Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,250,580 papers from all fields of science
Search
Sign In
Create Free Account
Secure multi-party computation
Known as:
MPC
, Multi-party computing
, Virtual Party Protocol
Expand
Secure multi-party computation (also known as secure computation or multi-party computation/MPC) is a subfield of cryptography with the goal of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
22 relations
Access structure
Bitcoin
Central processing unit
Cryptographic protocol
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
Secure Multi-Party Computation on Blockchain: An Overview
Hanrui Zhong
,
Yingpeng Sang
,
Yongchun Zhang
,
Zhicheng Xi
International Symposium on Parallel Architectures…
2019
Corpus ID: 210925115
Secure multi-party computation (SMPC) is a hot topic in the field of cryptography. It focuses on finishing computation tasks…
Expand
2019
2019
Privacy Preserving Distributed Data Mining Based on Secure Multi-party Computation
Y. Zhou
,
Yuan Tian
,
Fang Liu
,
Jun Liu
,
Yan Zhu
International Conference on Advanced Infocomm…
2019
Corpus ID: 209457757
Data mining is an important task to understand the valuable information for making right decision. There are numerous mature…
Expand
Highly Cited
2012
Highly Cited
2012
High-performance secure multi-party computation for data mining applications
D. Bogdanov
,
Margus Niitsoo
,
Tomas Toft
,
J. Willemson
International Journal of Information Security
2012
Corpus ID: 1062714
Secure multi-party computation (MPC) is a technique well suited for privacy-preserving data mining. Even with the recent progress…
Expand
Highly Cited
2012
Highly Cited
2012
Deploying Secure Multi-Party Computation for Financial Data Analysis - (Short Paper)
D. Bogdanov
,
Riivo Talviste
,
J. Willemson
Financial Cryptography
2012
Corpus ID: 468028
We show how to collect and analyze financial data for a consortium of ICT companies using secret sharing and secure multi-party…
Expand
Highly Cited
2007
Highly Cited
2007
Universally Composable Multi-party Computation Using Tamper-Proof Hardware
Jonathan Katz
International Conference on the Theory and…
2007
Corpus ID: 16473878
Protocols proven secure within the universal composability (UC) frameworksatisfy strong and desirable security properties…
Expand
Highly Cited
2005
Highly Cited
2005
Secure Multi-Party Computation without Agreement
S. Goldwasser
,
Yehuda Lindell
Journal of Cryptology
2005
Corpus ID: 2816700
AbstractIt has recently been shown that authenticated Byzantine agreement, in which more than a third of the parties are…
Expand
Review
2003
Review
2003
Leveraging the "Multi" in secure multi-party computation
Jaideep Vaidya
,
Chris Clifton
Workshop on Privacy in the Electronic Society
2003
Corpus ID: 16590968
Secure Multi-Party Computation enables parties with private data to collaboratively compute a global function of their private…
Expand
Highly Cited
2002
Highly Cited
2002
A practical approach to solve Secure Multi-party Computation problems
Wenliang Du
,
J. Zhan
New Security Paradigms Workshop
2002
Corpus ID: 1347638
Secure Multi-party Computation (SMC) problems deal with the following situation: Two (or many) parties want to jointly perform a…
Expand
2001
2001
Minimal Complete Primitives for Secure Multi-Party Computation
Matthias Fitzi
,
J. Garay
,
U. Maurer
,
R. Ostrovsky
Journal of Cryptology
2001
Corpus ID: 6598360
AbstractThe study of minimal cryptographic primitives needed to implement secure computation among two or more players is a…
Expand
Highly Cited
2000
Highly Cited
2000
Efficient Secure Multi-party Computation
M. Hirt
,
U. Maurer
,
Bartosz Przydatek
International Conference on the Theory and…
2000
Corpus ID: 11727120
Since the introduction of secure multi-party computation, all proposed protocols that provide security against cheating players…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE