Basics of Efficient Secure Function Evaluation
We start this chapter with common notation and definitions used in this book (Sect. 2.1). Afterwards, we summarize cryptographic primitives which are used in state-of-the-art protocols for practically efficient SFE in Sect. 2.2. Finally, we show how these primitives, in particular GC, can be used for practically efficient SFE protocols in the two- and multi-party setting (Sect. 2.3).