Back to Search Start Over

From Keys to Databases:Real-World Applications of Secure Multi-Party Computation

Authors :
Archer, David W.
Bogdanov, Dan
Lindell, Yehuda
Kamm, Liina
Nielsen, Kurt
Pagter, Jakob Illeborg
Smart, Nigel P.
Wright, Rebecca N.
Archer, David W.
Bogdanov, Dan
Lindell, Yehuda
Kamm, Liina
Nielsen, Kurt
Pagter, Jakob Illeborg
Smart, Nigel P.
Wright, Rebecca N.
Source :
Archer , D W , Bogdanov , D , Lindell , Y , Kamm , L , Nielsen , K , Pagter , J I , Smart , N P & Wright , R N 2018 ' From Keys to Databases : Real-World Applications of Secure Multi-Party Computation ' Cryptology ePrint Archive . <
Publication Year :
2018

Abstract

We discuss the widely increasing range of applications of a cryptographic technique called Multi-Party Computation. For many decades this was perceived to be of purely theoretical interest, but now it has started to find application in a number of use cases. We highlight in this paper a number of these, ranging from securing small high value items such as cryptographic keys, through to securing an entire database.

Details

Database :
OAIster
Journal :
Archer , D W , Bogdanov , D , Lindell , Y , Kamm , L , Nielsen , K , Pagter , J I , Smart , N P &amp; Wright , R N 2018 &#39; From Keys to Databases : Real-World Applications of Secure Multi-Party Computation &#39; Cryptology ePrint Archive . <
Notes :
English
Publication Type :
Electronic Resource
Accession number :
edsoai.on1322713704
Document Type :
Electronic Resource