Jump to content

Talk:Secure multi-party computation

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Cyberbot II (talk | contribs) at 14:14, 28 February 2016 (Notification of altered sources needing review #IABot). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
WikiProject iconComputing Start‑class Low‑importance
WikiProject iconThis article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
StartThis article has been rated as Start-class on Wikipedia's content assessment scale.
LowThis article has been rated as Low-importance on the project's importance scale.
WikiProject iconCryptography: Computer science Start‑class High‑importance
WikiProject iconThis article is within the scope of WikiProject Cryptography, a collaborative effort to improve the coverage of Cryptography on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
StartThis article has been rated as Start-class on Wikipedia's content assessment scale.
HighThis article has been rated as High-importance on the importance scale.
Taskforce icon
This article is supported by WikiProject Computer science (assessed as High-importance).

shouldn't multiparty computation be written multi-party computation?

Hey! Maybe. What interests me more is a plain English account of a solution to the Millionaire's Problem. An example, please. Paul Beardsell (talk) 20:42, 9 February 2008 (UTC)[reply]

I have just added a link to my own project called VIFF (http://viff.dk/). I hope this is seen as relevant since it is the only project (that I know of) in this area that offers working source code under the GPL. Martin Geisler (talk) 08:37, 15 February 2008 (UTC)[reply]

Is it possible to have a general purpose encrypted computer?

Using something like FPGA's perhaps, would it possible to have a processor of a standard architecture, that is encrypted with arbitrary keys the local machine can't figure out; and can receive, process, and transmit encrypted data without ever decrypting it? How much slower than a plaintext processor of the same architecture would it be? The article mentions writing programs that get compiled into logic gates, and then the logic gates get encrypted; could you write for example an ARM emulator like that, then give it an encrypted image of a disk containing an ARM compatible Linux installation, and have it run it, receiving encrypted inputs, and returning encrypted outputs that would get decrypted in near real-time remotely? Or is there something preventing such encrypted gate arrays from being Turing complete? --TiagoTiago (talk) 02:34, 22 November 2015 (UTC)[reply]

Hello fellow Wikipedians,

I have just added archive links to one external link on Secure multi-party computation. Please take a moment to review my edit. If necessary, add {{cbignore}} after the link to keep me from modifying it. Alternatively, you can add {{nobots|deny=InternetArchiveBot}} to keep me off the page altogether. I made the following changes:

When you have finished reviewing my changes, please set the checked parameter below to true or failed to let others know (documentation at {{Sourcecheck}}).

This message was posted before February 2018. After February 2018, "External links modified" talk page sections are no longer generated or monitored by InternetArchiveBot. No special action is required regarding these talk page notices, other than regular verification using the archive tool instructions below. Editors have permission to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the RfC before doing mass systematic removals. This message is updated dynamically through the template {{source check}} (last update: 5 June 2024).

  • If you have discovered URLs which were erroneously considered dead by the bot, you can report them with this tool.
  • If you found an error with any archives or the URLs themselves, you can fix them with this tool.

Cheers.—cyberbot IITalk to my owner:Online 14:14, 28 February 2016 (UTC)[reply]