From Keys to Databases: Real-World Applications of Secure Multi-Party Computation

Publikation: Working paperForskning

Standard

From Keys to Databases : Real-World Applications of Secure Multi-Party Computation. / Archer, David W.; Bogdanov, Dan; Lindell, Yehuda; Kamm, Liina; Nielsen, Kurt; Pagter, Jakob Illeborg; Smart, Nigel P.; Wright, Rebecca N.

Cryptology ePrint Archive, 2018.

Publikation: Working paperForskning

Harvard

Archer, DW, Bogdanov, D, Lindell, Y, Kamm, L, Nielsen, K, Pagter, JI, Smart, NP & Wright, RN 2018 'From Keys to Databases: Real-World Applications of Secure Multi-Party Computation' Cryptology ePrint Archive. <https://eprint.iacr.org/2018/450>

APA

Archer, D. W., Bogdanov, D., Lindell, Y., Kamm, L., Nielsen, K., Pagter, J. I., Smart, N. P., & Wright, R. N. (2018). From Keys to Databases: Real-World Applications of Secure Multi-Party Computation. Cryptology ePrint Archive. Cryptology ePrint Archive Nr. 2018:450 https://eprint.iacr.org/2018/450

Vancouver

Archer DW, Bogdanov D, Lindell Y, Kamm L, Nielsen K, Pagter JI o.a. From Keys to Databases: Real-World Applications of Secure Multi-Party Computation. Cryptology ePrint Archive. 2018.

Author

Archer, David W. ; Bogdanov, Dan ; Lindell, Yehuda ; Kamm, Liina ; Nielsen, Kurt ; Pagter, Jakob Illeborg ; Smart, Nigel P. ; Wright, Rebecca N. / From Keys to Databases : Real-World Applications of Secure Multi-Party Computation. Cryptology ePrint Archive, 2018. (Cryptology ePrint Archive; Nr. 2018:450).

Bibtex

@techreport{cefec250bdea4c538de91d87edddf565,
title = "From Keys to Databases: Real-World Applications of Secure Multi-Party Computation",
abstract = "We discuss the widely increasing range of applications of a cryptographic technique called Multi-Party Computation. For many decades this was perceived to be of purely theoretical interest, but now it has started to find application in a number of use cases. We highlight in this paper a number of these, ranging from securing small high value items such as cryptographic keys, through to securing an entire database.",
author = "Archer, {David W.} and Dan Bogdanov and Yehuda Lindell and Liina Kamm and Kurt Nielsen and Pagter, {Jakob Illeborg} and Smart, {Nigel P.} and Wright, {Rebecca N.}",
year = "2018",
language = "English",
series = "Cryptology ePrint Archive",
number = "2018:450",
publisher = "Cryptology ePrint Archive",
type = "WorkingPaper",
institution = "Cryptology ePrint Archive",

}

RIS

TY - UNPB

T1 - From Keys to Databases

T2 - Real-World Applications of Secure Multi-Party Computation

AU - Archer, David W.

AU - Bogdanov, Dan

AU - Lindell, Yehuda

AU - Kamm, Liina

AU - Nielsen, Kurt

AU - Pagter, Jakob Illeborg

AU - Smart, Nigel P.

AU - Wright, Rebecca N.

PY - 2018

Y1 - 2018

N2 - We discuss the widely increasing range of applications of a cryptographic technique called Multi-Party Computation. For many decades this was perceived to be of purely theoretical interest, but now it has started to find application in a number of use cases. We highlight in this paper a number of these, ranging from securing small high value items such as cryptographic keys, through to securing an entire database.

AB - We discuss the widely increasing range of applications of a cryptographic technique called Multi-Party Computation. For many decades this was perceived to be of purely theoretical interest, but now it has started to find application in a number of use cases. We highlight in this paper a number of these, ranging from securing small high value items such as cryptographic keys, through to securing an entire database.

M3 - Working paper

T3 - Cryptology ePrint Archive

BT - From Keys to Databases

PB - Cryptology ePrint Archive

ER -

ID: 199464561