Open main menu
Home
Random
Log in
Settings
About Quantum Protocol Zoo
Disclaimers
Quantum Protocol Zoo
Search
Editing
Aggregation of sensitive data
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==Introduction== When Diffie and Hellman introduced public-key cryptography in the mid-nineteen seventies, it was clear that beyond its mathematical interest, it would have a huge effect on real-world data processing. This intuition was largely proven to be true. As information flows in networks, the security of the data deeply affects the trust relationship between the communicating participants. For example, online payment would not exist if the buyer did not trust that its data are correctly secured. It is not exaggerating to state that cryptography is a key ingredient of the modern information society. These issues became more and more important since we have realized the value of data. Collecting data securely requires careful application of cryptographic techniques. But data owners also want to be able to capitalize on them, and computing over data while maintaining privacy requires techniques that are at the forefront of modern cryptographic research. Issues arise even from simple problems such as extracting statistics from distributed data. The data might be too valuable or regulated in a way that prevents sending them directly to a third party. Classical cryptography offers solutions to perform these operations. In particular, secure multiparty computing allows mistrustful parties to compute over their inputs while maintaining privacy. Some secure computing solutions also involve third parties but the theory ensures that they will not get any information during the process.
Summary:
Please note that all contributions to Quantum Protocol Zoo may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Quantum Protocol Zoo:Copyrights
for details).
Do not submit copyrighted work without permission!
To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:
Cancel
Editing help
(opens in new window)
Close
Loading editor…