Tutorial on Secure Multi-Party Computation. Yehuda Lindell IBM T.J.Watson. Outline. Part 1: A rigorous approach to security Defining security Network model, adversarial power Feasibility results for secure computation Part 2: General constructions. A Rigorous Approach.
there exists an
The Security Definition:
Computational Indistinguishability:every probabilistic polynomial-time observer that receives the input/output distribution of the honest parties and the adversary, outputs 1 upon receiving the distribution generated in IDEAL with negligibly close probability to when it is generated in REAL.
1-out-of-2 Oblivious Transfer (OT)
Protocol for Oblivious Transfer
Preliminaries: bit commitment