Secure multiparty computation goes live

339Citations
Citations of this article
189Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this note, we report on the first large-scale and practical application of secure multiparty computation, which took place in January 2008. We also report on the novel cryptographic protocols that were used. © 2009 Springer Berlin Heidelberg.

Cite

CITATION STYLE

APA

Bogetoft, P., Christensen, D. L., Damgård, I., Geisler, M., Jakobsen, T., Krøigaard, M., … Toft, T. (2009). Secure multiparty computation goes live. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5628 LNCS, pp. 325–343). https://doi.org/10.1007/978-3-642-03549-4_20

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free