From Keys to Databases-Real-World Applications of Secure Multi-Party Computation

被引:79
作者
Archer, David W. [1 ]
Bogdanov, Dan [2 ]
Lindell, Yehuda [3 ,4 ]
Kamm, Liina [2 ]
Nielsen, Kurt [5 ,6 ]
Pagter, Jakob Illeborg [5 ,6 ]
Smart, Nigel P. [4 ,7 ,8 ]
Wright, Rebecca N. [9 ]
机构
[1] Galois Inc, 421 SW 6th Ave 300, Portland, OR 97204 USA
[2] Cybernet AS, Maealuse 2-1, EE-12618 Tallinn, Estonia
[3] Bar Ilan Univ, Dept Comp Sci, IL-52900 Ramat Gan, Israel
[4] Unbound Tech, 25 Efal Beit Amot Platinum, IL-4951125 Petah Tiqwa, Israel
[5] Partisia ApS, Aabogade 15, DK-8200 Aarhus N, Denmark
[6] Sepior ApS, Inge Lehmanns Gade 10, DK-8000 Aarhus C, Denmark
[7] Katholieke Univ Leuven, Imec COSIC, Kasteelpark Arenberg 10,Bus 2452, B-3001 Leuven Heverlee, Belgium
[8] Univ Bristol, Dept Comp Sci, Woodland Rd, Bristol BS8 1UB, Avon, England
[9] Rutgers State Univ, DIMACS, CoRE Bldg,96 Frelinghuysen Rd, Piscataway, NJ 08854 USA
基金
欧盟地平线“2020”;
关键词
cryptography; protocols; security; PRIVACY; NOISE;
D O I
10.1093/comjnl/bxy090
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We discuss the widely increasing range of applications of a cryptographic technique called multi-party computation. For many decades, this was perceived to be of purely theoretical interest, but now it has started to find application in a number of use cases. We highlight in this paper a number of these, ranging from securing small high-value items such as cryptographic keys, through to securing an entire database.
引用
收藏
页码:1749 / 1771
页数:23
相关论文
共 43 条
[1]   MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity [J].
Albrecht, Martin ;
Grassi, Lorenzo ;
Rechberger, Christian ;
Roy, Arnab ;
Tiessen, Tyge .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 :191-219
[2]   Optimized Honest-Majority MPC for Malicious Adversaries - Breaking the 1 Billion-Gate Per Second Barrier [J].
Araki, Toshinori ;
Barak, Assi ;
Furukawa, Jun ;
Lichter, Tamar ;
Lindell, Yehuda ;
Nof, Ariel ;
Ohara, Kazuma ;
Watzman, Adi ;
Weinstein, Or .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :843-862
[3]  
Bogdanov, 2016, T424 CYB AS
[4]  
Bogdanov Dan, 2016, Proceedings on Privacy Enhancing Technologies, V2016, P117, DOI 10.1515/popets-2016-0019
[5]  
Bogdanov D., 2013, THESIS U TARTU TARTU
[6]  
Bogdanov D., 2012, P FINANCIAL CRYPTOGR, V7397, P57
[7]  
Bogdanov D, 2016, IEEE T DEPEND SECURE, P1
[8]  
Bogdanov D, 2007, THESIS
[9]   How the Estonian Tax and Customs Board Evaluated a Tax Fraud Detection System Based on Secure Multi-party Computation [J].
Bogdanov, Dan ;
Joemets, Marko ;
Siim, Sander ;
Vaht, Meril .
Financial Cryptography and Data Security (FC 2015), 2015, 8975 :227-234
[10]   From Input Private to Universally Composable Secure Multi-party Computation Primitives [J].
Bogdanov, Dan ;
Laud, Peeter ;
Laur, Sven ;
Pullonen, Pille .
2014 IEEE 27TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2014, :184-198