Partially Redacted: Data, AI, Security, and Privacy

Secure Multi-Party Computation Explained with Skyflow’s Liz Acosta


Listen Later

In this episode, we discuss the topic of secure multi-party computation. Since its introduction in the eighties, secure multi-party computation – also known as SMPC – has evolved into a subfield of cryptography for which a variety of protocols have been developed. SMPC is a technique used to allow multiple parties to jointly compute a function on their private inputs without revealing any information about those inputs to the other parties.

Liz Acosta, Developer Advocate at Skyflow, joins the show to explain SMPC and share her recent research into the subject. We begin by explaining the basic concept of SMPC and how it differs from traditional methods of computation.

We also discuss the practical applications of SMPC, such as in the financial industry for secure trading and in the healthcare industry for secure sharing of patient data. We also highlight the challenges that still need to be addressed in the field, such as scalability and ensuring the security of the computation.

Topics:

  • What is Yao’s millionaire problem and how does it relate to secure multi-party computation?
  • Can you explain what secure multi-party computation is and how it works?
  • Where did this concept come from? What’s the history?
  • Can you walk me through an example of using SMPC to solve a problem?
  • In what types of scenarios is secure multi-party computation particularly useful?
  • How is secure multi-party computation being used in the real world today?
  • How does secure multi-party computation enable collaboration while still preserving the privacy of individual parties?
  • What are the challenges and opportunities for the wider adoption of secure multi-party computation in the future?
  • How far away do you think we are from secure multi-party computation being more widely adopted?
  • Beyond SMPC, are there technologies in this space that you are particularly excited about?
  • Where should someone look to learn more about secure multi-party computation or other privacy-enhancing technologies
  • Resources:

    • What is Secure Multi-Party Computation?
    ...more
    View all episodesView all episodes
    Download on the App Store

    Partially Redacted: Data, AI, Security, and PrivacyBy Skyflow

    • 4.8
    • 4.8
    • 4.8
    • 4.8
    • 4.8

    4.8

    19 ratings


    More shows like Partially Redacted: Data, AI, Security, and Privacy

    View all
    Security Now (Audio) by TWiT

    Security Now (Audio)

    1,952 Listeners

    This American Life by This American Life

    This American Life

    90,431 Listeners

    Uncanny Valley | WIRED by WIRED

    Uncanny Valley | WIRED

    367 Listeners

    Freakonomics Radio by Freakonomics Radio + Stitcher

    Freakonomics Radio

    32,134 Listeners

    a16z Podcast by Andreessen Horowitz

    a16z Podcast

    1,009 Listeners

    Software Engineering Daily by Software Engineering Daily

    Software Engineering Daily

    624 Listeners

    Hidden Brain by Hidden Brain, Shankar Vedantam

    Hidden Brain

    43,406 Listeners

    Acquired by Ben Gilbert and David Rosenthal

    Acquired

    3,675 Listeners

    The Daily by The New York Times

    The Daily

    112,857 Listeners

    Up First from NPR by NPR

    Up First from NPR

    56,209 Listeners

    Hacking Humans by N2K Networks

    Hacking Humans

    304 Listeners

    Lex Fridman Podcast by Lex Fridman

    Lex Fridman Podcast

    12,708 Listeners

    All-In with Chamath, Jason, Sacks & Friedberg by All-In Podcast, LLC

    All-In with Chamath, Jason, Sacks & Friedberg

    8,385 Listeners

    Hard Fork by The New York Times

    Hard Fork

    5,393 Listeners