This article shows how you can compute a function across multiple parties that do not trust each other without forcing them ...