Standard
From Keys to Databases : Real-World Applications of Secure Multi-Party Computation. / Archer, David W.; Bogdanov, Dan; Lindell, Yehuda; Kamm, Liina; Nielsen, Kurt; Pagter, Jakob Illeborg; Smart, Nigel P.; Wright, Rebecca N.
Cryptology ePrint Archive, 2018.
Research output: Working paper › Research
Harvard
Archer, DW, Bogdanov, D, Lindell, Y, Kamm, L
, Nielsen, K, Pagter, JI, Smart, NP & Wright, RN 2018 '
From Keys to Databases: Real-World Applications of Secure Multi-Party Computation' Cryptology ePrint Archive. <
https://eprint.iacr.org/2018/450>
APA
Archer, D. W., Bogdanov, D., Lindell, Y., Kamm, L.
, Nielsen, K., Pagter, J. I., Smart, N. P., & Wright, R. N. (2018).
From Keys to Databases: Real-World Applications of Secure Multi-Party Computation. Cryptology ePrint Archive. Cryptology ePrint Archive No. 2018:450
https://eprint.iacr.org/2018/450
Vancouver
Archer DW, Bogdanov D, Lindell Y, Kamm L, Nielsen K, Pagter JI et al. From Keys to Databases: Real-World Applications of Secure Multi-Party Computation. Cryptology ePrint Archive. 2018.
Author
Archer, David W. ; Bogdanov, Dan ; Lindell, Yehuda ; Kamm, Liina ; Nielsen, Kurt ; Pagter, Jakob Illeborg ; Smart, Nigel P. ; Wright, Rebecca N. / From Keys to Databases : Real-World Applications of Secure Multi-Party Computation. Cryptology ePrint Archive, 2018. (Cryptology ePrint Archive; No. 2018:450).
Bibtex
@techreport{cefec250bdea4c538de91d87edddf565,
title = "From Keys to Databases: Real-World Applications of Secure Multi-Party Computation",
abstract = "We discuss the widely increasing range of applications of a cryptographic technique called Multi-Party Computation. For many decades this was perceived to be of purely theoretical interest, but now it has started to find application in a number of use cases. We highlight in this paper a number of these, ranging from securing small high value items such as cryptographic keys, through to securing an entire database.",
author = "Archer, {David W.} and Dan Bogdanov and Yehuda Lindell and Liina Kamm and Kurt Nielsen and Pagter, {Jakob Illeborg} and Smart, {Nigel P.} and Wright, {Rebecca N.}",
year = "2018",
language = "English",
series = "Cryptology ePrint Archive",
number = "2018:450",
publisher = "Cryptology ePrint Archive",
type = "WorkingPaper",
institution = "Cryptology ePrint Archive",
}
RIS
TY - UNPB
T1 - From Keys to Databases
T2 - Real-World Applications of Secure Multi-Party Computation
AU - Archer, David W.
AU - Bogdanov, Dan
AU - Lindell, Yehuda
AU - Kamm, Liina
AU - Nielsen, Kurt
AU - Pagter, Jakob Illeborg
AU - Smart, Nigel P.
AU - Wright, Rebecca N.
PY - 2018
Y1 - 2018
N2 - We discuss the widely increasing range of applications of a cryptographic technique called Multi-Party Computation. For many decades this was perceived to be of purely theoretical interest, but now it has started to find application in a number of use cases. We highlight in this paper a number of these, ranging from securing small high value items such as cryptographic keys, through to securing an entire database.
AB - We discuss the widely increasing range of applications of a cryptographic technique called Multi-Party Computation. For many decades this was perceived to be of purely theoretical interest, but now it has started to find application in a number of use cases. We highlight in this paper a number of these, ranging from securing small high value items such as cryptographic keys, through to securing an entire database.
M3 - Working paper
T3 - Cryptology ePrint Archive
BT - From Keys to Databases
PB - Cryptology ePrint Archive
ER -