9783642143021-3642143024-Efficient Secure Two-Party Protocols: Techniques and Constructions (Information Security and Cryptography)

Efficient Secure Two-Party Protocols: Techniques and Constructions (Information Security and Cryptography)

ISBN-13: 9783642143021
ISBN-10: 3642143024
Edition: 2010
Author: Yehuda Lindell, Carmit Hazay
Publication date: 2010
Publisher: Springer
Format: Hardcover 276 pages
FREE US shipping
Buy

From $50.70

Book details

ISBN-13: 9783642143021
ISBN-10: 3642143024
Edition: 2010
Author: Yehuda Lindell, Carmit Hazay
Publication date: 2010
Publisher: Springer
Format: Hardcover 276 pages

Summary

Efficient Secure Two-Party Protocols: Techniques and Constructions (Information Security and Cryptography) (ISBN-13: 9783642143021 and ISBN-10: 3642143024), written by authors Yehuda Lindell, Carmit Hazay, was published by Springer in 2010. With an overall rating of 3.9 stars, it's a notable title among other Information Theory (Computer Science) books. You can easily purchase or rent Efficient Secure Two-Party Protocols: Techniques and Constructions (Information Security and Cryptography) (Hardcover) from BooksRun, along with many other new and used Information Theory books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

In the setting of multiparty computation, sets of two or more parties with p- vate inputs wish to jointly compute some (predetermined) function of their inputs. The computation should be such that the outputs received by the parties are correctly distributed, and furthermore, that the privacy of each party’s input is preserved as much as possible, even in the presence of - versarial behavior. This encompasses any distributed computing task and includes computations as simple as coin-tossing and broadcast, and as c- plex as electronic voting, electronic auctions, electronic cash schemes and anonymous transactions. The feasibility (and infeasibility) of multiparty c- putation has been extensively studied, resulting in a rather comprehensive understanding of what can and cannot be securely computed, and under what assumptions. The theory of cryptography in general, and secure multiparty computation in particular, is rich and elegant. Indeed, the mere fact that it is possible to actually achieve the aforementioned task is both surprising and intriguing.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book