From Keys to Databases: Real-World Applications of Secure Multi-Party Computation

David W. Archer, Dan Bogdanov, Yehuda Lindell, Liina Kamm, Kurt Nielsen, Jakob Illeborg Pagter, Nigel P. Smart, Rebecca N. Wright

31 Citations (Scopus)

Abstract

We discuss the widely increasing range of applications of a cryptographic technique called Multi-Party Computation. For many decades this was perceived to be of purely theoretical interest, but now it has started to find application in a number of use cases. We highlight in this paper a number of these, ranging from securing small high value items such as cryptographic keys, through to securing an entire database.
Original languageEnglish
PublisherCryptology ePrint Archive
Number of pages32
Publication statusPublished - 1 Dec 2018
SeriesCryptology ePrint Archive
Number2018:450

Fingerprint

Dive into the research topics of 'From Keys to Databases: Real-World Applications of Secure Multi-Party Computation'. Together they form a unique fingerprint.

Cite this