Efficient Secure Two-Party Protocols
Springer Berlin (Verlag)
9783642143021 (ISBN)
and Definitions.- Definitions.- General Constructions.- Semi-honest Adversaries.- Malicious Adversaries.- Covert Adversaries.- Specific Constructions.- Sigma Protocols and Efficient Zero-Knowledge1.- Oblivious Transfer and Applications.- The kth-Ranked Element.- Search Problems.
"(T)he book is a pleasure to read, containing sufficient motivation, intuition, and informal discussion as well as detailed proofs of security. The book contains a superb treatment of both general secure two-party computation as well as several efficient protocols in this setting. The first three chapters of the book would serve as an accessible introduction to secure two-party computation for the interested graduate student; the rest of the book is an excellent starting point for the more specialized literature in the field. The book could also serve very nicely as a text for a graduate seminar in this area, or could even be used as a supplementary book at the end of a graduate 'Introduction to Cryptography' class. ... It belongs on the shelf of every researcher interested in this area." Jonathan Katz, SIGACT News Book Review Column 43(1) 2012
| Erscheint lt. Verlag | 4.11.2010 |
|---|---|
| Reihe/Serie | Information Security and Cryptography |
| Zusatzinfo | XIII, 263 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 586 g |
| Themenwelt | Mathematik / Informatik ► Informatik |
| Schlagworte | Computersicherheit • Covert Adversaries • Database • Data Mining • Definitions • Index • Introduction • Malicious Adversaries • Oblivious Transfer and Applications • Protokoll • References • Search Problems • Semi-honest Adversaries • Sigma Protocols and Efficient Zero-Knowledge • The k-th Ranked Element |
| ISBN-13 | 9783642143021 / 9783642143021 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich