The document summarizes a lecture on multi-party computation protocols. It defines multi-party computation where multiple parties want to compute a function on their private inputs while keeping the inputs secret. It discusses security against threshold adversaries who can corrupt up to t parties. It overviews classical results on the thresholds for secure computation and constructions using secret sharing and arithmetic circuits over fields.