MPC-Stark
Example
mpc-stark
provides a malicious secure SPDZ style framework for two party secure computation. The circuit is constructed on the fly, by overloading arithmetic operators of MPC types, see the example below in which each of the parties shares a value and together they compute the product:
use mpc_stark::{
algebra::scalar::Scalar, beaver::SharedValueSource, network::QuicTwoPartyNet, MpcFabric,
PARTY0, PARTY1,
};
use rand::thread_rng;
#[tokio::main]
async fn main() {
let beaver = BeaverSource::new();
let local_addr = "127.0.0.1:8000".parse().unwrap();
let peer_addr = "127.0.0.1:9000".parse().unwrap();
let network = QuicTwoPartyNet::new(PARTY0, local_addr, peer_addr);
let mut rng = thread_rng();
let my_val = Scalar::random(&mut rng);
let fabric = MpcFabric::new(network, beaver);
let a = fabric.share_scalar(my_val, PARTY0 ); let b = fabric.share_scalar(my_val, PARTY1 ); let c = a * b;
let res = c.open_authenticated().await.expect("authentication error");
println!("a * b = {res}");
}
Tests
Unit tests for isolated parts of the library are available via
cargo test --lib
The bulk of this library's testing is best done with real communication; and so most of the tests are integration tests. The integration tests can be run as
./run_integration.zsh
or more directly as
docker compose up