Cryptology ePrint Archive: Report 2018/450

From Keys to Databases -- Real-World Applications of Secure Multi-Party Computation

David W. Archer and Dan Bogdanov and Liina Kamm and Y. Lindell and Kurt Nielsen and Jakob Illeborg Pagter and Nigel P. Smart and Rebecca N. Wright

Abstract: We discuss the widely increasing range of applications of a cryptographic technique called Multi-Party Computation. For many decades this was perceived to be of purely theoretical interest, but now it has started to find application in a number of use cases. We highly in this paper a number of these, ranging from securing small high value items such as cryptographic keys, through to securing an entire database.

Category / Keywords: cryptographic protocols /

Date: received 14 May 2018, last revised 28 Nov 2018

Contact author: dwa at galois com, dan bogdanov at cyber ee, liina kamm at cyber ee, jip at partisia com, kn at partisia com, nigel smart at kuleuven be, Yehuda Lindell at biu ac il, rebecca wright at rutgers edu

Available format(s): PDF | BibTeX Citation

Note: Minor correction to affiliation

Version: 20181128:124403 (All versions of this report)

Short URL: ia.cr/2018/450


[ Cryptology ePrint archive ]