| Technical guidelines for secure multi-party computation |
 |
Recommendation ITU-T X.1770 establishes technical guidelines for multi-party computation (MPC) and provides a technical standard basis for information and communication technology (ICT) stakeholders to use MPC to protect data in data collaboration and big data analysis scenarios. It also describes applications for which MPC can be used and how it can serve as a reference for ICT stakeholders to develop MPC applications.
Data has become one of the most important assets in ICT. Secure MPC can build trust and security in data collaboration and big data analysis-related areas by balancing usage and protection of data.
Recommendation ITU-T X.1770 includes:
– a technical framework for MPC, in which its elements and the workflow between them is determined;
– security levels of MPC protocols, used in the analysis and determination of the security model and threshold;
– applications of MPC, illustrated by use cases, including an application scenario description and processes, with appropriate security requirement recommendations.
Based on the framework and security levels established in Recommendation ITU-T X.1770, standards for MPC applications in different fields can be determined.
|
|
| Citation: |
https://handle.itu.int/11.1002/1000/14807 |
| Series title: |
X series: Data networks, open system communications and security X.1750-X.1799: Data security X.1770-X.1799: Data protection (II) |
| Approval date: |
2021-10-29 |
| Provisional name: | X.tf-mpc |
| Approval process: | AAP |
|
Status: |
In force |
|
Maintenance responsibility: |
ITU-T Study Group 17 |
|
Further details: |
Patent statement(s)
Development history
|
|
|
| Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
|
1
|
X.1770 (10/2021)
|
In force
|
here
|
here
|
here
|
| Title |
Approved on |
Download |
|
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|
Security considerations for quantum key distribution networks
|
2020
|
here
|
|