π‘οΈ Secure Computation: Garbled Circuits
Learn how MPC enables private function evaluation
Compute on encrypted data without revealing it
Your Progress
0 / 5 completedSecure Computation
**Secure computation** is the process of evaluating functions on secret-shared data without revealing the inputs. Once data is split into shares, parties can perform addition and multiplication on shares, with the results remaining in shared form. Only the final output is reconstructed.
Different protocols offer different tradeoffs: GMW uses boolean circuits with oblivious transfer, Yao's protocol pre-encrypts ("garbles") the entire circuit, SPDZ uses arithmetic circuits with MACs for malicious security, and ABY3 combines approaches for optimal 3-party computation.
Interactive: Secure Average Salary Computation
Watch how three parties compute their average salary using MPC without revealing individual salaries.
MPC Protocol Comparison
Different protocols offer different tradeoffs for secure computation.
GMW Protocol
Goldreich-Micali-Wigderson (1987)
Classic protocol using boolean circuits and oblivious transfer
π Security Models
Operations on Secret Shares
β Addition (Easy)
To add two secret-shared values, each party simply adds their shares locally. No communication needed!
βοΈ Multiplication (Hard)
Multiplication requires interaction: parties must exchange shares to prevent information leakage.
π Comparison (Very Hard)
Comparing encrypted values (a > b?) is expensiveβrequires bit decomposition or garbled circuits.