Efficient Secure Two-Party Protocols
Title | Efficient Secure Two-Party Protocols PDF eBook |
Author | Carmit Hazay |
Publisher | Springer Science & Business Media |
Pages | 271 |
Release | 2010-11-02 |
Genre | Computers |
ISBN | 3642143032 |
In the setting of multiparty computation, sets of two or more parties with p- vate inputs wish to jointly compute some (predetermined) function of their inputs. The computation should be such that the outputs received by the parties are correctly distributed, and furthermore, that the privacy of each party’s input is preserved as much as possible, even in the presence of - versarial behavior. This encompasses any distributed computing task and includes computations as simple as coin-tossing and broadcast, and as c- plex as electronic voting, electronic auctions, electronic cash schemes and anonymous transactions. The feasibility (and infeasibility) of multiparty c- putation has been extensively studied, resulting in a rather comprehensive understanding of what can and cannot be securely computed, and under what assumptions. The theory of cryptography in general, and secure multiparty computation in particular, is rich and elegant. Indeed, the mere fact that it is possible to actually achieve the aforementioned task is both surprising and intriguing.
Engineering Secure Two-Party Computation Protocols
Title | Engineering Secure Two-Party Computation Protocols PDF eBook |
Author | |
Publisher | Springer |
Pages | 156 |
Release | 2012-09-01 |
Genre | |
ISBN | 9783642300431 |
A Pragmatic Introduction to Secure Multi-Party Computation
Title | A Pragmatic Introduction to Secure Multi-Party Computation PDF eBook |
Author | David Evans |
Publisher | Foundations and Trends (R) in Privacy and Security |
Pages | 190 |
Release | 2018-12-19 |
Genre | |
ISBN | 9781680835083 |
Practitioners and researchers seeking a concise, accessible introduction to secure multi-party computation which quickly enables them to build practical systems or conduct further research will find this essential reading.
Advances in Cryptology – EUROCRYPT 2008
Title | Advances in Cryptology – EUROCRYPT 2008 PDF eBook |
Author | Nigel Smart |
Publisher | Springer |
Pages | 576 |
Release | 2008-04-05 |
Genre | Computers |
ISBN | 3540789677 |
Here are the refereed proceedings of the 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2008. The 31 revised full papers presented were carefully reviewed and selected from 163 submissions.
Advances in Cryptology -- CRYPTO 2012
Title | Advances in Cryptology -- CRYPTO 2012 PDF eBook |
Author | Reihaneh Safavi-Naini |
Publisher | Springer |
Pages | 902 |
Release | 2012-08-08 |
Genre | Computers |
ISBN | 3642320090 |
This book constitutes the refereed proceedings of the 32nd Annual International Cryptology Conference, CRYPTO 2012, held in Santa Barbara, CA, USA, in August 2012. The 48 revised full papers presented were carefully reviewed and selected from 225 submissions. The volume also contains the abstracts of two invited talks. The papers are organized in topical sections on symmetric cryptosystems, secure computation, attribute-based and functional encryption, proofs systems, protocols, hash functions, composable security, privacy, leakage and side-channels, signatures, implementation analysis, black-box separation, cryptanalysis, quantum cryptography, and key encapsulation and one-way functions.
Algorithmic Strategies for Solving Complex Problems in Cryptography
Title | Algorithmic Strategies for Solving Complex Problems in Cryptography PDF eBook |
Author | Balasubramanian, Kannan |
Publisher | IGI Global |
Pages | 321 |
Release | 2017-08-16 |
Genre | Computers |
ISBN | 1522529160 |
Cryptography is a field that is constantly advancing, due to exponential growth in new technologies within the past few decades. Applying strategic algorithms to cryptic issues can help save time and energy in solving the expanding problems within this field. Algorithmic Strategies for Solving Complex Problems in Cryptography is an essential reference source that discusses the evolution and current trends in cryptology, and it offers new insight into how to use strategic algorithms to aid in solving intricate difficulties within this domain. Featuring relevant topics such as hash functions, homomorphic encryption schemes, two party computation, and integer factoring, this publication is ideal for academicians, graduate students, engineers, professionals, and researchers interested in expanding their knowledge of current trends and techniques within the cryptology field.
Secure Multiparty Computation
Title | Secure Multiparty Computation PDF eBook |
Author | Ronald Cramer |
Publisher | Cambridge University Press |
Pages | 385 |
Release | 2015-07-15 |
Genre | Computers |
ISBN | 1107043050 |
This book provides information on theoretically secure multiparty computation (MPC) and secret sharing, and the fascinating relationship between the two concepts.