Secure Computation Progress, Methods, Challenges, and Open Questions

pdf

Abstract:  Over the past decade, there has been remarkable progress in using cryptography to enable verifiable and privacy-preserving multi-party computation. The goal of this breakout is to assess the current state-of-the-art and reach consensus on what problems have largely been solved, what problems are ripe for solutions within the next year or two, and what long-term challenges remain. We will consider both underlying techniques and tools, motivating and potential applications, and hurdles that need to be addressed before secure computation can be widely and effectively deployed. 

Tags:
License: CC-2.5
Submitted by David Evans on
Feedback
Feedback
If you experience a bug or would like to see an addition or change on the current page, feel free to leave us a message.
Image CAPTCHA
Enter the characters shown in the image.
This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.