upcarta
  • Sign In
  • Sign Up
  • Explore
  • Search

A Pragmatic Introduction to Secure Multi-Party Computation

  • Book
  • Dec 19, 2018
  • #Cryptography
Mike Rosulek
@GarbledCircus
(Author)
Vladimir Kolesnikov
@VladimirKolesnikov
(Author)
David Evans
@DavidEvans
(Author)
www.goodreads.com
See on Goodreads
3.00/5 1 ratings
1 Recommender
1 Mention
1 Collection
Since its introduction by Andrew Yao in the 1980s, multi-party computation has developed from a theoretical curiosity to an important tool for building large-scale privacy-preservin... Show More

Since its introduction by Andrew Yao in the 1980s, multi-party computation has developed from a theoretical curiosity to an important tool for building large-scale privacy-preserving applications. Secure multi-party computation (MPC) enables a group to jointly perform a computation without disclosing any participant’s private inputs. The participants agree on a function to compute, and then can use an MPC protocol to jointly compute the output of that function on their secret inputs without revealing them.

This monograph provides an introduction to multi-party computation for practitioners interested in building privacy-preserving applications and researchers who want to work in the area. The authors introduce the foundations of MPC and describe the current state of the art. The goal is to enable readers to understand what is possible today, and what may be possible in the future. It provides a starting point for building applications using MPC and for developing MPC protocols, implementations, tools, and applications.

Those seeking a concise, accessible introduction to the topic which quickly enables them to build practical systems or conduct further research will find this essential reading.

(From Goodreads)

Show Less

Number of Pages: 190

ISBN-13: 9781680835083

Recommend
Post
Save
Complete
Collect
Mentions
See All
Lúcás Meier @cronokirby · May 14, 2022
  • Curated in Some Cryptography Books I Like
I read this one quite recently, and I’d highly recommend it. This book is an overview of different MPC techniques, from a very high-level. The book starts with a brief introduction to simulation-based security, which is how we usually reason about security when working with Cryptographic protocols, and then jumps to describing various MPC protocols in various threat models. The book doesn’t provide a very deep explanation of the protocols, but it does provide enough to give you a high level overview of the techniques involved, and how they compare with each-other. A great thing about this book is that it’s very well referenced, so it’s easy to use it as a stepping stone to dive into the literature and learn more. I highly recommend this book if you’re interested in MPC. It’s also a short read, so if you’re not interested in MPC, you should still give it a look, and you might change that.
Collections
See All
  • Lúcás Meier
    • Collection
    Some Cryptography Books I Like
    10 curations
  • upcarta ©2025
  • Home
  • About
  • Terms
  • Privacy
  • Cookies
  • @upcarta