- Two important requirements on any secure computation protocol are privacy and correctness.
- Threshold Cryptography deals with digital signatures and decryption techniques.
- MPC protocols for an honest majority typically utilise secret sharing as a basic tool.