书目名称 | Efficient Secure Two-Party Protocols |
副标题 | Techniques and Const |
编辑 | Carmit Hazay,Yehuda Lindell |
视频video | |
概述 | Essential reading for researchers in the area of secure protocols.The authors compare the efficiencies of different protocols Essential reading for researchers in the area of privacy-preserving data m |
丛书名称 | Information Security and Cryptography |
图书封面 |  |
描述 | In the setting of multiparty computation, sets of two or more parties with p- vate inputs wish to jointly compute some (predetermined) function of their inputs. The computation should be such that the outputs received by the parties are correctly distributed, and furthermore, that the privacy of each party’s input is preserved as much as possible, even in the presence of - versarial behavior. This encompasses any distributed computing task and includes computations as simple as coin-tossing and broadcast, and as c- plex as electronic voting, electronic auctions, electronic cash schemes and anonymous transactions. The feasibility (and infeasibility) of multiparty c- putation has been extensively studied, resulting in a rather comprehensive understanding of what can and cannot be securely computed, and under what assumptions. The theory of cryptography in general, and secure multiparty computation in particular, is rich and elegant. Indeed, the mere fact that it is possible to actually achieve the aforementioned task is both surprising and intriguing. |
出版日期 | Book 2010 |
关键词 | Covert Adversaries; Definitions; Index; Introduction; Malicious Adversaries; Oblivious Transfer and Appli |
版次 | 1 |
doi | https://doi.org/10.1007/978-3-642-14303-8 |
isbn_softcover | 978-3-642-26576-1 |
isbn_ebook | 978-3-642-14303-8Series ISSN 1619-7100 Series E-ISSN 2197-845X |
issn_series | 1619-7100 |
copyright | Springer-Verlag Berlin Heidelberg 2010 |