2018
DOI: 10.1093/comjnl/bxy090
|View full text |Cite
|
Sign up to set email alerts
|

From Keys to Databases—Real-World Applications of Secure Multi-Party Computation

Abstract: We discuss the widely increasing range of applications of a cryptographic technique called Multi-Party Computation. For many decades this was perceived to be of purely theoretical interest, but now it has started to find application in a number of use cases. We highlight in this paper a number of these, ranging from securing small high value items such as cryptographic keys, through to securing an entire database.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
67
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 85 publications
(77 citation statements)
references
References 29 publications
0
67
0
Order By: Relevance
“…It is important to note that by using the outsourcing setting we achieve practical PPIL with security against malicious PPIL clients and malicious PPIL servers, whereas in the client/server setting even solutions with substantially weaker security against a semihonest client currently have impractical runtimes and communication. Furthermore, the outsourcing model with multiple STTPs is widely adopted not only in recent academic papers, e.g., for private machine learning [70,71], and genomic privacy [72,73,74,75,76,77], to name just a few, but also deployed in industrial products, see [78] for a few examples.…”
Section: A Outsourcing Schemementioning
confidence: 99%
“…It is important to note that by using the outsourcing setting we achieve practical PPIL with security against malicious PPIL clients and malicious PPIL servers, whereas in the client/server setting even solutions with substantially weaker security against a semihonest client currently have impractical runtimes and communication. Furthermore, the outsourcing model with multiple STTPs is widely adopted not only in recent academic papers, e.g., for private machine learning [70,71], and genomic privacy [72,73,74,75,76,77], to name just a few, but also deployed in industrial products, see [78] for a few examples.…”
Section: A Outsourcing Schemementioning
confidence: 99%
“…Archer et al [121] survey some of the more current uses of SMC in the real world, including the Private Data as a Service (PDaaS) system of Jana (https://galois.com/project/janaprivate-data-as-a-service/), ongoing commercial efforts by Partisia (https://partisia.com/mpc-goes-live/) (which powered the Danish sugar-beet auction mentioned before), and protection of corporate secrets by Unbound Tech (https://www.unboundtech.com/). SMC has also garnered the interest of legislative bodies.…”
Section: Real-world Deploymentmentioning
confidence: 99%
“…Companies including Ciphercloud [13], Navajo Systems [26], Skyhigh Networks [61], and Perspecsys [68] deploy proprietary PRE schemes to enable searching and sorting of ciphertexts stored within software-as-aservice (SaaS) systems. SAP's SEEED system [75], IQcrypt [47], Microsoft's Always Encrypted [58], and Galois's Jana [5] explicitly use privacy schema where some columns are strongly encrypted and other columns are DEor ORE-encrypted.…”
Section: Related Workmentioning
confidence: 99%