@inbook{90b0b76d204744c2950303ae011989b0,
title = "The BGW protocol for perfectly-secure multiparty computation",
abstract = "One of the most fundamental results of secure computation was presented by Ben-Or, Goldwasser and Wigderson (BGW) in 1988. They demonstrated that any n-party functionality can be computed with perfect security, in the private channels model. When the adversary is semi-honest this holds as long as t < n/2 parties are corrupted, and when the adversary is malicious this holds as long as t < n/3 parties are corrupted. In this chapter, we present a full description of the BGW protocol for the semi-honest and malicious settings, along with detailed explanations and intuition regarding the security of the protocols; full proofs can be found in [1].",
author = "Gilad Asharov and Yehuda Lindell",
year = "2013",
doi = "https://doi.org/10.3233/978-1-61499-169-4-120",
language = "الإنجليزيّة",
isbn = "9781614991687",
series = "Cryptology and Information Security Series",
publisher = "IOS Press",
pages = "120--167",
booktitle = "Secure Multi-Party Computation",
address = "بريطانيا",
}