Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,350,557 papers from all fields of science
Search
Sign In
Create Free Account
Secure multi-party computation
Known as:
MPC
, Multi-party computing
, Virtual Party Protocol
Expand
Secure multi-party computation (also known as secure computation or multi-party computation/MPC) is a subfield of cryptography with the goal of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
22 relations
Access structure
Bitcoin
Central processing unit
Cryptographic protocol
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation
M. Riazi
,
Mojan Javaheripi
,
S. Hussain
,
F. Koushanfar
IEEE International Symposium on Hardware Oriented…
2019
Corpus ID: 85449372
Secure Multi-party Computation (MPC) is one of the most influential achievements of modern cryptography: it allows evaluation of…
Expand
2018
2018
A New Paradigm for Practical Maliciously Secure Multi-Party Computation
X. Wang
2018
Corpus ID: 56595693
Title of dissertation: A NEW PARADIGM FOR PRACTICAL MALICIOUSLY SECURE MULTI-PARTY COMPUTATION Xiao Wang, Doctor of Philosophy…
Expand
2017
2017
WYS*: A Verified Language Extension for Secure Multi-party Computations
Aseem Rastogi
,
Nikhil Swamy
,
M. Hicks
arXiv.org
2017
Corpus ID: 781170
Secure multi-party computation (MPC) enables a set of mutually distrusting parties to cooperatively compute, using a…
Expand
Review
2016
Review
2016
Preservation of Private Information using Secure Multi-Party Computation
S. Bhanumathi
,
P. Sakthivel
2016
Corpus ID: 63660228
Background/Objectives: Secure Multi-party Computation (SMC) method is used to secure individual’s sensitive data during privacy…
Expand
Review
2008
Review
2008
An Electronic Voting Scheme Based on Secure Multi-party Computation
Cao Gang
International Symposium on Computer Science and…
2008
Corpus ID: 24150648
Electronic voting systems, catering to different requirements, have been widely implemented and used. This paper will overview…
Expand
2007
2007
Secret Sharing and Secure Multi-party Computation
M. Mortensen
2007
Corpus ID: 7368094
Preface This thesis explores the different secret sharing schemes from the 1970s until today. We present the schemes and provide…
Expand
2006
2006
Privacy Preserving Sequential Pattern Mining Based on Secure Multi-party Computation
Weimin Ouyang
,
Qinhua Huang
International Conference on Informatics and…
2006
Corpus ID: 18564373
Privacy-preserving data mining in distributed or grid environment is an important hot research topic in recent years. We focus on…
Expand
2005
2005
Secure Multi-Party Computation with Security Modules
Z. Benenson
,
F. Freiling
,
D. Kesdogan
Sicherheit
2005
Corpus ID: 1772398
We consider the problem of secure multi-party computation (SMC) in a new model where individual processes contain a tamper-proof…
Expand
2005
2005
Privacy preserving e-negotiation protocols based on secure multi-party computation
S. Chakraborty
,
S. Sehgal
,
A. K. Pal
Proceedings. IEEE SoutheastCon, .
2005
Corpus ID: 33206963
In this paper, we have presented several algorithms based on distributed secure multiparty computation. We have applied these…
Expand
Review
1999
Review
1999
Preface to Special Issue on General Secure Multi-party Computation Background on General Secure Multi-party Computation
Oded Goldreich
1999
Corpus ID: 17472876
More than a decade has passed since general results concerning secure two-party and multi-party computations were rst announced…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE