Summary
Secure computation protocols allow mutually distrusting users to jointly compute on their private inputs, emulating the privacy and correctness guarantees of an incorruptible trusted third party. This includes privacy-preserving computation across sensitive data sets, as well...