![A Secure Multi-Party Computation Protocol Suite Inspired by Shamir's Secret Sharing Scheme | Semantic Scholar A Secure Multi-Party Computation Protocol Suite Inspired by Shamir's Secret Sharing Scheme | Semantic Scholar](https://d3i71xaburhd42.cloudfront.net/4e56865903ede1686d2be6fb2ea3cbd071e99390/26-Figure2.4-1.png)
A Secure Multi-Party Computation Protocol Suite Inspired by Shamir's Secret Sharing Scheme | Semantic Scholar
![Privacy-preserving record linkage in large databases using secure multiparty computation | BMC Medical Genomics | Full Text Privacy-preserving record linkage in large databases using secure multiparty computation | BMC Medical Genomics | Full Text](https://media.springernature.com/lw685/springer-static/image/art%3A10.1186%2Fs12920-018-0400-8/MediaObjects/12920_2018_400_Fig1_HTML.png)
Privacy-preserving record linkage in large databases using secure multiparty computation | BMC Medical Genomics | Full Text
![Enhancing FinTech Security with Secure Multi-Party Computation Technology : NEC Technical Journal | NEC Enhancing FinTech Security with Secure Multi-Party Computation Technology : NEC Technical Journal | NEC](https://www.nec.com/en/global/techrep/journal/g16/n02/images/160211_03.png)
Enhancing FinTech Security with Secure Multi-Party Computation Technology : NEC Technical Journal | NEC
![Symmetry | Free Full-Text | Assessment of Two Privacy Preserving Authentication Methods Using Secure Multiparty Computation Based on Secret Sharing Symmetry | Free Full-Text | Assessment of Two Privacy Preserving Authentication Methods Using Secure Multiparty Computation Based on Secret Sharing](https://www.mdpi.com/symmetry/symmetry-13-00894/article_deploy/html/images/symmetry-13-00894-g001.png)
Symmetry | Free Full-Text | Assessment of Two Privacy Preserving Authentication Methods Using Secure Multiparty Computation Based on Secret Sharing
![Network | Free Full-Text | Delegated Proof of Secret Sharing: A Privacy-Preserving Consensus Protocol Based on Secure Multiparty Computation for IoT Environment Network | Free Full-Text | Delegated Proof of Secret Sharing: A Privacy-Preserving Consensus Protocol Based on Secure Multiparty Computation for IoT Environment](https://www.mdpi.com/network/network-02-00005/article_deploy/html/images/network-02-00005-g001.png)
Network | Free Full-Text | Delegated Proof of Secret Sharing: A Privacy-Preserving Consensus Protocol Based on Secure Multiparty Computation for IoT Environment
![Applied Sciences | Free Full-Text | Generation and Distribution of Quantum Oblivious Keys for Secure Multiparty Computation Applied Sciences | Free Full-Text | Generation and Distribution of Quantum Oblivious Keys for Secure Multiparty Computation](https://www.mdpi.com/applsci/applsci-10-04080/article_deploy/html/images/applsci-10-04080-g001.png)