@techreport{cefec250bdea4c538de91d87edddf565,
title = "From Keys to Databases: Real-World Applications of Secure Multi-Party Computation",
abstract = "We discuss the widely increasing range of applications of a cryptographic technique called Multi-Party Computation. For many decades this was perceived to be of purely theoretical interest, but now it has started to find application in a number of use cases. We highlight in this paper a number of these, ranging from securing small high value items such as cryptographic keys, through to securing an entire database.",
author = "Archer, {David W.} and Dan Bogdanov and Yehuda Lindell and Liina Kamm and Kurt Nielsen and Pagter, {Jakob Illeborg} and Smart, {Nigel P.} and Wright, {Rebecca N.}",
year = "2018",
month = dec,
day = "1",
language = "English",
series = "Cryptology ePrint Archive",
number = "2018:450",
publisher = "Cryptology ePrint Archive",
type = "WorkingPaper",
institution = "Cryptology ePrint Archive",
}