Subtopic Deep Dive

Secure Multi-Party Computation Protocols
Research Guide

What is Secure Multi-Party Computation Protocols?

Secure Multi-Party Computation (MPC) protocols enable multiple parties to jointly compute a function over their private inputs while keeping those inputs confidential from each other.

MPC protocols use techniques like secret sharing and garbled circuits to achieve privacy and correctness. Foundational work includes Ben-Or and Wigderson (1988) proving completeness theorems for fault-tolerant distributed computation (2477 citations). Canetti (2000) formalized security and composition for multiparty cryptographic protocols (1382 citations).

15
Curated Papers
3
Key Challenges

Why It Matters

MPC protocols enable privacy-preserving collaborative analytics, such as set intersection without revealing inputs, as in Freedman, Nissim, and Pinkas (2004) with 1254 citations. They support applications in federated learning and secure data mining, per Lindell and Pinkas (2000) on privacy-preserving data mining (1028 citations). Real-world uses include blockchain privacy enhancements in Zerocash by Ben Sasson et al. (2014, 1810 citations).

Key Research Challenges

Malicious Adversary Security

Achieving security against malicious parties who may deviate arbitrarily remains difficult. Canetti (2000) provides composition theorems but full malicious security increases overhead (1382 citations). Ben-Or and Wigderson (1988) address fault tolerance but focus on non-cryptographic settings (2477 citations).

Scalability for Large Parties

Communication and computation costs grow with party count, limiting practical use. Freedman, Nissim, and Pinkas (2004) show efficient private set intersection but scalability challenges persist for n>100 (1254 citations). Lindell and Pinkas (2000) highlight data mining overheads in multi-party settings (1028 citations).

Round Complexity Reduction

Minimizing interaction rounds is key for real-time applications. Early protocols like Ben-Or and Wigderson (1988) require many rounds for completeness (2477 citations). Modern surveys note ongoing needs for low-round malicious MPC (Acar et al., 2018, 1155 citations).

Essential Papers

1.

A survey of trust and reputation systems for online service provision

Audun Jøsang, Roslan Ismail, Colin Boyd · 2005 · Decision Support Systems · 3.3K citations

2.

Completeness theorems for non-cryptographic fault-tolerant distributed computation

Michael Ben-Or, Avi Wigderson · 1988 · 2.5K citations

Every function of n inputs can be efficiently computed by a complete network of n processors in such a way that:

3.

Zerocash: Decentralized Anonymous Payments from Bitcoin

Eli Ben Sasson, Alessandro Chiesa, Christina Garman et al. · 2014 · 1.8K citations

Abstract—Bitcoin is the first digital currency to see widespread adoption. While payments are conducted between pseudonyms, Bitcoin cannot offer strong privacy guarantees: payment trans-actions are...

4.

Security and Composition of Multiparty Cryptographic Protocols

Ran Canetti · 2000 · Journal of Cryptology · 1.4K citations

5.

Efficient Private Matching and Set Intersection

Michael J. Freedman, Kobbi Nissim, Benny Pinkas · 2004 · Lecture notes in computer science · 1.3K citations

6.

SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies

Joseph Bonneau, Andrew Miller, Jeremy Clark et al. · 2015 · 1.2K citations

Bit coin has emerged as the most successful cryptographic currency in history. Within two years of its quiet launch in 2009, Bit coin grew to comprise billions of dollars of economic value despite ...

7.

A Survey on Homomorphic Encryption Schemes

Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac et al. · 2018 · ACM Computing Surveys · 1.2K citations

Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns. The users or servic...

Reading Guide

Foundational Papers

Start with Ben-Or and Wigderson (1988) for completeness theorems establishing MPC feasibility (2477 citations), then Canetti (2000) for security definitions and composition (1382 citations), followed by Freedman et al. (2004) for practical private matching (1254 citations).

Recent Advances

Study Zerocash (Ben Sasson et al., 2014, 1810 citations) for MPC in blockchain privacy, Bulletproofs (Bünz et al., 2018, 991 citations) for zero-knowledge extensions, and Acar et al. (2018) survey on homomorphic schemes complementing MPC (1155 citations).

Core Methods

Core techniques: secret sharing for input distribution (Ben-Or, 1988), garbled circuits for two-party evaluation (Freedman, 2004), universal composability for protocols (Canetti, 2000).

How PapersFlow Helps You Research Secure Multi-Party Computation Protocols

Discover & Search

Research Agent uses citationGraph on Canetti (2000) to map MPC composition dependencies, then findSimilarPapers to uncover 50+ related works on malicious security. exaSearch queries 'malicious secure MPC protocols scalability' to retrieve Ben-Or and Wigderson (1988) alongside recent extensions.

Analyze & Verify

Analysis Agent runs readPaperContent on Freedman et al. (2004) to extract set intersection protocols, then verifyResponse with CoVe to check claims against Lindell and Pinkas (2000). runPythonAnalysis simulates secret sharing overheads with NumPy, graded by GRADE for statistical soundness in large-party scenarios.

Synthesize & Write

Synthesis Agent detects gaps in malicious scalability from Canetti (2000) and Ben-Or (1988), flagging contradictions via exportMermaid for protocol flowcharts. Writing Agent applies latexEditText to draft MPC proofs, latexSyncCitations for 10+ papers, and latexCompile for publication-ready surveys.

Use Cases

"Simulate communication complexity of secret sharing in MPC for 100 parties"

Research Agent → searchPapers 'secret sharing MPC' → Analysis Agent → runPythonAnalysis (NumPy/pandas plot of bandwidth vs. parties) → matplotlib graph of overhead from Ben-Or (1988) simulation.

"Write a LaTeX survey on garbled circuits in MPC protocols"

Research Agent → citationGraph on Freedman (2004) → Synthesis → gap detection → Writing Agent → latexEditText draft + latexSyncCitations (Canetti 2000 et al.) + latexCompile → PDF with MPC circuit diagrams.

"Find GitHub repos implementing efficient private set intersection"

Research Agent → searchPapers 'private set intersection' → Code Discovery → paperExtractUrls (Freedman 2004) → paperFindGithubRepo → githubRepoInspect → verified MPC codebases with benchmarks.

Automated Workflows

Deep Research workflow scans 50+ MPC papers via citationGraph from Canetti (2000), producing structured reports on malicious security evolution. DeepScan applies 7-step CoVe analysis to Ben-Or (1988), verifying completeness theorems with GRADE checkpoints. Theorizer generates new low-round MPC hypotheses from Lindell-Pinkas (2000) data mining gaps.

Frequently Asked Questions

What defines Secure Multi-Party Computation protocols?

MPC protocols allow parties to compute functions on private inputs without revealing them, using secret sharing or garbled circuits for privacy.

What are core methods in MPC?

Key methods include secret sharing (Ben-Or and Wigderson, 1988), garbled circuits (implicit in Freedman et al., 2004), and UC-security composition (Canetti, 2000).

What are key papers on MPC?

Foundational: Ben-Or and Wigderson (1988, 2477 citations) on completeness; Canetti (2000, 1382 citations) on security; Freedman et al. (2004, 1254 citations) on set intersection.

What are open problems in MPC?

Challenges include malicious security at scale and low round complexity, as scalability limits persist beyond n=10 parties per Freedman (2004).

Research Cryptography and Data Security with AI

PapersFlow provides specialized AI tools for Computer Science researchers. Here are the most relevant for this topic:

See how researchers in Computer Science & AI use PapersFlow

Field-specific workflows, example queries, and use cases.

Computer Science & AI Guide

Start Researching Secure Multi-Party Computation Protocols with AI

Search 474M+ papers, run AI-powered literature reviews, and write with integrated citations — all in one workspace.

See how PapersFlow works for Computer Science researchers