Secure Multiparty Computation for Privacy-Preserving Data Mining
Yehuda Lindell, Benny Pinkas
eprint 2008 [pdf] [bibtex]
This paper is a tutorial on secure computation, giving a detailed introduction to:
- The problem statements of secure computation, including formal, simulation-based definitions of security.
- Building blocks like oblivious transfer: definitions and instantations.
- Yao's protocol and the concepts of garbled circuits.
- Common pitfalls in secure computation and cryptography in general.
Categories:
- Home page
- All papers, by:
- .. category
- .. author names
- .. publication date
- .. recently added
- .. recently updated
- Glossary
- About
- Just getting started in MPC?
- Guidelines
- Todo List
Search Papers
Bibliography Categories