Dekorationsartikel gehören nicht zum Leistungsumfang.
Secure Multi-Party Computation Against Passive Adversaries
Buch von Arpita Patra (u. a.)
Sprache: Englisch

47,95 €*

inkl. MwSt.

Versandkostenfrei per Post / DHL

Lieferzeit 2-3 Wochen

Kategorien:
Beschreibung
This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model). The authors present seminal possibility and feasibility results in this model and includes formal security proofs. Even though the passive corruption model may seem very weak, achieving security against such a benign form of adversary turns out to be non-trivial and demands sophisticated and highly advanced techniques. MPC is a fundamental concept, both in cryptography as well as distributed computing. On a very high level, an MPC protocol allows a set of mutually-distrusting parties with their private inputs to jointly and securely perform any computation on their inputs. Examples of such computation include, but not limited to, privacy-preserving data mining; secure e-auction; private set-intersection; and privacy-preserving machine learning. MPC protocols emulate the role of an imaginary, centralized trusted third party (TTP) that collects the inputs of the parties, performs the desired computation, and publishes the result. Due to its powerful abstraction, the MPC problem has been widely studied over the last four decades.
This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model). The authors present seminal possibility and feasibility results in this model and includes formal security proofs. Even though the passive corruption model may seem very weak, achieving security against such a benign form of adversary turns out to be non-trivial and demands sophisticated and highly advanced techniques. MPC is a fundamental concept, both in cryptography as well as distributed computing. On a very high level, an MPC protocol allows a set of mutually-distrusting parties with their private inputs to jointly and securely perform any computation on their inputs. Examples of such computation include, but not limited to, privacy-preserving data mining; secure e-auction; private set-intersection; and privacy-preserving machine learning. MPC protocols emulate the role of an imaginary, centralized trusted third party (TTP) that collects the inputs of the parties, performs the desired computation, and publishes the result. Due to its powerful abstraction, the MPC problem has been widely studied over the last four decades.
Über den Autor
Ashish Choudhury, Ph.D., is an Associate Professor at the Inter national Institute of Information Technology, Bangalore, India. He received his M.S. and Ph.D. degrees from the Indian Institute of Technology, Madras, India. His research interests include theoretical cryptography, with specialization in cryptographic protocols.
Arpita Patra, Ph.D., is an Associate Professor at the Indian Institute of Science. She received her Ph.D from the Indian Institute of Technology and held post-doctoral positions at the University of Bristol, ETH Zurich, and Aarhus University. Her research interests include cryptography, with a focus on theoretical and practical aspects of secure multiparty computation protocols.
Zusammenfassung

Includes detailed security proofs for seminal protocols and state-of-theart efficiency improvement techniques

Presents protocols against computationally bounded as well as computationally unbounded adversaries

Focuses on MPC protocols in the passive corruption model and presents seminal possibility and feasibility results

Inhaltsverzeichnis
Introduction.- Relevant Topics from Abstract Algebra.- Secret Sharing.- A Toy MPC Protocol.- The BGW Perfectly-Secure MPC Protocol for Linear Functions.- The BGW Perfectly-Secure MPC Protocol for Any Arbitrary Function.- Perfectly-Secure MPC in the Pre-Processing Model.- Perfectly-Secure MPC Tolerating General Adversaries.- Perfectly-Secure MPC for Small Number of parties.- The GMW MPC Protocol.- Oblivious Transfer.
Details
Erscheinungsjahr: 2022
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Buch
Seiten: 248
Reihe: Synthesis Lectures on Distributed Computing Theory
Inhalt: xiii
231 S.
35 s/w Illustr.
50 farbige Illustr.
231 p. 85 illus.
50 illus. in color.
ISBN-13: 9783031121630
ISBN-10: 3031121635
Sprache: Englisch
Ausstattung / Beilage: HC runder Rücken kaschiert
Einband: Gebunden
Autor: Patra, Arpita
Choudhury, Ashish
Auflage: 1st ed. 2022
Hersteller: Springer International Publishing
Synthesis Lectures on Distributed Computing Theory
Maße: 246 x 173 x 20 mm
Von/Mit: Arpita Patra (u. a.)
Erscheinungsdatum: 08.10.2022
Gewicht: 0,599 kg
preigu-id: 122035905
Über den Autor
Ashish Choudhury, Ph.D., is an Associate Professor at the Inter national Institute of Information Technology, Bangalore, India. He received his M.S. and Ph.D. degrees from the Indian Institute of Technology, Madras, India. His research interests include theoretical cryptography, with specialization in cryptographic protocols.
Arpita Patra, Ph.D., is an Associate Professor at the Indian Institute of Science. She received her Ph.D from the Indian Institute of Technology and held post-doctoral positions at the University of Bristol, ETH Zurich, and Aarhus University. Her research interests include cryptography, with a focus on theoretical and practical aspects of secure multiparty computation protocols.
Zusammenfassung

Includes detailed security proofs for seminal protocols and state-of-theart efficiency improvement techniques

Presents protocols against computationally bounded as well as computationally unbounded adversaries

Focuses on MPC protocols in the passive corruption model and presents seminal possibility and feasibility results

Inhaltsverzeichnis
Introduction.- Relevant Topics from Abstract Algebra.- Secret Sharing.- A Toy MPC Protocol.- The BGW Perfectly-Secure MPC Protocol for Linear Functions.- The BGW Perfectly-Secure MPC Protocol for Any Arbitrary Function.- Perfectly-Secure MPC in the Pre-Processing Model.- Perfectly-Secure MPC Tolerating General Adversaries.- Perfectly-Secure MPC for Small Number of parties.- The GMW MPC Protocol.- Oblivious Transfer.
Details
Erscheinungsjahr: 2022
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Buch
Seiten: 248
Reihe: Synthesis Lectures on Distributed Computing Theory
Inhalt: xiii
231 S.
35 s/w Illustr.
50 farbige Illustr.
231 p. 85 illus.
50 illus. in color.
ISBN-13: 9783031121630
ISBN-10: 3031121635
Sprache: Englisch
Ausstattung / Beilage: HC runder Rücken kaschiert
Einband: Gebunden
Autor: Patra, Arpita
Choudhury, Ashish
Auflage: 1st ed. 2022
Hersteller: Springer International Publishing
Synthesis Lectures on Distributed Computing Theory
Maße: 246 x 173 x 20 mm
Von/Mit: Arpita Patra (u. a.)
Erscheinungsdatum: 08.10.2022
Gewicht: 0,599 kg
preigu-id: 122035905
Warnhinweis

Ähnliche Produkte

Ähnliche Produkte