Efficient Secure Two-Party Protocols

preview-18
  • Efficient Secure Two-Party Protocols Book Detail

  • Author : Carmit Hazay
  • Release Date : 2010-11-02
  • Publisher : Springer Science & Business Media
  • Genre : Computers
  • Pages : 263
  • ISBN 13 : 3642143032
  • File Size : 54,54 MB

Efficient Secure Two-Party Protocols by Carmit Hazay PDF Summary

Book Description: In the setting of multiparty computation, sets of two or more parties with p- vate inputs wish to jointly compute some (predetermined) function of their inputs. The computation should be such that the outputs received by the parties are correctly distributed, and furthermore, that the privacy of each party’s input is preserved as much as possible, even in the presence of - versarial behavior. This encompasses any distributed computing task and includes computations as simple as coin-tossing and broadcast, and as c- plex as electronic voting, electronic auctions, electronic cash schemes and anonymous transactions. The feasibility (and infeasibility) of multiparty c- putation has been extensively studied, resulting in a rather comprehensive understanding of what can and cannot be securely computed, and under what assumptions. The theory of cryptography in general, and secure multiparty computation in particular, is rich and elegant. Indeed, the mere fact that it is possible to actually achieve the aforementioned task is both surprising and intriguing.

Disclaimer: www.yourbookbest.com does not own Efficient Secure Two-Party Protocols books pdf, neither created or scanned. We just provide the link that is already available on the internet, public domain and in Google Drive. If any way it violates the law or has any issues, then kindly mail us via contact us page to request the removal of the link.

Efficient Secure Two-Party Protocols

Efficient Secure Two-Party Protocols

File Size : 50,50 MB
Total View : 2914 Views
DOWNLOAD

In the setting of multiparty computation, sets of two or more parties with p- vate inputs wish to jointly compute some (predetermined) function of their inputs.

Advances in Cryptology -- CRYPTO 2012

Advances in Cryptology -- CRYPTO 2012

File Size : 48,48 MB
Total View : 2412 Views
DOWNLOAD

This book constitutes the refereed proceedings of the 32nd Annual International Cryptology Conference, CRYPTO 2012, held in Santa Barbara, CA, USA, in August 20