Efficient secure two-party protocols. Techniques and constructions (Q983160)

From MaRDI portal





scientific article; zbMATH DE number 5763576
Language Label Description Also known as
default for all languages
No label defined
    English
    Efficient secure two-party protocols. Techniques and constructions
    scientific article; zbMATH DE number 5763576

      Statements

      Efficient secure two-party protocols. Techniques and constructions (English)
      0 references
      0 references
      0 references
      3 August 2010
      0 references
      This book focuses on secure computation and develops techniques for achieving efficiency in the area of cryptography and similar fields like privacy-preserving data mining. After a general introduction and survey on the subject, a number of models are developed to justify the theoretical foundation. Further, secure protocols are determined which can be applied to any circuit computing of any efficient function. After the general construction the authors develop specific constructions to study secure protocols as well as application specific examples of higher level protocols; they also demonstrate how specific properties of a function can be computed and utilized to achieve greater efficiency. A number of experiments are performed for illustration. This book may be used as a text book for an introductory course on secure computation.
      0 references
      multiparty computation
      0 references
      distributed computing
      0 references
      protocols
      0 references
      two party computation
      0 references
      stand alone model
      0 references
      search problems
      0 references
      circuit computing
      0 references

      Identifiers