Skip to main content
  • Book
  • © 2022

Secure Multi-Party Computation Against Passive Adversaries

  • Includes detailed security proofs for seminal protocols and state-of-theart efficiency improvement techniques

  • Presents protocols against computationally bounded as well as computationally unbounded adversaries

  • Focuses on MPC protocols in the passive corruption model and presents seminal possibility and feasibility results

Part of the book series: Synthesis Lectures on Distributed Computing Theory (SLDCT)

Buy it now

Buying options

eBook USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 59.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (13 chapters)

  1. Front Matter

    Pages i-xiii
  2. Introduction

    • Ashish Choudhury, Arpita Patra
    Pages 1-8
  3. Relevant Topics from Abstract Algebra

    • Ashish Choudhury, Arpita Patra
    Pages 9-15
  4. Secret Sharing

    • Ashish Choudhury, Arpita Patra
    Pages 17-31
  5. A Toy MPC Protocol

    • Ashish Choudhury, Arpita Patra
    Pages 33-41
  6. The BGW Perfectly-Secure MPC Protocol for Linear Functions

    • Ashish Choudhury, Arpita Patra
    Pages 43-65
  7. The BGW Perfectly-Secure MPC Protocol for Any Arbitrary Function

    • Ashish Choudhury, Arpita Patra
    Pages 67-90
  8. Perfectly-Secure MPC in the Pre-processing Model

    • Ashish Choudhury, Arpita Patra
    Pages 91-110
  9. Perfectly-Secure MPC Tolerating General Adversaries

    • Ashish Choudhury, Arpita Patra
    Pages 111-122
  10. Perfectly-Secure MPC for Small Number of Parties

    • Ashish Choudhury, Arpita Patra
    Pages 123-138
  11. The GMW MPC Protocol

    • Ashish Choudhury, Arpita Patra
    Pages 139-155
  12. Oblivious Transfer

    • Ashish Choudhury, Arpita Patra
    Pages 157-175
  13. Yao’s Protocol for Secure 2-party Computation

    • Ashish Choudhury, Arpita Patra
    Pages 177-218
  14. Cryptographically-Secure 3PC

    • Ashish Choudhury, Arpita Patra
    Pages 219-223
  15. Back Matter

    Pages 225-231

About this book

This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model). The authors present seminal possibility and feasibility results in this model and includes formal security proofs. Even though the passive corruption model may seem very weak, achieving security against such a benign form of adversary turns out to be non-trivial and demands sophisticated and highly advanced techniques. MPC is a fundamental concept, both in cryptography as well as distributed computing. On a very high level, an MPC protocol allows a set of mutually-distrusting parties with their private inputs to jointly and securely perform any computation on their inputs. Examples of such computation include, but not limited to, privacy-preserving data mining; secure e-auction; private set-intersection; and privacy-preserving machine learning. MPC protocols emulate the role of an imaginary, centralized trusted third party (TTP) that collects the inputs of the parties, performs the desired computation, and publishes the result. Due to its powerful abstraction, the MPC problem has been widely studied over the last four decades.

Authors and Affiliations

  • International Institute of Information Technology, Bangalore, India

    Ashish Choudhury

  • Department of Computer Science and Automation, Indian Institute of Science Bangalore, Bangalore, India

    Arpita Patra

About the authors

Ashish Choudhury, Ph.D., is an Associate Professor at the Inter national Institute of Information Technology, Bangalore, India. He received his M.S. and Ph.D. degrees from the Indian Institute of Technology, Madras, India. His research interests include theoretical cryptography, with specialization in cryptographic protocols.


Arpita Patra, Ph.D., is an Associate Professor at the Indian Institute of Science. She received her Ph.D from the Indian Institute of Technology and held post-doctoral positions at the University of Bristol, ETH Zurich, and Aarhus University. Her research interests include cryptography, with a focus on theoretical and practical aspects of secure multiparty computation protocols.

Bibliographic Information

Buy it now

Buying options

eBook USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 59.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access