In this chapter, we formally define multiparty computation tasks and the security of protocols realizing them. We give a broad presentation of the existing constructions of secure multiparty computation (SMC) protocols and explain why they are correct and secure. We discuss the different environmental aspects of SMC protocols and explain the requirements that are necessary and sufficient for their existence.
|Title of host publication||Applications of Secure Multiparty Computation|
|Editors||P. Laud, L. Kamm|
|Place of Publication||Amsterdam|
|Publication status||Published - 2015|
|Name||Cryptology and Information Security Series|