Secure Multi-Party Computation

Applications & Examples

Slide 1
Slide 2
Slide 3
Slide 4
Slide 5
Slide 6
Slide 7
Slide 8
Slide 9
Slide 10
Slide 11
Slide 12
Slide 13
Slide 14
Slide 15

References

Note: The sources marked in purple are ideal for further reading, particularly for a non-technical audience. Tester
M. Blake, J. McWaters, and R. Galaski. “The next generation of data-sharing in financial services: Using privacy enhancing techniques to unlock new value”. In: World Economic Forum. 2019, pp. 1–36.
Y. Lindell. Secure Multiparty Computation (MPC). Cryptology ePrint Archive, Paper 2020/300. 2020. doi: 10.1145/3387108.
Gartner. Gartner Says Digital Ethics is at the Peak of Inflated Expectations in the 2021 Gartner Hype Cycle for Privacy. 2021. (visited on 07/11/2023).
H. Cho, D. J. Wu, and B. Berger. “Secure genome-wide association analysis using multiparty computation”. In: Nature biotechnology 36.6 (2018), pp. 547–551. doi: 10. 1038/nbt.4108.
L. Csomor. Multi-Party Computation - Wo Sicherheit Türen öffnet. 2022. (visited on 06/04/2023).
Panther Team. A Deep Dive Into Secure Multi-Party Computation (MPC). 2022. (visited on 06/04/2023).
D. Evans, V. Kolesnikov, and M. Rosulek. A Pragmatic Introduction to Secure MultiParty Computation. Version: April 15, 2020. Now Publishers, Inc., 2018.

References

Note: The sources marked in purple are ideal for further reading, particularly for a non-technical audience. Tester
C. Zhao, S. Zhao, M. Zhao, Z. Chen, C.-Z. Gao, H. Li, and Y.-a. Tan. “Secure multi-party computation: theory, practice and applications”. In: Information Sciences 476 (2019), pp. 357–372. doi: 10.1016/j.ins.2018.10.024.
Nawazmalla. What is Secure Multiparty Computation? (visited on 06/04/2023).
IEEE Digital Privacy. Applications of Multiparty Computation. (visited on 06/04/2023).
M. Hastings, B. Hemenway, D. Noble, and S. Zdancewic. “Sok: General purpose compilers for secure multi-party computation”. In: 2019 IEEE symposium on security and privacy (SP). IEEE. 2019, pp. 1220–1237. doi: 10.1109/SP.2019.00028.
Cambridge Dictionary. Auction. (visited on 06/04/2023).
W. Kenton. Sealed-Bid Auction Definition, How It Works in Real Estate Sales. 2022. (visited on 06/04/2023).
P. Bogetoft, D. L. Christensen, I. Damgård, M. Geisler, T. Jakobsen, M. Krøigaard, J. D. Nielsen, J. B. Nielsen, K. Nielsen, J. Pagter, M. Schwartzbach, and T. Toft. Multiparty Computation Goes Live. Cryptology ePrint Archive, Paper 2008/068. 2008.

References

Note: The sources marked in purple are ideal for further reading, particularly for a non-technical audience. Tester
Gartner. Understanding Gartner’s Hype Cycles. 2018. (visited on 06/04/2023).

B. Iannotta. U.S. Satellite Destroyed in Space Collision. 2009. (visited on 06/04/2023).

Kelso, T.S. (2009). Analysis of the Iridium 33 Cosmos 2251 Collision. Proceedings of the 19th AIAA/AAS Astrodynamics Specialist Conference, 135.
A. C. Yao. “Protocols for secure computations”. In: 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982). 1982, pp. 160–164. doi: 10.1109/SFCS.1982.38.

Congratulations, you've completed all chapters!

You've completed all chapters. You can review the course or start a new one.