data61 / MP-SPDZ

Versatile framework for multi-party computation
Other
906 stars 279 forks source link

What algorithms or protocols are used in the process of privacy computing tasks to achieve data security and privacy protection #1463

Closed f-hy closed 2 months ago

f-hy commented 2 months ago

Please forgive me for asking you another question that you may find very simple (but it is very difficult for me to need your help). In specific privacy computing tasks, such as 3-party collaborative computing tasks, what algorithms/protocols are used in the execution of tasks, and how are they used? Take the replicated-ring-party.x execution process as an example, what algorithm/protocol is invoked in what file to accomplish what at each stage

mkskeller commented 2 months ago

I'm not sure I can give an extensive answer to such an open-ended question. The most relevant pointers are here: