mirror of
https://github.com/privacyguides/privacyguides.org.git
synced 2025-09-21 13:34:50 -04:00
Change timestamp
This commit is contained in:
parent
bedf98baac
commit
9ddb81588f
2 changed files with 7 additions and 8 deletions
|
@ -1,24 +1,23 @@
|
|||
---
|
||||
date:
|
||||
created: 2025-07-01T17:30:00Z
|
||||
created: 2025-09-15T17:30:00Z
|
||||
categories:
|
||||
- Explainers
|
||||
authors:
|
||||
- fria
|
||||
tags:
|
||||
- Multi-Party Computation
|
||||
- Privacy Enhancing Technologies
|
||||
license: BY-SA
|
||||
- Multi-Party Computation
|
||||
schema_type: BackgroundNewsArticle
|
||||
description: Learn about Secure Multi-Party Computation and how it can be used to solve real-world privacy problems.
|
||||
---
|
||||
# Privacy-Enhancing Technologies Series: Multi-Party Computation
|
||||
# What is Multi-Party Computation?
|
||||
|
||||

|
||||
|
||||
<small aria-hidden="true">Illustration: Jordan Warne / Privacy Guides</small>
|
||||
|
||||
We know how to secure data in storage using E2EE, but is it possible to ensure data privacy even while processing it server-side? This is the first in a series of articles I'll be writing covering the privacy-enhancing technologies being rolled out.<!-- more -->
|
||||
We know how to secure data in storage using E2EE, but is it possible to ensure data privacy even while processing it server-side? This is the first in a [series](../tags.md/#tag:privacy-enhancing-technologies) of articles I'll be writing covering the privacy-enhancing technologies being rolled out.<!-- more -->
|
||||
|
||||
## History
|
||||
|
||||
|
@ -56,7 +55,7 @@ Multi-Party Computation was solidified with the [research](https://dl.acm.org/do
|
|||
|
||||
#### More Than Two Parties
|
||||
|
||||
Yao's protocol was limited to two parties. The GMW paradigm expanded the protocol to be able to handle any number of parties and can handle actively malicious actors as long as the majority are honest.
|
||||
Yao's protocol was limited to two parties. The GMW paradigm expanded the protocol to be able to handle any number of parties and can handle actively malicious actors as long as the majority are honest.
|
||||
|
||||
#### Secret Sharing
|
||||
|
||||
|
@ -152,4 +151,4 @@ There's been research into using MPC for secure and [verifiably fair](https://ep
|
|||
|
||||
MPC acts as an essential privacy tool in the toolbox. It intersects with other PETs like homomorphic encryption, a method of encrypting data in such a way that operations can still be performed on it without revealing the unencrypted data.
|
||||
|
||||
MPC is just one tool among many that's reshaping the privacy landscape. I'm excited to see how it's used in the future and what new advancements it unlocks.
|
||||
MPC is just one tool among many that's reshaping the privacy landscape. I'm excited to see how it's used in the future and what new advancements it unlocks.
|
||||
|
|
|
@ -91,7 +91,7 @@ Developed and hosted by *XWiki* in Paris, France, **CryptPad** is a complete onl
|
|||
|
||||
<div class="admonition recommendation" markdown>
|
||||
|
||||
{ align=right }
|
||||
{ align=right }
|
||||
|
||||
**Nextcloud** is a suite of free and open-source client-server software for creating your own file hosting services on a private server you control.
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue