You are looking at a specific version 20181128:124403 of this paper.
See the latest version.
Paper 2018/450
From Keys to Databases -- Real-World Applications of Secure Multi-Party Computation
David W. Archer and Dan Bogdanov and Liina Kamm and Y. Lindell and Kurt Nielsen and Jakob Illeborg Pagter and Nigel P. Smart and Rebecca N. Wright
Abstract
We discuss the widely increasing range of applications of a cryptographic technique called Multi-Party Computation. For many decades this was perceived to be of purely theoretical interest, but now it has started to find application in a number of use cases. We highly in this paper a number of these, ranging from securing small high value items such as cryptographic keys, through to securing an entire database.
Note: Minor correction to affiliation
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Preprint. MINOR revision.
- Contact author(s)
- dwa @ galois com,dan bogdanov @ cyber ee,liina kamm @ cyber ee,jip @ partisia com,kn @ partisia com,nigel smart @ kuleuven be,Yehuda Lindell @ biu ac il,rebecca wright @ rutgers edu
- History
- 2018-11-28: last of 5 revisions
- 2018-05-21: received
- See all versions
- Short URL
- https://ia.cr/2018/450
- License
-
CC BY