Show simple item record

dc.rights.licenseCC-BY-NC-ND
dc.contributor.advisorGeffner Fuenmayor, Ivan
dc.contributor.authorFransen, Jorik
dc.date.accessioned2025-08-12T15:00:37Z
dc.date.available2025-08-12T15:00:37Z
dc.date.issued2025
dc.identifier.urihttps://studenttheses.uu.nl/handle/20.500.12932/49691
dc.description.abstractSecure Multi-Party Computation is a discipline within cryptography that focuses on computations performed by a group of participants, each holding some private information. The goal is to jointly compute a function of their private inputs without revealing any additional information, even in the presence of malicious participants. In this thesis we explore a foundational result introduced by Ben-Or, Goldwasser, and Widgerson, who designed two protocols for Secure Multi-Party Computation. We first present Shamir’s secret sharing scheme, which is a key element in both protocols. Then, we discuss a t-private protocol, which ensures that no group of up to t players can learn additional information other than the output. Subsequently, we describe an extended t-private and t-resilient protocol, which additionally ensures correct working when malicious participants actively aim to disrupt it. We prove that the first protocol is t-private for t < n/2, and that the second protocol is t-private and t-resilient for t < n/3. Furthermore, we analyze the complexity of both protocols.
dc.description.sponsorshipUtrecht University
dc.language.isoEN
dc.subjectSecure Multi-Party Computation and the protocols introduced by Ben-Or, Goldwasser, and Widgerson (BGW).
dc.titleTrusting the Process, Not the Players: Secure Multiparty Computation Explained
dc.type.contentBachelor Thesis
dc.rights.accessrightsOpen Access
dc.subject.keywordsSecure Multi-Party Computation; SMPC; Cryptography; BGW; Shamir's secret sharing; t-private; t-resilient
dc.subject.courseuuWiskunde
dc.thesis.id51256


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record