Multi party computation

in hive-150122 •  7 months ago 

Assalamualaikum steemians


How are you? Hope so everyone would be safe and sound just like me as I am also safe Alhamdulillah....


Multi party competition is my today topic I have choosed for discussion.

When I talk about multi party competition then it is one of the most interesting concept which permits different parties to compute result without disclosing personal data or input of an individual and it is done not individual form but it is done in group form so multiple parties are involved in it so we can say that it is just similar to secret collaboration in which everyone is free to contribute and show his data without showing and disclosing it actually to everyone.

When I talk about traditional competition then at that time and in this case multiple parties decide to compute any one result in group form or together and for this purpose they also share their inputs with each other so if there is any sensitive data and Private data in that information then it becomes problematic in future. When I talk about multi party competition then it is much secure because it provides solution of this problem of not disclosing sensitive data and information by permitting parties to compute result but don't allowed to reveal and interact with each other in our sense of sharing sensitive and private inputs.

When I talk about working of multi party competition then its operation is very simple because in my previous posts I have also talk about cryptography techniques so in the same way by following cryptographic techniques multi party computation works. Multi parties that are involved in computation process hold their private inputs and computer result without any leak out of data. For achieving this there is a protocol used by these parties which permit them to interact and perform computations without revealing any sensitive data.

When I talk about one of the most common technique that is used in multi party computation is secure function evaluation in which parties are free to evaluate a function on their inputs while maintaining a security in it by keeping it secret and this is done through our series of or you can say another words a chain of cryptographic protocols which gives shoulder of the input privacy and correctness handling of the computation also.


When I talk about multi party computation then there are different approaches used by it and these are yao's garbled circuit,secret sharing and homomorphic encryption also and we cannot say that there is any approach which is not have strength because there are different properties each approach have and that's why there are on strength and trade offs each and every approach have.

When I talk about yao's garbled circuit then inputs are secured and their represented as encrypt values and their are part is which are helpful in the evaluation of circuit gate by gate and in this way only important information reveals which is not private for computing next date while sensitive information remains secure so one party cannot learn and interact with the sensitive information or input of other party m


In multi party computation secret sharing is another approach that could be used at wider scale and here inputs are divided into different shares and their already distributed among the parties and by the combination of these shares then parties are allowed to reconstruct the result of competition but again it also don't reveal sensitive information to the individual inputs so biasness can't occurs in this case also.


When I talk about homomorphic encryption then it is also one of the most suitable technique in which computations are performed on an encrypted data and parties in this way encrypt their input and also obtain encrypted results and by the use of decryption key they can also decrypt the result without revealing inputs.

When I talk about you send implementation of multi party computation then it is mostly used in those areas and indoor things where privacy is needed like secure voting system, private analysis of data and collaborative learning of machine so in this way it is a source of enabling parties to collaborate on computations while preventing the sensitive inputs.

That was all about multi party computation that what is this basically along with little description as well as I have also compared it with the traditional computation and then you can easily conclude now that multi party computation is more secure and at last I have also explain that what are the practical implementation in the practical life in which it can be implemented so now topic hopefully is very clear to all of you...


Thanks


Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
Sort Order:  
CategoryInput
X - Promotion
Plagiarism Free
Image
AI Free

Note:-


Regards,
@theentertainer


Steem Alliance_20231210_113759_0000.jpg