Efficient Secure Two-Party Protocols Techniques and Constructions /
The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation - both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing effic...
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | , |
Autor Corporativo: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2010.
|
Edición: | 1st ed. 2010. |
Colección: | Information Security and Cryptography,
|
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- and Definitions
- Definitions
- General Constructions
- Semi-honest Adversaries
- Malicious Adversaries
- Covert Adversaries
- Specific Constructions
- Sigma Protocols and Efficient Zero-Knowledge1
- Oblivious Transfer and Applications
- The kth-Ranked Element
- Search Problems.