๐ Multi-Party Computation
From XOR secret splitting to threshold ECDSA wallets. Master the cryptographic protocols that let multiple parties compute together while keeping their inputs private โ the technology behind privacy-preserving ML, blind auctions, and cryptocurrency custody.
Why Python?
MPC concepts are language-independent โ the math works in any language. Python is recommended because it has the best ecosystem for learning: pycryptodome for primitives, tenseal for FHE, crypten for private ML, and python-ecdsa for threshold signatures. Production MPC systems are typically written in Rust (MP-SPDZ internals, threshold-crypto) or Go (tss-lib). Once you understand the protocols here, porting to any language is straightforward.
๐ข Phase 1: Cryptographic Foundations (1โ10)
Secret splitting, modular arithmetic, Shamir sharing, commitments, oblivious transfer, threat models, and the Millionaires' Problem โ the ideas every MPC protocol is built on.
๐ต Phase 2: Core Protocols (11โ16)
Verifiable secret sharing, replicated sharing, Beaver triples, SPDZ MACs, Yao's garbled circuits, and OT extension โ the complete toolkit for 2-party and 3-party MPC.
๐ฃ Phase 3: Advanced Protocols (17โ22)
Paillier homomorphic encryption, LWE and FHE concepts, secure aggregation, private information retrieval, threshold signatures, and OT-based PSI.
๐ด Phase 4: Expert Systems (23โ25)
MP-SPDZ framework, CrypTen private neural network inference, and zero-knowledge proofs with MPC-in-the-head. From research tools to production deployments.
โญ Capstone Projects (26โ30)
Five production-grade systems integrating everything in the course: blind auctions, private federated learning, threshold cryptocurrency wallets, genomic privacy, and a full-stack MPC analytics platform.