1. Secret Sharing
  2. Security Taxonomy and Active Security
  3. Secret Sharing Shamir Style
  4. Beaver’s Trick
  5. What is Oblivious Transfer, and why should you care?
  6. Secure two-party computation with Garbled Circuits
  7. Homomorphic Encryption
  8. Zero-Knowledge Proofs — What Are They and What Are They Good For?
  9. SPDZ
  10. MPC-as-a-Service — the Partisia Blockchain Infrastructure

--

--

--

The official account of the Partisia Blockchain Foundation. Bringing MPC and Blockchain together to enable the scale of all blockchain use cases.

Recommended from Medium

Is your school system data at risk? What you need to know about Cyber Security and Education

Mask Privacy Data Columns in MSSQL

Ten Years of Cloud Security

{UPDATE} Rugby World Championship Hack Free Resources Generator

How You Are Tracked Online

RedLine stealer

WhatsApp Text Status Makes a Return in ‘About’ With Android Beta

WhatsApp

Piger Fabrica Syndrome Hits Devices

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Partisia Blockchain Foundation

Partisia Blockchain Foundation

The official account of the Partisia Blockchain Foundation. Bringing MPC and Blockchain together to enable the scale of all blockchain use cases.

More from Medium

Here’s the Hidden Gem Token Boosting Asset Tokenization to the Next Level

Itheum Closes $1.5 Million Seed Round Funded by Morningstar Ventures

Value at Risk (VaR) of crypto portfolio

2021 Year In Review: Building The Foundations For Mainstream Adoption