diff --git a/blog/posts/multi-party-computation.md b/blog/posts/multi-party-computation.md index ec74f457..6fcf820d 100644 --- a/blog/posts/multi-party-computation.md +++ b/blog/posts/multi-party-computation.md @@ -1,24 +1,23 @@ --- date: - created: 2025-07-01T17:30:00Z + created: 2025-09-15T17:30:00Z categories: - Explainers authors: - fria tags: - - Multi-Party Computation - Privacy Enhancing Technologies -license: BY-SA + - Multi-Party Computation schema_type: BackgroundNewsArticle description: Learn about Secure Multi-Party Computation and how it can be used to solve real-world privacy problems. --- -# Privacy-Enhancing Technologies Series: Multi-Party Computation +# What is Multi-Party Computation? ![An image of a lock and multiple keys going toward it to unlock it](../assets/images/multi-party-computation/cover.webp) -We know how to secure data in storage using E2EE, but is it possible to ensure data privacy even while processing it server-side? This is the first in a series of articles I'll be writing covering the privacy-enhancing technologies being rolled out. +We know how to secure data in storage using E2EE, but is it possible to ensure data privacy even while processing it server-side? This is the first in a [series](../tags.md/#tag:privacy-enhancing-technologies) of articles I'll be writing covering the privacy-enhancing technologies being rolled out. ## History @@ -56,7 +55,7 @@ Multi-Party Computation was solidified with the [research](https://dl.acm.org/do #### More Than Two Parties -Yao's protocol was limited to two parties. The GMW paradigm expanded the protocol to be able to handle any number of parties and can handle actively malicious actors as long as the majority are honest. +Yao's protocol was limited to two parties. The GMW paradigm expanded the protocol to be able to handle any number of parties and can handle actively malicious actors as long as the majority are honest. #### Secret Sharing @@ -152,4 +151,4 @@ There's been research into using MPC for secure and [verifiably fair](https://ep MPC acts as an essential privacy tool in the toolbox. It intersects with other PETs like homomorphic encryption, a method of encrypting data in such a way that operations can still be performed on it without revealing the unencrypted data. -MPC is just one tool among many that's reshaping the privacy landscape. I'm excited to see how it's used in the future and what new advancements it unlocks. \ No newline at end of file +MPC is just one tool among many that's reshaping the privacy landscape. I'm excited to see how it's used in the future and what new advancements it unlocks. diff --git a/blog/posts/private-european-alternatives.md b/blog/posts/private-european-alternatives.md index 3a88efd7..97dd84ec 100644 --- a/blog/posts/private-european-alternatives.md +++ b/blog/posts/private-european-alternatives.md @@ -91,7 +91,7 @@ Developed and hosted by *XWiki* in Paris, France, **CryptPad** is a complete onl
-![Nextcloud logo](../assets/img/document-collaboration/nextcloud.svg){ align=right } +![Nextcloud logo](../assets/img/self-hosting/nextcloud.svg){ align=right } **Nextcloud** is a suite of free and open-source client-server software for creating your own file hosting services on a private server you control.