From Keys to Databases: Real-World Applications of Secure Multi-Party Computation

David W. Archer, Dan Bogdanov, Yehuda Lindell, Liina Kamm, Kurt Nielsen, Jakob Illeborg Pagter, Nigel P. Smart, Rebecca N. Wright

31 Citationer (Scopus)

Abstract

We discuss the widely increasing range of applications of a cryptographic technique called Multi-Party Computation. For many decades this was perceived to be of purely theoretical interest, but now it has started to find application in a number of use cases. We highlight in this paper a number of these, ranging from securing small high value items such as cryptographic keys, through to securing an entire database.
OriginalsprogEngelsk
UdgiverCryptology ePrint Archive
Antal sider32
StatusUdgivet - 1 dec. 2018
NavnCryptology ePrint Archive
Nummer2018:450

Fingeraftryk

Dyk ned i forskningsemnerne om 'From Keys to Databases: Real-World Applications of Secure Multi-Party Computation'. Sammen danner de et unikt fingeraftryk.

Citationsformater