Secure Multi Party Computation Against Passive Adversaries


Download Secure Multi Party Computation Against Passive Adversaries PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Secure Multi Party Computation Against Passive Adversaries book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.

Download

Secure Multi-Party Computation Against Passive Adversaries


Secure Multi-Party Computation Against Passive Adversaries

Author: Ashish Choudhury

language: en

Publisher: Springer Nature

Release Date: 2022-10-07


DOWNLOAD





This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model). The authors present seminal possibility and feasibility results in this model and includes formal security proofs. Even though the passive corruption model may seem very weak, achieving security against such a benign form of adversary turns out to be non-trivial and demands sophisticated and highly advanced techniques. MPC is a fundamental concept, both in cryptography as well as distributed computing. On a very high level, an MPC protocol allows a set of mutually-distrusting parties with their private inputs to jointly and securely perform any computation on their inputs. Examples of such computation include, but not limited to, privacy-preserving data mining; secure e-auction; private set-intersection; and privacy-preserving machine learning. MPC protocols emulate the role of an imaginary, centralized trusted third party (TTP) that collects the inputs of the parties, performs the desired computation, and publishes the result. Due to its powerful abstraction, the MPC problem has been widely studied over the last four decades.

A Pragmatic Introduction to Secure Multi-Party Computation


A Pragmatic Introduction to Secure Multi-Party Computation

Author: David Evans

language: en

Publisher: Foundations and Trends (R) in Privacy and Security

Release Date: 2018-12-19


DOWNLOAD





Practitioners and researchers seeking a concise, accessible introduction to secure multi-party computation which quickly enables them to build practical systems or conduct further research will find this essential reading.

Security in Communication Networks


Security in Communication Networks

Author: Stelvio Cimato

language: en

Publisher: Springer

Release Date: 2003-07-01


DOWNLOAD





This book constitutes the thoroughly refereed post-proceedings of the Third International Conference on Security in Communication Networks, SCN 2002, held in Amalfi, Italy in September 2002. The 24 revised full papers presented together with two invited papers were carefully selected from 90 submissions during two rounds of reviewing and revision. The papers are organized in topical sections on forward security, foundations of cryptography, key management, cryptanalysis, systems security, digital signature schemes, zero knowledge, and information theory and secret sharing.