Cryptology ePrint Archive: Report 2018/450

From Keys to Databases -- Real-World Applications of Secure Multi-Party Computation

David W. Archer and Dan Bogdanov and Liina Kamm and Y. Lindell and Kurt Nielsen and Jakob Illeborg Pagter and Nigel P. Smart and Rebecca N. Wright

Abstract: We discuss the widely increasing range of applications of a cryptographic technique called Multi-Party Computation. For many decades this was perceived to be of purely theoretical interest, but now it has started to find application in a number of use cases. We highly in this paper a number of these, ranging from securing small high value items such as cryptographic keys, through to securing an entire database.

Category / Keywords: cryptographic protocols /

Date: received 14 May 2018, last revised 28 Nov 2018

Contact author: dwa at galois com,dan bogdanov@cyber ee,liina kamm@cyber ee,jip@partisia com,kn@partisia com,nigel smart@kuleuven be,Yehuda Lindell@biu ac il,rebecca wright@rutgers edu

Available format(s): PDF | BibTeX Citation

Note: Minor correction to affiliation

Version: 20181128:124403 (All versions of this report)

Short URL: ia.cr/2018/450


[ Cryptology ePrint archive ]