Paper 2018/450

From Keys to Databases -- Real-World Applications of Secure Multi-Party Computation

David W. Archer, Dan Bogdanov, Liina Kamm, Y. Lindell, Kurt Nielsen, Jakob Illeborg Pagter, Nigel P. Smart, and Rebecca N. Wright

Abstract

We discuss the widely increasing range of applications of a cryptographic technique called Multi-Party Computation. For many decades this was perceived to be of purely theoretical interest, but now it has started to find application in a number of use cases. We highly in this paper a number of these, ranging from securing small high value items such as cryptographic keys, through to securing an entire database.

Note: Minor correction to affiliation

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint. MINOR revision.
Contact author(s)
dwa @ galois com
dan bogdanov @ cyber ee
liina kamm @ cyber ee
jip @ partisia com
kn @ partisia com
nigel smart @ kuleuven be
Yehuda Lindell @ biu ac il
rebecca wright @ rutgers edu
History
2018-11-28: last of 5 revisions
2018-05-21: received
See all versions
Short URL
https://ia.cr/2018/450
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2018/450,
      author = {David W.  Archer and Dan Bogdanov and Liina Kamm and Y.  Lindell and Kurt Nielsen and Jakob Illeborg Pagter and Nigel P.  Smart and Rebecca N.  Wright},
      title = {From Keys to Databases --  Real-World Applications of Secure Multi-Party Computation},
      howpublished = {Cryptology ePrint Archive, Paper 2018/450},
      year = {2018},
      note = {\url{https://eprint.iacr.org/2018/450}},
      url = {https://eprint.iacr.org/2018/450}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.