In this blog series, I will describe what secure multiparty computation is, what it can be used for, how it works (to some extent), and more. — In this blog series, I will describe what secure multiparty computation is, what it can be used for, how it works (to some extent), and more. My aim is for the majority of the content to be accessible to a general reader, with some of the material requiring some but…