Basic constructions of secure multiparty computation

P. Laud, A. Pankova, L. Kamm, M.G. Veeningen

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

2 Citations (Scopus)
11 Downloads (Pure)


In this chapter, we formally define multiparty computation tasks and the security of protocols realizing them. We give a broad presentation of the existing constructions of secure multiparty computation (SMC) protocols and explain why they are correct and secure. We discuss the different environmental aspects of SMC protocols and explain the requirements that are necessary and sufficient for their existence.
Original languageEnglish
Title of host publicationApplications of Secure Multiparty Computation
EditorsP. Laud, L. Kamm
Place of PublicationAmsterdam
PublisherIOS Press
ISBN (Print)978-1-61499-531-9
Publication statusPublished - 2015

Publication series

NameCryptology and Information Security Series


Dive into the research topics of 'Basic constructions of secure multiparty computation'. Together they form a unique fingerprint.

Cite this