Słownik AI
Kompletny słownik sztucznej inteligencji
Secure Multi-Party Computation (SMPC)
Cryptographic protocol allowing multiple participants to jointly compute a function on their private inputs without revealing these inputs to other participants.
Secret Sharing
Cryptographic method dividing a secret into multiple shares distributed to different participants, where the secret can only be reconstructed when a sufficient number of shares are combined.
Oblivious Transfer
Cryptographic protocol where a sender transfers one of several messages to a receiver, but remains ignorant of which message was transferred.
Garbled Circuits
Secure multi-party computation protocol using encrypted boolean circuits allowing two parties to evaluate a function on their private inputs without revealing them.
Zero-Knowledge Proofs
Cryptographic method allowing one party to prove to another that an assertion is true without revealing any information beyond the validity of the assertion itself.
Trusted Execution Environment (TEE)
Secure isolated area within the processor guaranteeing the confidentiality and integrity of the code and data loaded inside, protected against unauthorized access.
Private Set Intersection (PSI)
Cryptographic protocol allowing two or more parties to compute the intersection of their private sets without revealing other information about their respective sets.
Yao's Protocol
Foundational protocol of two-party secure multi-party computation using garbled circuits to evaluate boolean functions on private inputs.
GMW Protocol
Secure multiparty computation protocol for an arbitrary number of parties based on secret sharing and circuit evaluation using XOR and AND gates.
BGW Protocol
Secure multiparty computation protocol with active fault tolerance, using Shamir's secret sharing and polynomial evaluation for secure computations.
SPDZ Protocol
Advanced secure multiparty computation protocol offering security against malicious adversaries in the adaptive corruption model with efficient precomputation.
Oblivious RAM
Privacy protection mechanism that hides memory access patterns by making read/write operation sequences independent of the actual data accessed.
Function Secret Sharing
Variant of secret sharing where the function itself is shared among parties rather than the input data, allowing for efficient distributed evaluation.
Verifiable Computation
Protocol that allows a resource-constrained client to delegate computations to a server while being able to efficiently verify the correctness of returned results.