/awesome-mpc

A curated list of multi party computation resources and links.

awesome-mpc Awesome

The list format was inspired from awesome list and after a fruitful lunch discussion at TPMPC. It is designed to have a central place where everyone can find open-source software designed for MPC as well as introductory material to this topic.

Moreover, the list is given alphabetically and divided into categories of libraries which are actively maintained or recently developed.

Please feel free to do a pull request with any MPC software or resource you know and it is not on the list. The current classification might not be most suitable one and I am open to any suggestions.

Contents

Theory

Books

Courses

  • Cryptographic Computing Course - Course on MPC, Homomorphic Encryption and related topics given by Claudio Orlandi at Aarhus University.
  • FHE-MPC Advanced Grad Course - 'Informal grad course' in FHE and MPC.
  • Secure Computation - Secure Computation course offered by Indian Institute of Science covering secret sharing schemes, oblivious transfer to impossiblity results and zero-knowledge proofs.
  • Secure Multi-Party Computation at Scale - Boston University course that covers mathematical and algorithmic foundations of MPC, with an additional focus on deployment of state-of-the-art MPC technologies.

Tutorials

  • Getting Started with MPC - Light compilation of basic resources for getting started in MPC study and research.
  • How To Simulate It - A Tutorial on the Simulation Proof Technique.
  • OSU Bibliography - An Annotated Bibliography of Practical Secure Computation.
  • TinySMPC (tutorial) – A tiny, educational, Pythonic library for SMPC. The tutorial notebook runs in your browser.
  • UC Security - Video lectures on UC security delivered by Ran Canetti.

Misc

  • ePrint papers - Frequently updated list of secure computation papers appearing on IACR eprint.

Software

Here I tried to reference the most recent article found on specific software since enumerating all changes including the original paper is too cumbersome.

Frameworks

  • ABY - 2PC with secret sharing and garbled circuits; secure against semi-honest adversaries. | NDSS'15.
  • ABY3 - 3PC with secret sharing for privacy preserving machine learning and database joins (PSI, Union, etc.); secure against semi-honest adversaries. | CCS'18, 2019/518.
  • BatchDualEx - 2PC with garbled circuits; secure against malicious adversaries. | eprint: 2016/632.
  • Carbyne Stack - MPC cloud platform that combines state-of-the-art MPC with cloud-native technology like Kubernetes, Istio, and Knative to enable MPC deployments at scale.
  • CrypTen - MPC with secret sharing; secure against semi-honest adversary; focused on building PyTorch applications. | documentation: link
  • EMP-toolkit - 2PC and MPC with garbled circuits; secure against semi-honest adversaries (emp-sh2pc). There are also ones resistant against malicious parties (emp-[ag2pc|m2pc|agmpc]) | eprint: 2017/189, 2016/762, 2017/030.
  • Fancy-Garbling - 2PC with arithmetic garbled circuits; secure against semi-honest adversaries. | eprint: 2016/969.
  • FRESCO - MPC supporting TinyTables or SPDZ protocols; secure against semi-honest or malicious adversaries. | Practice'15.
  • HoneyBadgerMPC - Robust MPC-based confidentiality layer for blockchains with guaranteed output delivery; secure against up to t < n/3 malicious parties.
  • JIFF - JavaScript client and server libraries for building web-based applications that employ general purpose MPC; secure against semi-honest adversaries. | documentation: link.
  • MOTION - Mixed-Protocol MPC framework supporting full-threshold boolean and arithmetic GMW and BMR; secure against semi-honest adversaries. | eprint: 2020/1137.
  • MP-SPDZ - MPC with garbled circuits or secret sharing; secure against malicious or semi-honest adversaries with dishonest or honest majority. | documentation | eprint: 2020/512
  • MPyC - BGW honest majority multi-party protocol; secure against semi-honest adversaries. | TPMPC'18.
  • Obliv-C - 2PC with garbled circuits; secure against semi-honest adversaries. | eprint: 2015/1153.
  • Obliv-Java - Faithful reimplementation of Java using Obliv-C. | eprint: 2017/878
  • Rosetta - 3PC with secret sharing; secure against semi-honest adversaries; focused on reusing the APIs of TensorFlow and allowing to transfer traditional TensorFlow codes into a privacy-preserving manner with minimal changes.
  • SCALE-MAMBA - General MPC with secret sharing; secure against various adversaries including malicious with a dishonest majority. Software closer to a production system. | documentation: link.
  • Sharemind - 2PC or 3PC with secret sharing; secure against semi-honest adversaries. | Cyber'13.
  • swanky - A suite of rust libraries for secure multi-party computation (currently includes oblivious transfer, garbled circuits, and private set intersection).
  • Tf-encrypted - 3PC with secret sharing; secure against semi-honest adversaries; focused on TensorFlow-based applications.

Primitives

  • APRICOT - OT Extension secure against malicious adversaries. | 2015/546.
  • Distributed Vector-OLE - A two-party generator for Vector-OLE correlations. CCS'19.
  • LibOTe - Library with various OT Extensions.
  • OT Extension - OT Extension secure against malicious adversaries. | 2015/061.
  • SCAPI - Various secure computation API's carefully documented with a clean code design in mind. | 2012/629.
  • SplitCommit - Additively homomorphic commitment scheme. | 2015/694.
  • TSS - A pure-Rust implementation of various threshold secret sharing schemes.

Protocols

Tools

  • CBMC-GC - Creates Boolean circuits from ANSI-C code optimized for secure computation. | ShallowCC.
  • CipherCompute - Create generic MPC programs using Rust. Works on top of the SCALE engine. Enterprise software that provides UIs for participants handshaking, computations approval, datasources connections, auditing etc...
  • Conclave - Big Data query compiler that combines cleartext processing with Spark and MPC protocols. | EuroSys19.
  • HyCC - Optimizes circuits for hybrid MPC from ANSI-C. | CCS'18.
  • MPC-SoK - Build environments for many MPC frameworks using Docker containers. | S&P19.
  • Tiny-Garble - Logic Synthesis and Sequential Descriptions for Yao's Garbled Circuits. | S&P'15.
  • UC Compiler - Valiant's Universal Circuit Compiler. | 2016/093.

Retired software

  • Duplo - 2PC with garbled circuits; secure against malicious adversaries.
  • FairPlayMP - GMW based multi-party protocol secure against semi-honest adversaries | CCS'08.
  • Frigate - C-style compiler for optimizing boolean circuits. | Euro S&P'16.
  • Myst - Secure Multiparty Key Generation, Signature and Decryption JavaCard applet and host application | CCS'17.
  • SDA - Secure distributed aggregation of high-dimensional vectors | 2017/643.
  • SPDZ - General MPC with secret sharing; secure against malicious adversaries | eprint: 2017/1230.
  • SPDZ-Yao - 2PC with garbled circuits; high-level language similar to SPDZ; secure against semi-honest adversaries.
  • Semi-honest BMR - BMR protocol secure against semi-honest adversaries | 2016/1066.
  • Tasty - 2PC with garbled circuits and homomorphic encryption | 2010/365.
  • TinyLEGO - 2PC with garbled circuits; secure against malicious adversaries | eprint: 2015/309.
  • VIFF - 3+PC with secret sharing; secure against semi-honest adveraries.
  • Wysteria - Multparty computation with GMW, written in a functional PL; secure against semi-honest adversaries | S&P'14.

Workshops

  • IIT Bombay MPC school - Covers basic and advanced topics related to the theory of MPC aimed at CS students and researchers interested in cryptography.
  • Securing Computation - Conducted at Simons institute for Theory of Computing.
  • The 1st BIU Winter School - Introductory lectures for basic secure computation constructions.
  • The 5th BIU Winter School - Tutorials and recent advances in secure computation delivered in video format.
  • TPMPC - Yearly workshop that started in Aarhus 2012. It has now become one of the biggest workshops for MPC people.

Contribute

Contributions welcome! Read the contribution guidelines first.

License

CC0

To the extent possible under law, Dragoș Rotaru has waived all copyright and related or neighboring rights to this work.