From Keys to Databases—Real-World Applications of Secure Multi-Party Computation

David W. Archer, Dan Bogdanov, Yehuda Lindell, Liina Kamm, Kurt Nielsen, Jakob Illeborg Pagter, Nigel P. Smart*, Rebecca N. Wright

*Corresponding author for this work

Research output: Contribution to journalArticle (Academic Journal)peer-review

92 Citations (Scopus)

Abstract

We discuss the widely increasing range of applications of a cryptographic technique called multiparty computation. For many decades, this was perceived to be of purely theoretical interest, but now it has started to find application in a number of use cases. We highlight in this paper a number of these, ranging from securing small high-value items such as cryptographic keys, through to securing an entire database.

Original languageEnglish
Pages (from-to)1749-1771
Number of pages23
JournalComputer Journal
Volume61
Issue number12
Early online date12 Sept 2018
DOIs
Publication statusPublished - 1 Dec 2018

Keywords

  • Cryptography
  • Protocols
  • Security

Fingerprint

Dive into the research topics of 'From Keys to Databases—Real-World Applications of Secure Multi-Party Computation'. Together they form a unique fingerprint.

Cite this