Secure multi-party computation

Secure multi-party computation (MPC) allows parties, each holding a private input , to jointly compute a function such that each party learns only its designated output and nothing else about the other parties’ inputs. The fundamental question of whether this is possible was raised by Yao — Yao82.

Syntax

An -party MPC protocol is a collection of interactive algorithms where party runs with input and random coins . Security is formalized via the real/ideal paradigm: the real execution of is indistinguishable from an ideal execution in which a trusted third party receives all inputs, computes , and returns the outputs.

Properties

Correctness

All honest parties output the correct value with overwhelming probability.

Privacy (semi-honest)

In the semi-honest (or honest-but-curious) model, corrupted parties follow the protocol faithfully but try to learn extra information. Privacy requires that the view of any subset of semi-honest corrupted parties is simulatable from their inputs and outputs alone.

Security (malicious)

In the malicious model, corrupted parties may deviate arbitrarily from the protocol. Full security requires simulation-based security against any such adversary, typically with guaranteed output delivery or fairness conditions.

Variations

Two-party computation (2PC)

The special case studied by Yao. Two-party protocols are typically built from oblivious transfer (OT) and garbled circuits.

Honest majority ( or )

When fewer than a threshold fraction of parties are corrupt, information-theoretic (unconditional) security is achievable. For , perfect security against malicious adversaries is achievable; for , statistical security is achievable with broadcast — BGW88.

Dishonest majority (threshold up to )

With malicious parties, computational assumptions are necessary. OT is sufficient and complete for this setting.

MPC with preprocessing (SPDZ, etc.)

A correlated randomness or “preprocessing” phase generates reusable correlated randomness offline; the online phase is highly efficient. Preprocessing can be instantiated from OT extension or homomorphic encryption.

Universal composability (UC)

The UC framework by Canetti provides a strong composable security notion for MPC — Can01.

Other results

  • MPC with perfect security for any function when fewer than parties are corrupt (no cryptographic assumptions) — BGW88
  • MPC with computational security for any function from OTGMW87, Yao82
  • OT is complete for (dishonest-majority) MPC — Kil88
  • OT extension: base OTs suffice to generate polynomially many OTs efficiently — IKNP03
  • MPC implies OT in a black-box way for certain non-trivial functionalities — BH26
  • COM is complete for two-party computation in the semi-honest model — GMW87
  • Doubly-efficient RAM-MPC (computation sublinear in the database size) from LWELMW24
  • Communication lower bounds for two-party differential privacy — HMST22