Skip to content

From Keys to Databases—Real-World Applications of Secure Multi-Party Computation

Research output: Contribution to journalArticle

  • David W. Archer
  • Dan Bogdanov
  • Yehuda Lindell
  • Liina Kamm
  • Kurt Nielsen
  • Jakob Illeborg Pagter
  • Nigel P. Smart
  • Rebecca N. Wright
Original languageEnglish
Pages (from-to)1749-1771
Number of pages23
JournalComputer Journal
Volume61
Issue number12
Early online date12 Sep 2018
DOIs
DateAccepted/In press - 2 Aug 2018
DateE-pub ahead of print - 12 Sep 2018
DatePublished (current) - 1 Dec 2018

Abstract

We discuss the widely increasing range of applications of a cryptographic technique called multiparty computation. For many decades, this was perceived to be of purely theoretical interest, but now it has started to find application in a number of use cases. We highlight in this paper a number of these, ranging from securing small high-value items such as cryptographic keys, through to securing an entire database.

    Research areas

  • Cryptography, Protocols, Security

Documents

Links

DOI

View research connections

Related faculties, schools or groups