Y. Lindell. Secure Multiparty Computation (MPC). Cryptology ePrint Archive, Paper 2020/300. 2020. doi: 10.1145/3387108. |
H. Cho, D. J. Wu, and B. Berger. “Secure genome-wide association analysis using multiparty computation”. In: Nature biotechnology 36.6 (2018), pp. 547–551. doi: 10.1038/nbt.4108. |
Panther Team. A Deep Dive Into Secure Multi-Party Computation (MPC). 2022. |
D. Evans, V. Kolesnikov, and M. Rosulek. A Pragmatic Introduction to Secure MultiParty Computation. Version: April 15, 2020. Now Publishers, Inc., 2018. |
C. Zhao, S. Zhao, M. Zhao, Z. Chen, C.-Z. Gao, H. Li, and Y.-a. Tan. “Secure multi-party computation: theory, practice and applications”. In: Information Sciences 476 (2019), pp. 357–372. doi: 10.1016/j.ins.2018.10.024. |
Inpher. What is Secure Multiparty Computation. |
C. Dilmegani. In-Depth Guide Into Secure Multi-Party Computation in 2023. 2023. |
National Institute of Standards and Technology. Cryptographic primitive. |
Nawazmalla. What is Secure Multiparty Computation? |
A. C.-C. Yao. “How to generate and exchange secrets”. In: 27th Annual Symposium on Foundations of Computer Science (sfcs 1986). 1986, pp. 162–167. doi: 10.1109/SFCS.1986.25. |
B. Spector. What is multi-party computation (MPC)? 2021. (visited on 06/04/2023). |
N. Kaaniche, M. Laurent, and S. Belguith. “Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey”. In: Journal of Network and Computer Applications 171 (2020), p. 102807. doi: 10.1016/j.jnca.2020.102807. |