Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Secure multi-party computation

Known as: MPC, Multi-party computing, Virtual Party Protocol 
Secure multi-party computation (also known as secure computation or multi-party computation/MPC) is a subfield of cryptography with the goal of… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
The unpredictability and intermittency introduced by Renewable Energy Sources (RESs) in power systems may lead to unforeseen… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Review
2018
Review
2018
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s to a tool for building real systems… Expand
Is this relevant?
Highly Cited
2009
Highly Cited
2009
After a general introduction, the thesis is divided into four parts. In the first, we discuss the task of coin tossing… Expand
  • figure 1.2
  • figure 1.3
  • figure 1.4
  • figure 1.5
  • figure 1.6
Is this relevant?
Highly Cited
2008
Highly Cited
2008
We present FairplayMP (for "Fairplay Multi-Party"), a system for secure multi-party computation. Secure computation is one of the… Expand
  • table 1
  • figure 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
AbstractIt has recently been shown that authenticated Byzantine agreement, in which more than a third of the parties are… Expand
Is this relevant?
Highly Cited
2002
Highly Cited
2002
A simple approach to secure multi-party computation is presented. Unlike previous approaches, it is based on essentially no… Expand
Is this relevant?
Highly Cited
2001
Highly Cited
2001
The general secure multi-party computation problem is when multiple parties (say, Alice and Bob) each have private data… Expand
  • figure 1
Is this relevant?
Highly Cited
2000
Highly Cited
2000
We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set of n players can efficiently be… Expand
Is this relevant?
Highly Cited
1998
Highly Cited
1998
 
Is this relevant?
Highly Cited
1996
Highly Cited
1996
A fundamental problem in designing secure multi-party protocols is how to deal with adaptive adversaries (i.e., adversaries that… Expand
Is this relevant?