add eplanation of original paper

This commit is contained in:
fria 2025-05-28 08:53:10 -05:00 committed by GitHub
parent 144e5017bf
commit 68b3c1ce04
No known key found for this signature in database
GPG key ID: B5690EEEBB952194

View file

@ -10,7 +10,7 @@ tags:
- Privacy Enhancing Technologies
license: BY-SA
schema_type: BackgroundNewsArticle
description: |
description: Learn about Secure Multi-Party Computation and how it can
---
# Multi-Party Computation
@ -19,3 +19,8 @@ We know how to secure data in storage using E2EE, but is it possible to ensure d
## History
In a pivotal [paper](https://dspace.mit.edu/bitstream/handle/1721.1/148953/MIT-LCS-TM-125.pdf?sequence=1) called "Mental Poker" by Adi Shamir, Ronald L. Rivest, and Leonard M. Adleman from 1979, the researchers attempt to demonstrate a way of playing poker over distance using only messages and still have it be a fair game.
To explain, fan favorites Alice and Bob will make a return. First, Bob encrypts all the cards with his key, then sends them to Alice. Alice picks five to deal back to Bob as his hand, then encrypts five with her own key and sends those to Bob as well. Bob removes his encryption from all ten cards and sends Alice's cards back to her.
Notice that Bob needs to be able to remove his encryption *after* Alice has applied hers. This commutative property is important for the scheme to work.