From keys to databases-real-world applications of secure multi-party computation

97Citations
Citations of this article
113Readers
Mendeley users who have this article in their library.

Abstract

We discuss the widely increasing range of applications of a cryptographic technique called multiparty computation. For many decades, this was perceived to be of purely theoretical interest, but now it has started to find application in a number of use cases. We highlight in this paper a number of these, ranging from securing small high-value items such as cryptographic keys, through to securing an entire database.

Author supplied keywords

Cite

CITATION STYLE

APA

Archer, D. W., Bogdanov, D., Lindell, Y., Kamm, L., Nielsen, K., Pagter, J. I., … Wright, R. N. (2018). From keys to databases-real-world applications of secure multi-party computation. Computer Journal, 61(12), 1749–1771. https://doi.org/10.1093/comjnl/bxy090

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free