We discuss the widely increasing range of applications of a cryptographic technique called multiparty computation. For many decades, this was perceived to be of purely theoretical interest, but now it has started to find application in a number of use cases. We highlight in this paper a number of these, ranging from securing small high-value items such as cryptographic keys, through to securing an entire database.
CITATION STYLE
Archer, D. W., Bogdanov, D., Lindell, Y., Kamm, L., Nielsen, K., Pagter, J. I., … Wright, R. N. (2018). From keys to databases-real-world applications of secure multi-party computation. Computer Journal, 61(12), 1749–1771. https://doi.org/10.1093/comjnl/bxy090
Mendeley helps you to discover research relevant for your work.