Practical Secure Two-Party Computation : Techniques , Tools , and Applications

@inproceedings{Evans2014PracticalST,
  title={Practical Secure Two-Party Computation : Techniques , Tools , and Applications},
  author={David Evans and Aaron Mackey and Abhi Shelat and Michael Hicks and Jonathan Katz and Steven Myers},
  year={2014}
}
Many compelling applications involve computations that require sensitive data from two or more individuals. As an example, consider the myriad genetics applications soon to be within reach of individuals as the cost of personal genome sequencing rapidly plummets. An individual may wish to compare her genome with the genomes of different groups of participants in a study to determine which treatment is likely to be most effective for her. Such comparisons could have tremendous value, but are… CONTINUE READING