Multiparty Computation and Blockchains

MPC
Abstract

The goal of this course is to introduce the students to the basic concepts of secure multiparty computation, the foundational MPC protocols and more advanced blockchains protocols.

Teaching and Learning Methods: Lectures and homework.

Course Policies: Final projects and homework are not mandatory.

Bibliography
  • Book: EVANS D., KOLESNIKOV V., ROSULEK M. A Pragmatic Introduction to Secure Multi-Party Computation. Now Publishers Inc, 2018, 190p. https://securecomputation.org/

  • Book: CRAMER R., DAMGAARD I. B., NIELSEN J. B. Secure Multiparty Computation and Secret Sharing. Cambridge University Press, 2015, 381p.

  • Book: NARAYANAN A., BONNEAU J., FELTEN E., MILLER A., GOLDFEDER S. Bitcoin and Cryptocurrency Technologies. Princeton University Press, 2016, 336p. http://bitcoinbook.cs.princeton.edu/

  • Slides and Scientific Papers

Requirements

Students must have followed “Secure communications” (SecCom) or equivalent prior to taking this course. Students are encouraged to follow “Security and privacy for Big Data and Cloud” (BigSec) prior to taking this course. Basic knowledge of probability, group theory, and linear algebra is mandatory.

Description
  • The simulation paradigm, security models for MPC (semi-honest security, malicious security)
  • Garbled Circuits and 2PC, Oblivious Transfer (semi-honest security, malicious security, malicious security with aborts), Commitment schemes
  • Secret Sharing Schemes (SSS) (Additive Secret Sharing, Shamir’s Secret Sharing)
  • Semi-honest MPC based on SSS (GMW; BGW)
  • Cryptographic compilers (GMW compiler from semi-honest to malicious security), Zero-Knowledge Proofs, Coin-Tossing protocols
  • Maliciously secure MPC based on SSS (pre-processing models: Beaver’s Triples, double-sharing; SPDZ)
  • Foundational concepts of Blockchains (permission-less vs permissioned, Sybil attack, Distributed Ledger, Chernoff Bound, Blockchain Backbone)
  • Proof-of-work based Blockchains
  • Proof-of-stake based Blockchains
  • Privacy-preserving Blockchains (Zero Coin)

Learning Outcomes:

  • The students will be able to reason about the security requirements of cryptographic protocols
  • Have a basic knowledge of the most known MPC and Blockchains protocols

Nb hours: 21.00

Evaluation:

  • Final project with oral presentation (40% of the final grade),

  • Exam (60% of the final grade).