Secure multi-party computation (also known as secure computation, multi-party computation (MPC) or privacy-preserving computation) is a subfield of cryptography...
42 KB (5,909 words) - 21:09, 27 May 2025
Secure two-party computation (2PC, or secure function evaluation) is a sub-problem of secure multi-party computation (MPC) that has received special attention...
9 KB (1,093 words) - 05:19, 23 May 2025
Trustworthy AI (section Multi-Party Computation)
(PETs), including homomorphic encryption, federated learning, secure multi-party computation, differential privacy, zero-knowledge proof. The concept of...
5 KB (537 words) - 17:06, 8 June 2025
with other privacy-enhancing computational techniques such as fully homomorphic encryption, secure multi-party computation, and Trusted Computing. Confidential...
47 KB (4,453 words) - 16:19, 8 June 2025
the dining cryptographers problem studies how to perform a secure multi-party computation of the boolean-XOR function. David Chaum first proposed this...
16 KB (2,131 words) - 15:47, 30 April 2025
Cryptographic protocol (redirect from Secure connection)
material construction Secured application-level data transport Non-repudiation methods Secret sharing methods Secure multi-party computation For example, Transport...
9 KB (1,015 words) - 07:59, 25 April 2025
technique for using secure multi-party computation (MPC) protocols for efficient zero-knowledge proofs. Results on Secure Multi-Party Computation. Sahai is a...
12 KB (1,154 words) - 23:49, 28 April 2025
cryptographic tools, including secure multi-party computation and homomorphic encryption, allow for the private computation of data on untrusted systems...
7 KB (894 words) - 23:15, 23 March 2025
Privacy-preserving computational geometry is the research area on the intersection of the domains of secure multi-party computation (SMC) and computational geometry...
3 KB (326 words) - 00:44, 16 February 2022
of secure multi-party computation, which took place in January 2008. An electronic double auction was successfully run by a multiparty computation involving...
4 KB (440 words) - 02:45, 26 May 2025
Millionaires' problem is a secure multi-party computation problem introduced in 1982 by computer scientist and computational theorist Andrew Yao. The problem...
10 KB (1,952 words) - 09:30, 17 May 2025
of general secure multi-party computation. Verifiable secret sharing is important for secure multiparty computation. Multiparty computation is typically...
12 KB (1,905 words) - 00:58, 12 March 2025
encryption Confidential computing Searchable symmetric encryption Secure multi-party computation Format-preserving encryption Polymorphic code Private set intersection...
42 KB (4,692 words) - 23:00, 1 April 2025
Quantum cryptography (redirect from Quantum Secure Direct Communication)
implementation of almost any distributed computation in a secure way (so-called secure multi-party computation). (Note: The results by Crépeau and Kilian...
82 KB (9,126 words) - 16:08, 3 June 2025
composition Sound and music computing Apple SMC, a video codec Secure multi-party computation, a cryptography problem Sequential Monte Carlo method, a set...
4 KB (459 words) - 13:44, 27 February 2025
protocol). This protocol was the first example of two parties conducting secure computation rather than secure message transmission, employing cryptography; later...
15 KB (2,399 words) - 22:20, 4 April 2023
engineering and involves hardware design, access control, secure multi-party computation, secure key storage, ensuring code authenticity, measures to ensure...
6 KB (609 words) - 16:51, 26 March 2025
Agency for Cybersecurity published technical guidance supporting Secure Multi-Party Computation as a valid privacy-preserving safeguard, applying to both healthcare...
27 KB (3,259 words) - 12:52, 13 January 2025
series of music workstations Secure multi-party computation MPC model, a theoretical model for massively parallel computation Marginal propensity to consume...
3 KB (370 words) - 05:23, 9 December 2024
performant applications that focuses on the optimization of secure multi-party computation and data availability. Intended to accelerate the adoption of...
7 KB (549 words) - 02:14, 13 February 2025
he conducts research on cryptography with a focus on the theory of secure computation and its application in practice. Lindell currently leads the cryptography...
9 KB (963 words) - 20:24, 15 January 2025
certification of electronic voting Vote counting system E-democracy Secure multi-party computation Mental poker Schoenmakers, Berry (1999). "A Simple Publicly...
7 KB (994 words) - 02:52, 7 July 2023
2006). "Chapter 5". Quantum And Relativistic Protocols For Secure Multi-Party Computation (Thesis). University of Cambridge. arXiv:0911.3814. Vazirani...
8 KB (900 words) - 22:33, 8 June 2025
In cryptography, the open vote network (or OV-net) is a secure multi-party computation protocol to compute the boolean-count function: namely, given a...
6 KB (951 words) - 20:23, 21 February 2025
Trustworthy AI. Including items on homomorphic encryption, secure multi-party computation, and federated learning. International Telecommunication Union...
6 KB (381 words) - 20:01, 25 May 2025
by a cloud service for example. Homomorphic encryption and secure multi-party computation are emerging techniques to compute encrypted data; these techniques...
34 KB (3,645 words) - 07:39, 2 June 2025
Broadcast encryption Distributed key generation Secret sharing Secure multi-party computation Shamir's Secret Sharing Threshold (disambiguation) Alfredo De...
8 KB (868 words) - 22:39, 15 March 2024
contributed much to the practice of cryptography and secure systems as well as to the theory of computation at large. The needs of the theoretical cryptography...
31 KB (1,411 words) - 12:04, 28 March 2025
authenticated key exchange. He has also worked in the areas of secure multi-party computation, public-key encryption, and digital signatures. He has served...
9 KB (925 words) - 20:37, 15 January 2025
Explain it like I’m Five: The Socialist Millionaire Problem and Secure Multi-Party Computation at the Wayback Machine (archived December 25, 2022) Goldbug...
8 KB (1,153 words) - 04:01, 10 June 2025