From keys to databases-real-world applications of secure multi-party computation

David W. Archer, Dan Bogdanov, Yehuda Lindell, Liina Kamm, Kurt Nielsen, Jakob Illeborg Pagter, Nigel P. Smart, Rebecca N. Wright

Research output: Contribution to journalArticlepeer-review

84 Scopus citations

Abstract

We discuss the widely increasing range of applications of a cryptographic technique called multiparty computation. For many decades, this was perceived to be of purely theoretical interest, but now it has started to find application in a number of use cases. We highlight in this paper a number of these, ranging from securing small high-value items such as cryptographic keys, through to securing an entire database.

Original languageEnglish
Pages (from-to)1749-1771
Number of pages23
JournalComputer Journal
Volume61
Issue number12
DOIs
StatePublished - 1 Dec 2018

Bibliographical note

Publisher Copyright:
© The British Computer Society 2018.

Keywords

  • Cryptography
  • Protocols
  • Security

Fingerprint

Dive into the research topics of 'From keys to databases-real-world applications of secure multi-party computation'. Together they form a unique fingerprint.

Cite this