
Cryptography for Big Data Security
271
more parties being corrupted. Bendlin et al. [17] and Damg
˚
ard et al. [52] achieve malicious
security against up to all but one of the parties being corrupted, using a preprocessing offline
phase that contains the expensive public-key operations and is computationally secure, fol-
lowed by an efficient online phase for the actual computation that is information-theoretically
secure.
10.5.3.4 State of the art
Several MPC compilers and programming frameworks have been implemented and made
publicly available.
10.5.3.4.1 Two-party computation
Fairplay [116] was the first compiler for secure two-party computation, using ...