Secure Multi-Party Computation ( Cryptology and Information Security Series )

Publication series : Cryptology and Information Security Series

Author: Prabhakaran M.M.;Sahai A.  

Publisher: Ios Press‎

Publication year: 2013

E-ISBN: 9781614991694

P-ISBN(Paperback): 9781614991687

Subject: TP309 安全保密

Keyword: 计算技术、计算机技术

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

Secure Multi-Party Computation (MPC) is one of the most powerful tools developed by modern cryptography: it facilitates collaboration among mutually distrusting parties by implementing a virtual trusted party. Despite the remarkable potential of such a tool, and decades of active research in the theoretical cryptography community, it remains a relatively inaccessible and lesser-known concept outside of this field. Only a handful of resources are available to students and researchers wishing to learn more about MPC. The editors of this book have assembled a comprehensive body of basic and advanced material on MPC, authored by experts in the field. It will serve as a starting point for those interested in pursuing research related to MPC, whether they are students learning about it for the first time or researchers already working in the area. The book begins with tutorials introducing the concept of MPC and zero-knowledge proofs, an important theoretical platform where many of the concepts central to MPC were shaped. The remaining chapters deal with classical as well as recent MPC protocols, and a variety of related topics. Each chapter is self-contained and can be read independently of the others.

Chapter

Security and Composition of Cryptographic Protocols: A Tutorial

The BGW Protocol for Perfectly-Secure Multiparty Computation

Information-Theoretic Secure Multiparty Computation

The IPS Compiler

Randomization Techniques for Secure Computation

Complexity of Multi-Party Computation Functionalities

Author Index

The users who browse this book also browse