Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Secure Multi-Party Computation

29

Flashcards

0/29

Still learning
StarStarStarStar

Oblivious Transfer

StarStarStarStar

A type of protocol where a sender transfers some of many possible pieces of information to a receiver, but remains oblivious to what piece has been transferred.

StarStarStarStar

Function Secret Sharing (FSS)

StarStarStarStar

A cryptographic primitive that allows a set of parties to secretly share a function instead of a specific value, enabling distributed computation.

StarStarStarStar

Beaver Triples

StarStarStarStar

Precomputed values used in MPC protocols to perform multiplication on shared secrets without revealing those secrets.

StarStarStarStar

Circuit Privacy

StarStarStarStar

In the context of MPC, it refers to the property that not only are the inputs kept secret, but the function computed is also not revealed.

StarStarStarStar

Fairness in MPC

StarStarStarStar

The property that either all parties learn the result of the computation, or none do, ensuring no party has an advantage over others.

StarStarStarStar

Output Privacy

StarStarStarStar

In certain contexts, it ensures that only authorized parties learn the result of the computation, while others only learn their respective outputs.

StarStarStarStar

Adversary Model

StarStarStarStar

Defines the capabilities and limitations of an adversary in the context of analyzing the security of cryptographic protocols.

StarStarStarStar

Homomorphic Encryption

StarStarStarStar

An encryption method that allows computation on ciphertexts, generating an encrypted result which, when decrypted, matches the result of operations on the plaintexts.

StarStarStarStar

Secure Multi-Party Computation (MPC)

StarStarStarStar

A cryptographic protocol that allows multiple parties to compute a function over their inputs while keeping those inputs private.

StarStarStarStar

Cut-and-Choose Protocol

StarStarStarStar

A protocol technique used in secure computation where one party creates multiple instances and the other party chooses some to inspect, ensuring honest behavior.

StarStarStarStar

Multiparty Computation Schemes

StarStarStarStar

Protocols that define how parties should interact and perform computations to ensure the security and privacy of the inputs.

StarStarStarStar

Goldreich-Micali-Wigderson (GMW) Protocol

StarStarStarStar

An MPC protocol capable of secure multi-party computation over a Boolean circuit with any number of parties.

StarStarStarStar

Computational Security

StarStarStarStar

Security based on the computational difficulty of solving certain problems, which remains secure as long as the problem is computationally infeasible.

StarStarStarStar

Threshold Cryptography

StarStarStarStar

Cryptography where a certain threshold of participants is required to perform an operation, such as decrypting a message or generating a signature.

StarStarStarStar

Secret Sharing

StarStarStarStar

A method to distribute a secret amongst a group of participants, each of whom is allocated a share of the secret.

StarStarStarStar

Secure Channels

StarStarStarStar

Communication channels that are protected by cryptographic methods to ensure confidentiality and integrity of the data being transmitted.

StarStarStarStar

Zero-Knowledge Proof

StarStarStarStar

A cryptographic method by which one party can prove to another that a statement is true without revealing any information beyond the validity of the statement itself.

StarStarStarStar

Yao's Protocol

StarStarStarStar

An MPC protocol for secure two-party computation which uses garbled circuits and oblivious transfer.

StarStarStarStar

Information-Theoretic Security

StarStarStarStar

A guarantee of security that is not dependent on computational assumptions, but rather on information entropy.

StarStarStarStar

Fully Homomorphic Encryption (FHE)

StarStarStarStar

A form of homomorphic encryption that supports both addition and multiplication on ciphertexts, allowing for arbitrary computation on encrypted data.

StarStarStarStar

Input Privacy

StarStarStarStar

A feature of MPC that ensures the secrecy of each participant's private inputs throughout the computation process.

StarStarStarStar

Correctness in MPC

StarStarStarStar

Ensures that the result of the MPC computation is correct and matches what would be obtained if a trusted third party performed the computation.

StarStarStarStar

Differential Privacy

StarStarStarStar

A system for publicly sharing information about a dataset by describing the patterns of groups within the dataset while withholding information about individuals in the dataset.

StarStarStarStar

Non-Interactive Zero-Knowledge Proofs

StarStarStarStar

Proofs where the prover can convince the verifier without any interaction, typically using a pre-agreed protocol.

StarStarStarStar

Commitment Scheme

StarStarStarStar

A cryptographic protocol whereby one party commits to a value while keeping it hidden, with the ability to reveal it later.

StarStarStarStar

Shamir's Secret Sharing

StarStarStarStar

A cryptographic algorithm created by Adi Shamir that divides a secret into multiple parts, where a subset of parts can be used to reconstruct the secret.

StarStarStarStar

Verifiable Secret Sharing

StarStarStarStar

An enhancement to secret sharing where the correctness of the distributed shares can be verified by other parties.

StarStarStarStar

The Dining Cryptographers Problem

StarStarStarStar

A scenario that demonstrates the concept of ensuring privacy in a multiparty protocol, where the participants must find out whether a fact is true without revealing who knows about the fact.

StarStarStarStar

Garbled Circuits

StarStarStarStar

An encryption technique that allows secure computation of Boolean circuits via one-time tables representing the circuit's gates.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.