找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Compilation for Secure Multi-party Computation; Niklas Büscher,Stefan Katzenbeisser Book 2017 The Author(s) 2017 Compiler construction.Sec

[复制链接]
查看: 53256|回复: 42
发表于 2025-3-21 16:58:01 | 显示全部楼层 |阅读模式
书目名称Compilation for Secure Multi-party Computation
编辑Niklas Büscher,Stefan Katzenbeisser
视频video
丛书名称SpringerBriefs in Computer Science
图书封面Titlebook: Compilation for Secure Multi-party Computation;  Niklas Büscher,Stefan Katzenbeisser Book 2017 The Author(s) 2017 Compiler construction.Sec
描述.This book presents a holistic view on compiler assisted practical secure multi-party computation (MPC) over Boolean circuits. It discusses that two or more parties jointly evaluate a function over their inputs in such a way that each party keeps its input unknown to the other parties in MPC. MPC provides a generic way to construct Privacy-Enhancing Technologies, which protect sensitive data during processing steps in untrusted environments. A major obstacle in the past was to generate MPC applications by hand. Recently, special compilers have been developed to build all kinds of applications...This book also explains in detail how efficient MPC applications can be created automatically from ANSI-C, thus, bridging the areas of cryptography, compilation and hardware synthesis. It  also gives an insight into the requirements for creating efficient applications for MPC and is hence of interest to not only researchers in the area of MPC but also developers realizing practical applications with MPC. For a better understanding of the complete compile chain from ANSI-C to circuits, which is the ‘machine code’ of MPC, the authors first give the necessary background information on MPC proto
出版日期Book 2017
关键词Compiler construction; Secure computation; Secure Multi-party Computation; Parallelization; Cryptography
版次1
doihttps://doi.org/10.1007/978-3-319-67522-0
isbn_softcover978-3-319-67521-3
isbn_ebook978-3-319-67522-0Series ISSN 2191-5768 Series E-ISSN 2191-5776
issn_series 2191-5768
copyrightThe Author(s) 2017
The information of publication is updating

书目名称Compilation for Secure Multi-party Computation影响因子(影响力)




书目名称Compilation for Secure Multi-party Computation影响因子(影响力)学科排名




书目名称Compilation for Secure Multi-party Computation网络公开度




书目名称Compilation for Secure Multi-party Computation网络公开度学科排名




书目名称Compilation for Secure Multi-party Computation被引频次




书目名称Compilation for Secure Multi-party Computation被引频次学科排名




书目名称Compilation for Secure Multi-party Computation年度引用




书目名称Compilation for Secure Multi-party Computation年度引用学科排名




书目名称Compilation for Secure Multi-party Computation读者反馈




书目名称Compilation for Secure Multi-party Computation读者反馈学科排名




单选投票, 共有 1 人参与投票
 

0票 0.00%

Perfect with Aesthetics

 

0票 0.00%

Better Implies Difficulty

 

0票 0.00%

Good and Satisfactory

 

1票 100.00%

Adverse Performance

 

0票 0.00%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 23:17:10 | 显示全部楼层
发表于 2025-3-22 01:47:49 | 显示全部楼层
Erinnern und Entwerfen im Spielc protocols. This is because the manual construction of efficient applications, which need to be represented as Boolean or arithmetic circuits, is a complex, error-prone, and time-consuming task. For the practical use of MPC, and thus, the development of further privacy-enhancing technologies, compi
发表于 2025-3-22 05:21:08 | 显示全部楼层
发表于 2025-3-22 09:13:13 | 显示全部楼层
Spiel, Satz und Sieg für die Mathematikr. To improve the efficiency of secure computation protocol, we describe a practical and compiler assisted parallelization scheme (This chapter is based on our paper “Faster Secure Computation through Automatic Parallelization” Büscher and Katzenbeisser (24th USENIX Security Symposium, USENIX Securi
发表于 2025-3-22 13:39:43 | 显示全部楼层
https://doi.org/10.1007/978-3-662-60602-5ld network settings, with network latencies in the range of tens or hundreds of milliseconds, the round complexity quickly becomes a significant performance bottleneck. In this chapter, we describe compiler extension to CBMC-GC (This chapter is based on our paper “Compiling Low Depth Circuits for Pr
发表于 2025-3-22 17:02:50 | 显示全部楼层
https://doi.org/10.1007/978-3-662-60602-5esearch for MPC focussed either on the development of scalable compilers or on the optimization of smaller circuits. In this section, we give a design of a scalable optimizing MPC compiler (This chapter is based on our paper “Scalable Secure Computation from ANSI-C” (Büscher et al. IEEE Internationa
发表于 2025-3-23 01:16:33 | 显示全部楼层
SpringerBriefs in Computer Sciencehttp://image.papertrans.cn/c/image/231237.jpg
发表于 2025-3-23 01:30:56 | 显示全部楼层
Background, describe Boolean circuits, two secure computation protocols, namely Yao’s garbled circuits and GMW, which are prototypic for constant-round and multi-round MPC protocols over Boolean circuits. Furthermore, we discuss multiple applications that are used for benchmarking purposes.
发表于 2025-3-23 06:10:58 | 显示全部楼层
https://doi.org/10.1007/978-3-319-67522-0Compiler construction; Secure computation; Secure Multi-party Computation; Parallelization; Cryptography
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-2 22:51
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表