Jump to content

Talk:Secure multi-party computation

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia

Hyphenate

[edit]

shouldn't multiparty computation be written multi-party computation? 11:46, 5 June 2007 134.58.253.57

Hey! Maybe. What interests me more is a plain English account of a solution to the Millionaire's Problem. An example, please. Paul Beardsell (talk) 20:42, 9 February 2008 (UTC)[reply]
I've changed it. At least now they appear all the same way in the article. 81.44.54.226 (talk) 11:45, 23 August 2018 (UTC)[reply]
[edit]

I have just added a link to my own project called VIFF (http://viff.dk/). I hope this is seen as relevant since it is the only project (that I know of) in this area that offers working source code under the GPL. Martin Geisler (talk) 08:37, 15 February 2008 (UTC)[reply]

Is it possible to have a general purpose encrypted computer?

[edit]

Using something like FPGA's perhaps, would it possible to have a processor of a standard architecture, that is encrypted with arbitrary keys the local machine can't figure out; and can receive, process, and transmit encrypted data without ever decrypting it? How much slower than a plaintext processor of the same architecture would it be? The article mentions writing programs that get compiled into logic gates, and then the logic gates get encrypted; could you write for example an ARM emulator like that, then give it an encrypted image of a disk containing an ARM compatible Linux installation, and have it run it, receiving encrypted inputs, and returning encrypted outputs that would get decrypted in near real-time remotely? Or is there something preventing such encrypted gate arrays from being Turing complete? --TiagoTiago (talk) 02:34, 22 November 2015 (UTC)[reply]

[edit]

Hello fellow Wikipedians,

I have just added archive links to one external link on Secure multi-party computation. Please take a moment to review my edit. If necessary, add {{cbignore}} after the link to keep me from modifying it. Alternatively, you can add {{nobots|deny=InternetArchiveBot}} to keep me off the page altogether. I made the following changes:

When you have finished reviewing my changes, please set the checked parameter below to true or failed to let others know (documentation at {{Sourcecheck}}).

This message was posted before February 2018. After February 2018, "External links modified" talk page sections are no longer generated or monitored by InternetArchiveBot. No special action is required regarding these talk page notices, other than regular verification using the archive tool instructions below. Editors have permission to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the RfC before doing mass systematic removals. This message is updated dynamically through the template {{source check}} (last update: 5 June 2024).

  • If you have discovered URLs which were erroneously considered dead by the bot, you can report them with this tool.
  • If you found an error with any archives or the URLs themselves, you can fix them with this tool.

Cheers.—cyberbot IITalk to my owner:Online 14:14, 28 February 2016 (UTC)[reply]

This is a bit dry in terms of the people involved

[edit]

I am surprised that this article does not really provide any information about specific individuals who pioneered the field. I just added to the lede:

By the late 1980s, Michael Ben-Or, Shafi Goldwasser and Avi Wigderson, and independently David Chaum, Claude Crépeau, and Ivan Damgård, had published papers showing "how to securely compute any function in the secure channels setting".

(with a reference), but a lot more could be said about the work consistently done by people like these. BD2412 T 08:20, 12 February 2022 (UTC)[reply]