Efficient Secure Two-Party Protocols

Efficient Secure Two-Party Protocols
Author :
Publisher : Springer Science & Business Media
Total Pages : 263
Release :
ISBN-10 : 9783642143038
ISBN-13 : 3642143032
Rating : 4/5 (38 Downloads)

Book Synopsis Efficient Secure Two-Party Protocols by : Carmit Hazay

Download or read book Efficient Secure Two-Party Protocols written by Carmit Hazay and published by Springer Science & Business Media. This book was released on 2010-11-02 with total page 263 pages. Available in PDF, EPUB and Kindle. Book excerpt: In the setting of multiparty computation, sets of two or more parties with p- vate inputs wish to jointly compute some (predetermined) function of their inputs. The computation should be such that the outputs received by the parties are correctly distributed, and furthermore, that the privacy of each party’s input is preserved as much as possible, even in the presence of - versarial behavior. This encompasses any distributed computing task and includes computations as simple as coin-tossing and broadcast, and as c- plex as electronic voting, electronic auctions, electronic cash schemes and anonymous transactions. The feasibility (and infeasibility) of multiparty c- putation has been extensively studied, resulting in a rather comprehensive understanding of what can and cannot be securely computed, and under what assumptions. The theory of cryptography in general, and secure multiparty computation in particular, is rich and elegant. Indeed, the mere fact that it is possible to actually achieve the aforementioned task is both surprising and intriguing.


Efficient Secure Two-Party Protocols Related Books

Efficient Secure Two-Party Protocols
Language: en
Pages: 263
Authors: Carmit Hazay
Categories: Computers
Type: BOOK - Published: 2010-11-02 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

In the setting of multiparty computation, sets of two or more parties with p- vate inputs wish to jointly compute some (predetermined) function of their inputs.
Engineering Secure Two-Party Computation Protocols
Language: en
Pages: 149
Authors: Thomas Schneider
Categories: Computers
Type: BOOK - Published: 2012-08-04 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

Secure two-party computation, called secure function evaluation (SFE), enables two mutually mistrusting parties, the client and server, to evaluate an arbitrary
Advances in Cryptology - Crypto 2013
Language: en
Pages: 576
Authors: Ran Canetti
Categories:
Type: BOOK - Published: 2013-08-25 - Publisher:

DOWNLOAD EBOOK

Applications of Secure Multiparty Computation
Language: en
Pages: 264
Authors: P. Laud
Categories: Computers
Type: BOOK - Published: 2015-07-30 - Publisher: IOS Press

DOWNLOAD EBOOK

We generate and gather a lot of data about ourselves and others, some of it highly confidential. The collection, storage and use of this data is strictly regula
Advances in Cryptology – EUROCRYPT 2008
Language: en
Pages: 564
Authors: Nigel Smart
Categories: Computers
Type: BOOK - Published: 2008-04-05 - Publisher: Springer

DOWNLOAD EBOOK

Here are the refereed proceedings of the 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2008. The 31