From Keys To Databases-Real-World Applications Of Secure Multi-Party Computation

IACR Cryptology ePrint Archive(2018)

引用 175|浏览180
暂无评分
摘要
We discuss the widely increasing range of applications of a cryptographic technique called multi-party computation. For many decades, this was perceived to be of purely theoretical interest, but now it has started to find application in a number of use cases. We highlight in this paper a number of these, ranging from securing small high-value items such as cryptographic keys, through to securing an entire database.
更多
查看译文
关键词
cryptography,protocols,security
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要