@inbook{1294f51197314f2e8615f95b3984acfc,
title = "Basic constructions of secure multiparty computation",
abstract = "In this chapter, we formally define multiparty computation tasks and the security of protocols realizing them. We give a broad presentation of the existing constructions of secure multiparty computation (SMC) protocols and explain why they are correct and secure. We discuss the different environmental aspects of SMC protocols and explain the requirements that are necessary and sufficient for their existence.",
author = "P. Laud and A. Pankova and L. Kamm and M.G. Veeningen",
year = "2015",
doi = "10.3233/978-1-61499-532-6-1",
language = "English",
isbn = "978-1-61499-531-9",
series = "Cryptology and Information Security Series",
publisher = "IOS Press",
pages = "1--25",
editor = "P. Laud and L. Kamm",
booktitle = "Applications of Secure Multiparty Computation",
address = "Netherlands",
}