The list format was inspired from awesome list and after a fruitful lunch discussion at TPMPC. It is designed to have a central place where everyone can find open-source software designed for MPC as well as introductory material to this topic.
Moreover, the list is given alphabetically and divided into categories of libraries which are actively maintained or recently developed.
Please feel free to do a pull request with any MPC software or resource you know and it is not on the list. The current classification might not be most suitable one and I am open to any suggestions.
- A Pragmatic Introduction to Secure Multi-Party Computation - A broad introduction to the field of secure multi-party computation, covering both the fundamental constructions and many of the recent improvements. The book emphazises the intuition and ideas behind the protocols rather than rigorous proofs.
- Applications of Secure Multiparty Computation - Collection of MPC protocols for several real-world tasks such as statistics.
- Efficient Secure Two-Party Protocols - Comprehensive study of efficient protocols and techniques for secure two-party computation – both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest.
- Secure Multiparty Computation and Secret Sharing - Comprehensive treatment of unconditionally secure techniques for multiparty computation (MPC) and secret sharing.
- Cryptographic Computing Course - Course on MPC, Homomorphic Encryption and related topics given by Claudio Orlandi at Aarhus University.
- FHE-MPC Advanced Grad Course - 'Informal grad course' in FHE and MPC.
- Secure Computation - Secure Computation course offered by Indian Institute of Science covering secret sharing schemes, oblivious transfer to impossiblity results and zero-knowledge proofs.
- Secure Multi-Party Computation at Scale - Boston University course that covers mathematical and algorithmic foundations of MPC, with an additional focus on deployment of state-of-the-art MPC technologies.
- Getting Started with MPC - Light compilation of basic resources for getting started in MPC study and research.
- How To Simulate It - A Tutorial on the Simulation Proof Technique.
- OSU Bibliography - An Annotated Bibliography of Practical Secure Computation.
- TinySMPC (tutorial) – A tiny, educational, Pythonic library for SMPC. The tutorial notebook runs in your browser.
- UC Security - Video lectures on UC security delivered by Ran Canetti.
- ePrint papers - Frequently updated list of secure computation papers appearing on IACR eprint.
Here I tried to reference the most recent article found on specific software since enumerating all changes including the original paper is too cumbersome.
- ABY - 2PC with secret sharing and garbled circuits; secure against semi-honest adversaries. | NDSS'15.
- ABY3 - 3PC with secret sharing for privacy preserving machine learning and database joins (PSI, Union, etc.); secure against semi-honest adversaries. | CCS'18, 2019/518.
- BatchDualEx - 2PC with garbled circuits; secure against malicious adversaries. | eprint: 2016/632.
- Carbyne Stack - MPC cloud platform that combines state-of-the-art MPC with cloud-native technology like Kubernetes, Istio, and Knative to enable MPC deployments at scale.
- CrypTen - MPC with secret sharing; secure against semi-honest adversary; focused on building PyTorch applications. | documentation: link
- EMP-toolkit - 2PC and MPC with garbled circuits; secure against semi-honest adversaries (emp-sh2pc). There are also ones resistant against malicious parties (emp-[ag2pc|m2pc|agmpc]) | eprint: 2017/189, 2016/762, 2017/030.
- EzPC - Offers a suite of tools for secure machine learning using semi-honest MPC protocols. It includes a language for secure machine learning, compilers for TensorFlow/Onnx to various MPC protocols, and frameworks for training and inference on deep neural networks. It provides an end-to-end solution for secure machine learning. | documentation: link.
- Fancy-Garbling - 2PC with arithmetic garbled circuits; secure against semi-honest adversaries. | eprint: 2016/969.
- FRESCO - MPC supporting TinyTables or SPDZ protocols; secure against semi-honest or malicious adversaries. | Practice'15.
- HoneyBadgerMPC - Robust MPC-based confidentiality layer for blockchains with guaranteed output delivery; secure against up to t < n/3 malicious parties.
- JIFF - JavaScript client and server libraries for building web-based applications that employ general purpose MPC; secure against semi-honest adversaries. | documentation: link.
- libTMCG - C++ framework with various primitives and tools for implementing multiparty games; secure against semi-honest adversaries. | documentation: link
- Moose - 3PC with secret sharing; secure against semi-honest adversaries; focused on data processing and machine learning.
- MOTION - Mixed-Protocol MPC framework supporting full-threshold boolean and arithmetic GMW and BMR; secure against semi-honest adversaries. | eprint: 2020/1137.
- MP-SPDZ - MPC with garbled circuits or secret sharing; secure against malicious or semi-honest adversaries with dishonest or honest majority. | documentation | eprint: 2020/512
- MPyC - BGW honest majority multi-party protocol; secure against semi-honest adversaries. | TPMPC'18.
- Obliv-C - 2PC with garbled circuits; secure against semi-honest adversaries. | eprint: 2015/1153.
- Obliv-Java - Faithful reimplementation of Java using Obliv-C. | eprint: 2017/878
- Rosetta - 3PC with secret sharing; secure against semi-honest adversaries; focused on reusing the APIs of TensorFlow and allowing to transfer traditional TensorFlow codes into a privacy-preserving manner with minimal changes.
- SCALE-MAMBA - General MPC with secret sharing; secure against various adversaries including malicious with a dishonest majority. Software closer to a production system. | documentation: link.
- SecretFlow-SPU - A domain-specific compiler and runtime suite, that aims to provide a secure computation service with provable security. SPU compiler uses XLA as its front-end Intermediate Representation (IR) and SPU runtime implements various MPC protocols. | USENIX ATC'23.
- Sharemind - 2PC or 3PC with secret sharing; secure against semi-honest adversaries. | Cyber'13.
- swanky - A suite of rust libraries for secure multi-party computation (currently includes oblivious transfer, garbled circuits, and private set intersection).
- TF Encrypted - 3PC with secret sharing; secure against semi-honest adversaries; focused on TensorFlow-based applications.
- TNO-MPC - Collection of MPC generic software components, procedures, functionalities, and solutions based on secret sharing and (partially) homomorphic encryption developed in Python and Go. | Blogs and principles: TNO MPC Lab.
- aes-prng - Rust pseudo-random number generator based on AES.
- APRICOT - OT Extension secure against malicious adversaries. | 2015/546.
- Distributed Vector-OLE - A two-party generator for Vector-OLE correlations. CCS'19.
- LibOTe - Library with various OT Extensions.
- OT Extension - OT Extension secure against malicious adversaries. | 2015/061.
- SCAPI - Various secure computation API's carefully documented with a clean code design in mind. | 2012/629.
- SplitCommit - Additively homomorphic commitment scheme. | 2015/694.
- TSS - A pure-Rust implementation of various threshold secret sharing schemes.
- BaRK-OPRF - Private Set Intersection. | 2016/799.
- Blockchain-Crypto-MPC - Multiparty ECDSA signing in the cryptocurrency setting, includes an optimized GC library, OT, and more. | CCS'18.
- LibPSI - Various protocols for performing private set intersection.
- Linreg - Privacy preserving linear regression. | 2016/892.
- Geppetri - Verifiable 3PC. | 2017/013.
- MPECDSA - Threshold multiparty ECDSA from ECDSA assumptions. | S&P'19.
- ORAM (Obliv-C) - Oblivous RAM. | S&P'16.
- Prio - Private aggregation with SNIPs (secret-shared non-interactive proofs). | NSDI'17.
- PSI - Private Set Intersection. | 2014/447.
- ROOM - Read-Only Oblivious Maps and applications to secure machine learning on sparse data. | CCS'19.
- CBMC-GC - Creates Boolean circuits from ANSI-C code optimized for secure computation. | ShallowCC.
- CipherCompute - Create generic MPC programs using Rust. Works on top of the SCALE engine. Enterprise software that provides UIs for participants handshaking, computations approval, datasources connections, auditing etc...
- Conclave - Big Data query compiler that combines cleartext processing with Spark and MPC protocols. | EuroSys19.
- HyCC - Optimizes circuits for hybrid MPC from ANSI-C. | CCS'18.
- MPC-SoK - Build environments for many MPC frameworks using Docker containers. | S&P19.
- Tiny-Garble - Logic Synthesis and Sequential Descriptions for Yao's Garbled Circuits. | S&P'15.
- UC Compiler - Valiant's Universal Circuit Compiler. | 2016/093.
- Duplo - 2PC with garbled circuits; secure against malicious adversaries.
- FairPlayMP - GMW based multi-party protocol secure against semi-honest adversaries | CCS'08.
- Frigate - C-style compiler for optimizing boolean circuits. | Euro S&P'16.
- Myst - Secure Multiparty Key Generation, Signature and Decryption JavaCard applet and host application | CCS'17.
- SDA - Secure distributed aggregation of high-dimensional vectors | 2017/643.
- SPDZ - General MPC with secret sharing; secure against malicious adversaries | eprint: 2017/1230.
- SPDZ-Yao - 2PC with garbled circuits; high-level language similar to SPDZ; secure against semi-honest adversaries.
- Semi-honest BMR - BMR protocol secure against semi-honest adversaries | 2016/1066.
- Tasty - 2PC with garbled circuits and homomorphic encryption | 2010/365.
- TinyLEGO - 2PC with garbled circuits; secure against malicious adversaries | eprint: 2015/309.
- VIFF - 3+PC with secret sharing; secure against semi-honest adveraries.
- Wysteria - Multparty computation with GMW, written in a functional PL; secure against semi-honest adversaries | S&P'14.
- IIT Bombay MPC school - Covers basic and advanced topics related to the theory of MPC aimed at CS students and researchers interested in cryptography.
- Securing Computation - Conducted at Simons institute for Theory of Computing.
- The 1st BIU Winter School - Introductory lectures for basic secure computation constructions.
- The 5th BIU Winter School - Tutorials and recent advances in secure computation delivered in video format.
- TPMPC - Yearly workshop that started in Aarhus 2012. It has now become one of the biggest workshops for MPC people.