible or impossible to carry out), and questions regarding the communication complexity of MPC.

Original languageEnglish (US)
Title of host publicationProgress in Cryptology – INDOCRYPT 2015 - 16th International Conference on Cryptology in India, Proceedings
EditorsAlex Biryukov, Vipul Goyal
PublisherSpringer-Verlag
ISBN (Print)9783319266169
StatePublished - Jan 1 2015
Event16th International Conference on Cryptology in India, INDOCRYPT 2015 - Bangalore, India
Duration: Dec 6 2015Dec 9 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9462
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other16th International Conference on Cryptology in India, INDOCRYPT 2015
CountryIndia
CityBangalore
Period12/6/1512/9/15

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Secure multi-party computation: A tutorial'. Together they form a unique fingerprint.

Cite this