Secure multi-party computation

3Citations
Citations of this article
229Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Secure multi-party computation enables a group of parties to compute a function while jointly keeping their private inputs secret. The term "secure" indicates the latter property where the private inputs used for computation are kept secret from all other parties. A significant benefit of using secure multi-party computation is that many constructed protocols are information-theoretically secure, avoiding many problems using cryptographic hardness assumptions. Some notable use cases are secure auctions, privacy-preserving network security monitoring, spam filtering on encrypted emails, and secure machine learning. Secure multi-party computation can be used to secure and enable privacy-preserving applications from privacy-preserving network security to secure machine learning.

Cite

CITATION STYLE

APA

Merino, L. H., & Cabrero-Holgueras, J. (2023). Secure multi-party computation. In Trends in Data Protection and Encryption Technologies (pp. 89–92). Springer Nature. https://doi.org/10.1007/978-3-031-33386-6_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free