Secure Multi-Party Computation Against Passive Adversaries / Nejlevnější knihy
Secure Multi-Party Computation Against Passive Adversaries

Kód: 39362939

Secure Multi-Party Computation Against Passive Adversaries

Autor Ashish Choudhury, Arpita Patra

This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model). The authors present seminal possibility and feasibility results in this mode ... celý popis

1554


Skladem u dodavatele
Odesíláme za 11-13 dnů
Přidat mezi přání

Mohlo by se vám také líbit

Darujte tuto knihu ještě dnes
  1. Objednejte knihu a zvolte Zaslat jako dárek.
  2. Obratem obdržíte darovací poukaz na knihu, který můžete ihned předat obdarovanému.
  3. Knihu zašleme na adresu obdarovaného, o nic se nestaráte.

Více informací

Více informací o knize Secure Multi-Party Computation Against Passive Adversaries

Nákupem získáte 155 bodů

Anotace knihy

This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model). The authors present seminal possibility and feasibility results in this model and includes formal security proofs. Even though the passive corruption model may seem very weak, achieving security against such a benign form of adversary turns out to be non-trivial and demands sophisticated and highly advanced techniques. MPC is a fundamental concept, both in cryptography as well as distributed computing. On a very high level, an MPC protocol allows a set of mutually-distrusting parties with their private inputs to jointly perform any computation on their inputs. Examples of such computation include, but not limited to, privacy-preserving data mining; secure e-auction; private set-intersection; and privacy-preserving machine learning. MPC protocols emulate the role of an imaginary, centralized trusted third party (TTP) that collects the inputs of the parties, performs the desired computation, and publishes the result. Therefore, any task that can be carried out securely in the presence of a centralized TTP can be performed by decentralizing the role of the TTP by running an MPC protocol among the parties themselves. Due to its powerful abstraction, the MPC problem has been widely studied, both by the cryptography community as well as the distributed computing community, over the past four decades.

Parametry knihy

Zařazení knihy Knihy v angličtině Reference, information & interdisciplinary subjects Research & information: general Coding theory & cryptology

1554



Osobní odběr Praha, Brno a 12903 dalších

Copyright ©2008-24 nejlevnejsi-knihy.cz Všechna práva vyhrazenaSoukromíCookies


Můj účet: Přihlásit se
Všechny knihy světa na jednom místě. Navíc za skvělé ceny.

Nákupní košík ( prázdný )

Vyzvednutí v Zásilkovně
zdarma nad 1 499 Kč.

Nacházíte se: