Secure multi-party computation

Known as: MPC, Multi-party computing, Virtual Party Protocol 
Secure multi-party computation (also known as secure computation or multi-party computation/MPC) is a subfield of cryptography with the goal of… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
In the last few years the efficiency of secure multi-party computation (MPC) increased in several orders of magnitudes. However… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 6
  • figure 7
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Secure multi-party computation (MPC) is a technique well suited for privacy-preserving data mining. Even with the recent progress… (More)
  • table 1
  • table 2
  • table 3
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2008
Highly Cited
2008
We present FairplayMP (for "Fairplay Multi-Party"), a system for secure multi-party computation. Secure computation is one of the… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
2005
2005
It has recently been shown that authenticated Byzantine agreement, in which more than a third of the parties are corrupted… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We show how to securely realize any multi-party functionality in a way that preserves security under an a-priori bounded number… (More)
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2002
Highly Cited
2002
A simple approach to secure multi-party computation is presented. Unlike previous approaches, it is based on essentially no… (More)
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Secure Multi-party Computation (SMC) problems deal with the following situation: Two (or many) parties want to jointly perform a… (More)
  • figure 1
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Since the introduction of secure multi-party computation, all proposed protocols that provide security against cheating players… (More)
Is this relevant?
1998
1998
This paper describes e cient protocols for multi party com putations that are information theoretically secure against passive at… (More)
  • figure 1
Is this relevant?
Highly Cited
1996
Highly Cited
1996
A fundamental problem in designing secure multi-party protocols is how to deal with adaptive adversaries (i.e., adversaries that… (More)
Is this relevant?