• Secure multi-party computation (also known as secure computation, multi-party computation (MPC) or privacy-preserving computation) is a subfield of cryptography...
    42 KB (5,909 words) - 21:09, 27 May 2025
  • Secure two-party computation (2PC, or secure function evaluation) is a sub-problem of secure multi-party computation (MPC) that has received special attention...
    9 KB (1,093 words) - 05:19, 23 May 2025
  • (PETs), including homomorphic encryption, federated learning, secure multi-party computation, differential privacy, zero-knowledge proof. The concept of...
    5 KB (537 words) - 17:06, 8 June 2025
  • with other privacy-enhancing computational techniques such as fully homomorphic encryption, secure multi-party computation, and Trusted Computing. Confidential...
    47 KB (4,453 words) - 16:19, 8 June 2025
  • the dining cryptographers problem studies how to perform a secure multi-party computation of the boolean-XOR function. David Chaum first proposed this...
    16 KB (2,131 words) - 15:47, 30 April 2025
  • material construction Secured application-level data transport Non-repudiation methods Secret sharing methods Secure multi-party computation For example, Transport...
    9 KB (1,015 words) - 07:59, 25 April 2025
  • Thumbnail for Amit Sahai
    technique for using secure multi-party computation (MPC) protocols for efficient zero-knowledge proofs. Results on Secure Multi-Party Computation. Sahai is a...
    12 KB (1,154 words) - 23:49, 28 April 2025
  • cryptographic tools, including secure multi-party computation and homomorphic encryption, allow for the private computation of data on untrusted systems...
    7 KB (894 words) - 23:15, 23 March 2025
  • Privacy-preserving computational geometry is the research area on the intersection of the domains of secure multi-party computation (SMC) and computational geometry...
    3 KB (326 words) - 00:44, 16 February 2022
  • of secure multi-party computation, which took place in January 2008. An electronic double auction was successfully run by a multiparty computation involving...
    4 KB (440 words) - 02:45, 26 May 2025
  • Millionaires' problem is a secure multi-party computation problem introduced in 1982 by computer scientist and computational theorist Andrew Yao. The problem...
    10 KB (1,952 words) - 09:30, 17 May 2025
  • of general secure multi-party computation. Verifiable secret sharing is important for secure multiparty computation. Multiparty computation is typically...
    12 KB (1,905 words) - 00:58, 12 March 2025
  • encryption Confidential computing Searchable symmetric encryption Secure multi-party computation Format-preserving encryption Polymorphic code Private set intersection...
    42 KB (4,692 words) - 23:00, 1 April 2025
  • implementation of almost any distributed computation in a secure way (so-called secure multi-party computation). (Note: The results by Crépeau and Kilian...
    82 KB (9,126 words) - 16:08, 3 June 2025
  • composition Sound and music computing Apple SMC, a video codec Secure multi-party computation, a cryptography problem Sequential Monte Carlo method, a set...
    4 KB (459 words) - 13:44, 27 February 2025
  • protocol). This protocol was the first example of two parties conducting secure computation rather than secure message transmission, employing cryptography; later...
    15 KB (2,399 words) - 22:20, 4 April 2023
  • engineering and involves hardware design, access control, secure multi-party computation, secure key storage, ensuring code authenticity, measures to ensure...
    6 KB (609 words) - 16:51, 26 March 2025
  • Agency for Cybersecurity published technical guidance supporting Secure Multi-Party Computation as a valid privacy-preserving safeguard, applying to both healthcare...
    27 KB (3,259 words) - 12:52, 13 January 2025
  • series of music workstations Secure multi-party computation MPC model, a theoretical model for massively parallel computation Marginal propensity to consume...
    3 KB (370 words) - 05:23, 9 December 2024
  • performant applications that focuses on the optimization of secure multi-party computation and data availability. Intended to accelerate the adoption of...
    7 KB (549 words) - 02:14, 13 February 2025
  • Thumbnail for Yehuda Lindell
    he conducts research on cryptography with a focus on the theory of secure computation and its application in practice. Lindell currently leads the cryptography...
    9 KB (963 words) - 20:24, 15 January 2025
  • certification of electronic voting Vote counting system E-democracy Secure multi-party computation Mental poker Schoenmakers, Berry (1999). "A Simple Publicly...
    7 KB (994 words) - 02:52, 7 July 2023
  • 2006). "Chapter 5". Quantum And Relativistic Protocols For Secure Multi-Party Computation (Thesis). University of Cambridge. arXiv:0911.3814. Vazirani...
    8 KB (900 words) - 22:33, 8 June 2025
  • In cryptography, the open vote network (or OV-net) is a secure multi-party computation protocol to compute the boolean-count function: namely, given a...
    6 KB (951 words) - 20:23, 21 February 2025
  • Thumbnail for ITU-T Study Group 17
    Trustworthy AI. Including items on homomorphic encryption, secure multi-party computation, and federated learning. International Telecommunication Union...
    6 KB (381 words) - 20:01, 25 May 2025
  • Thumbnail for Encryption
    by a cloud service for example. Homomorphic encryption and secure multi-party computation are emerging techniques to compute encrypted data; these techniques...
    34 KB (3,645 words) - 07:39, 2 June 2025
  • Broadcast encryption Distributed key generation Secret sharing Secure multi-party computation Shamir's Secret Sharing Threshold (disambiguation) Alfredo De...
    8 KB (868 words) - 22:39, 15 March 2024
  • contributed much to the practice of cryptography and secure systems as well as to the theory of computation at large. The needs of the theoretical cryptography...
    31 KB (1,411 words) - 12:04, 28 March 2025
  • authenticated key exchange. He has also worked in the areas of secure multi-party computation, public-key encryption, and digital signatures. He has served...
    9 KB (925 words) - 20:37, 15 January 2025
  • Explain it like I’m Five: The Socialist Millionaire Problem and Secure Multi-Party Computation at the Wayback Machine (archived December 25, 2022) Goldbug...
    8 KB (1,153 words) - 04:01, 10 June 2025