From Keys to Databases: Real-World Applications of Secure Multi-Party Computation
Research output: Working paper
We discuss the widely increasing range of applications of a cryptographic technique called Multi-Party Computation. For many decades this was perceived to be of purely theoretical interest, but now it has started to find application in a number of use cases. We highlight in this paper a number of these, ranging from securing small high value items such as cryptographic keys, through to securing an entire database.
Original language | English |
---|---|
Publisher | Cryptology ePrint Archive |
Number of pages | 32 |
Publication status | Published - 2018 |
Series | Cryptology ePrint Archive |
---|---|
Number | 2018:450 |
Links
- https://eprint.iacr.org/2018/450
Final published version
ID: 199464561