A short introduction to Multiparty Computation (MPC)

Multiparty Computation (MPC) is a technology that allows you to compute on encrypted values. This might sound impossible at first – but in fact, using the right kind of cryptography, it is indeed possible. Using MPC a number of servers can jointly compute any function without learning the inputs to the function. 

In this blog post, we give a brief introduction to MPC: how it works and what it is good for.

Jakob Illeborg Pagter
Use case: Document signing services

In early March, Penneo – the digital signature platform used by Scandinavian businesses – rolled out a new feature for selected customers. The new feature allows customers to protect access to their documents stored in the Penneo managed archive using encryption keys, not controlled by Penneo, effectively separating the lock from the key.

Penneo customers who take advantage of this service will have 100% control over who has access to their documents.

Jakob Illeborg Pagter
The “cloud encryption problem” in a nutshell

A recent survey of the nearly 300,000 professionals who are members of Linkedin’s Information Security Group showed that more than 90% of them have moderate or high levels of anxiety over the security of their data resident in public cloud services.

Ahmet Tuncay
Trust in Big Brother?

Everywhere I turn these days, I find plenty of bewildering bills and proposals related to privacy, security, and encryption from congressmen, senators, assemblymen and politicians of various colors who are in the business of introducing legislation in the U.S., EU, and other countries. 

Ahmet Tuncay
If I had a KMaaS in 2013

This is a story about how I came to wish for a pure-cloud Key Management System (KMS), delivered in the form of a SaaS offering, for the strong encryption of unstructured data. In other words, a true Key Management as a Service (KMaaS) that could be decoupled entirely from expensive conventional Hardware Security Module (HSM) appliances, deliver cryptographic security (rather than password or trust based), and yet, scale at cloud economics.

Ahmet Tuncay