Back to Search
Start Over
From Keys to Databases:Real-World Applications of Secure Multi-Party Computation
- Source :
- Archer , D W , Bogdanov , D , Lindell , Y , Kamm , L , Nielsen , K , Pagter , J I , Smart , N P & Wright , R N 2018 ' From Keys to Databases : Real-World Applications of Secure Multi-Party Computation ' Cryptology ePrint Archive . <
- Publication Year :
- 2018
-
Abstract
- We discuss the widely increasing range of applications of a cryptographic technique called Multi-Party Computation. For many decades this was perceived to be of purely theoretical interest, but now it has started to find application in a number of use cases. We highlight in this paper a number of these, ranging from securing small high value items such as cryptographic keys, through to securing an entire database.
Details
- Database :
- OAIster
- Journal :
- Archer , D W , Bogdanov , D , Lindell , Y , Kamm , L , Nielsen , K , Pagter , J I , Smart , N P & Wright , R N 2018 ' From Keys to Databases : Real-World Applications of Secure Multi-Party Computation ' Cryptology ePrint Archive . <
- Notes :
- English
- Publication Type :
- Electronic Resource
- Accession number :
- edsoai.on1322713704
- Document Type :
- Electronic Resource