Secure Multi-Party Computation Against Passive Adversaries (Record no. 84680)

000 -LEADER
fixed length control field 04387nam a22006255i 4500
001 - CONTROL NUMBER
control field 978-3-031-12164-7
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240730163512.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 221007s2022 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783031121647
-- 978-3-031-12164-7
082 04 - CLASSIFICATION NUMBER
Call Number 005.824
100 1# - AUTHOR NAME
Author Choudhury, Ashish.
245 10 - TITLE STATEMENT
Title Secure Multi-Party Computation Against Passive Adversaries
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2022.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XIII, 231 p. 85 illus., 50 illus. in color.
490 1# - SERIES STATEMENT
Series statement Synthesis Lectures on Distributed Computing Theory,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Introduction -- Relevant Topics from Abstract Algebra -- Secret Sharing -- A Toy MPC Protocol -- The BGW Perfectly-Secure MPC Protocol for Linear Functions -- The BGW Perfectly-Secure MPC Protocol for Any Arbitrary Function -- Perfectly-Secure MPC in the Pre-Processing Model -- Perfectly-Secure MPC Tolerating General Adversaries -- Perfectly-Secure MPC for Small Number of parties -- The GMW MPC Protocol -- Oblivious Transfer.
520 ## - SUMMARY, ETC.
Summary, etc This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model). The authors present seminal possibility and feasibility results in this model and includes formal security proofs. Even though the passive corruption model may seem very weak, achieving security against such a benign form of adversary turns out to be non-trivial and demands sophisticated and highly advanced techniques. MPC is a fundamental concept, both in cryptography as well as distributed computing. On a very high level, an MPC protocol allows a set of mutually-distrusting parties with their private inputs to jointly and securely perform any computation on their inputs. Examples of such computation include, but not limited to, privacy-preserving data mining; secure e-auction; private set-intersection; and privacy-preserving machine learning. MPC protocols emulate the role of an imaginary, centralized trusted third party (TTP) that collects the inputs of the parties, performs the desired computation, and publishes the result. Due to its powerful abstraction, the MPC problem has been widely studied over the last four decades. In addition, this book: Includes detailed security proofs for seminal protocols and state-of-theart efficiency improvement techniques Presents protocols against computationally bounded as well as computationally unbounded adversaries Focuses on MPC protocols in the passive corruption model, presents seminal possibility and feasibility results, and features companion video lectures.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Law and legislation.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
700 1# - AUTHOR 2
Author 2 Patra, Arpita.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-3-031-12164-7
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2022.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Cryptography.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data protection.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data protection
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer networks
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Cryptology.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Security Services.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data and Information Security.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Privacy.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Principles and Models of Security.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Mobile and Network Security.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 2155-1634
912 ## -
-- ZDB-2-SXSC

No items available.