학술논문

From Keys to Databases—Real-World Applications of Secure Multi-Party Computation.
Document Type
Article
Source
Computer Journal. Dec2018, Vol. 61 Issue 12, p1749-1771. 23p.
Subject
*ARTIFICIAL intelligence
*COMPUTER software
*BIONICS
*ELECTRONIC data processing
*COMPUTER security
*ACCESS control
Language
ISSN
0010-4620
Abstract
We discuss the widely increasing range of applications of a cryptographic technique called multi-party computation. For many decades, this was perceived to be of purely theoretical interest, but now it has started to find application in a number of use cases. We highlight in this paper a number of these, ranging from securing small high-value items such as cryptographic keys, through to securing an entire database. [ABSTRACT FROM AUTHOR]