From Keys to Databases: Real-World Applications of Secure Multi-Party Computation

Publikation: Working paperForskning

  • David W. Archer
  • Dan Bogdanov
  • Yehuda Lindell
  • Liina Kamm
  • Nielsen, Kurt
  • Jakob Illeborg Pagter
  • Nigel P. Smart
  • Rebecca N. Wright
We discuss the widely increasing range of applications of a cryptographic technique called Multi-Party Computation. For many decades this was perceived to be of purely theoretical interest, but now it has started to find application in a number of use cases. We highlight in this paper a number of these, ranging from securing small high value items such as cryptographic keys, through to securing an entire database.
UdgiverCryptology ePrint Archive
Antal sider32
StatusUdgivet - 2018
NavnCryptology ePrint Archive


ID: 199464561