• Computer Science
  • Published 2016

Efficient secure computation enabled by blockchain technology

@inproceedings{Zyskind2016EfficientSC,
  title={Efficient secure computation enabled by blockchain technology},
  author={Guy Zyskind},
  year={2016}
}
For several decades, secure multiparty computation has been the topic of extensive research, as it enables computing any functionality in a privacy-preserving manner, while ensuring correctness of the outputs. In recent years, the field has seen tremendous progress in terms of efficiency, although most results remained impractical for real applications concerning complex functionalities or significant data. When privacy is not a concern and we are only interested in achieving consensus in a… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-5 OF 5 CITATIONS

Cryptographically Certified Hypothesis Testing by

VIEW 9 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

The Scalability of Trustless Trust

VIEW 5 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Optimizing clinical trials with Open Trial Chain

VIEW 1 EXCERPT
CITES BACKGROUND

Raziel: Private and Verifiable Smart Contracts on Blockchains

References

Publications referenced by this paper.
SHOWING 1-10 OF 66 REFERENCES

Mobile proactive secret sharing

VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts

VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Secure Computation with Fixed-Point Numbers

VIEW 10 EXCERPTS
HIGHLY INFLUENTIAL

Completeness theorems for non-cryptographic fault-tolerant distributed computation.

  • Ben-Or, Michael, Shafi Goldwasser, Avi Wigderson
  • Proceedings of the twentieth annual ACM symposium on Theory of computing
  • 1988
VIEW 8 EXCERPTS
HIGHLY INFLUENTIAL

A General Framework for Multiparty Computations

  • Reistad, Tord Ingolf
  • Diss. Norwegian University of Science and Technology,
  • 2012
VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

Practical Covertly Secure MPC for Dishonest Majority - or: Breaking the SPDZ Limits

VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL