Basic constructions of secure multiparty computation

P. Laud, A. Pankova, L. Kamm, M.G. Veeningen

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

3 Citations (Scopus)
14 Downloads (Pure)

Abstract

In this chapter, we formally define multiparty computation tasks and the security of protocols realizing them. We give a broad presentation of the existing constructions of secure multiparty computation (SMC) protocols and explain why they are correct and secure. We discuss the different environmental aspects of SMC protocols and explain the requirements that are necessary and sufficient for their existence.
Original languageEnglish
Title of host publicationApplications of Secure Multiparty Computation
EditorsP. Laud, L. Kamm
Place of PublicationAmsterdam
PublisherIOS Press
Pages1-25
ISBN (Print)978-1-61499-531-9
DOIs
Publication statusPublished - 2015

Publication series

NameCryptology and Information Security Series
Volume13

Fingerprint

Dive into the research topics of 'Basic constructions of secure multiparty computation'. Together they form a unique fingerprint.

Cite this