Talk:Secure multi-party computation

Hyphenate
shouldn't multiparty computation be written multi-party computation? 11:46, 5 June 2007 134.58.253.57


 * Hey! Maybe.  What interests me more is a plain English account of a solution to the Millionaire's Problem.  An example, please.  Paul Beardsell (talk) 20:42, 9 February 2008 (UTC)


 * I've changed it. At least now they appear all the same way in the article. 81.44.54.226 (talk) 11:45, 23 August 2018 (UTC)

Link to VIFF
I have just added a link to my own project called VIFF (http://viff.dk/). I hope this is seen as relevant since it is the only project (that I know of) in this area that offers working source code under the GPL. Martin Geisler (talk) 08:37, 15 February 2008 (UTC)

Is it possible to have a general purpose encrypted computer?
Using something like FPGA's perhaps, would it possible to have a processor of a standard architecture, that is encrypted with arbitrary keys the local machine can't figure out; and can receive, process, and transmit encrypted data without ever decrypting it? How much slower than a plaintext processor of the same architecture would it be? The article mentions writing programs that get compiled into logic gates, and then the logic gates get encrypted; could you write for example an ARM emulator like that, then give it an encrypted image of a disk containing an ARM compatible Linux installation, and have it run it, receiving encrypted inputs, and returning encrypted outputs that would get decrypted in near real-time remotely? Or is there something preventing such encrypted gate arrays from being Turing complete? --TiagoTiago (talk) 02:34, 22 November 2015 (UTC)

External links modified
Hello fellow Wikipedians,

I have just added archive links to 1 one external link on Secure multi-party computation. Please take a moment to review my edit. If necessary, add after the link to keep me from modifying it. Alternatively, you can add to keep me off the page altogether. I made the following changes:
 * Added archive http://web.archive.org/web/20070610082513/http://privacy.cs.cmu.edu/dataprivacy/papers/multipartycomputation/index.html to http://privacy.cs.cmu.edu/dataprivacy/papers/multipartycomputation/index.html

When you have finished reviewing my changes, please set the checked parameter below to true or failed to let others know (documentation at ).

Cheers.—cyberbot II  Talk to my owner :Online 14:14, 28 February 2016 (UTC)

This is a bit dry in terms of the people involved
I am surprised that this article does not really provide any information about specific individuals who pioneered the field. I just added to the lede:

"By the late 1980s, Michael Ben-Or, Shafi Goldwasser and Avi Wigderson, and independently David Chaum, Claude Crépeau, and Ivan Damgård, had published papers showing "how to securely compute any function in the secure channels setting"."

(with a reference), but a lot more could be said about the work consistently done by people like these. BD2412 T 08:20, 12 February 2022 (UTC)