Abstract
We discuss the widely increasing range of applications of a cryptographic technique called multiparty computation. For many decades, this was perceived to be of purely theoretical interest, but now it has started to find application in a number of use cases. We highlight in this paper a number of these, ranging from securing small high-value items such as cryptographic keys, through to securing an entire database.
Original language | English |
---|---|
Pages (from-to) | 1749-1771 |
Number of pages | 23 |
Journal | Computer Journal |
Volume | 61 |
Issue number | 12 |
Early online date | 12 Sept 2018 |
DOIs | |
Publication status | Published - 1 Dec 2018 |
Keywords
- Cryptography
- Protocols
- Security