Secure Multiparty Computation for Privacy-Preserving Data Mining

Yehuda Lindell, Benny Pinkas
eprint 2008 [pdf] [bibtex]

This paper is a tutorial on secure computation, giving a detailed introduction to:

  • The problem statements of secure computation, including formal, simulation-based definitions of security.
  • Building blocks like oblivious transfer: definitions and instantations.
  • Yao's protocol and the concepts of garbled circuits.
  • Common pitfalls in secure computation and cryptography in general.