Abstract
We use CryptHOL to consider Multi-Party Computation (MPC) protocols.
MPC was first considered by Yao in 1983 and recent advances in
efficiency and an increased demand mean it is now deployed in the real
world. Security is considered using the real/ideal world paradigm. We
first define security in the semi-honest security setting where
parties are assumed not to deviate from the protocol transcript. In
this setting we prove multiple Oblivious Transfer (OT) protocols
secure and then show security for the gates of the GMW protocol. We
then define malicious security, this is a stronger notion of security
where parties are assumed to be fully corrupted by an adversary. In
this setting we again consider OT, as it is a fundamental building
block of almost all MPC protocols.
License
Topics
Session Multi_Party_Computation
- Cyclic_Group_Ext
- Number_Theory_Aux
- Uniform_Sampling
- Semi_Honest_Def
- OT_Functionalities
- ETP
- ETP_OT
- ETP_RSA_OT
- Noar_Pinkas_OT
- OT14
- GMW
- Secure_Multiplication
- DH_Ext
- Malicious_Defs
- Malicious_OT