Secure Multi-Party Computation Against Passive Adversaries Secure Multi-Party Computation Against Passive Adversaries
Synthesis Lectures on Distributed Computing Theory

Secure Multi-Party Computation Against Passive Adversaries

    • 46,99 €
    • 46,99 €

Beschreibung des Verlags

This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model). The authors present seminal possibility and feasibility results in this model and includes formal security proofs. Even though the passive corruption model may seem very weak, achieving security against such a benign form of adversary turns out to be non-trivial and demands sophisticated and highly advanced techniques. MPC is a fundamental concept, both in cryptography as well as distributed computing. On a very high level, an MPC protocol allows a set of mutually-distrusting parties with their private inputs to jointly and securely perform any computation on their inputs. Examples of such computation include, but not limited to, privacy-preserving data mining; secure e-auction; private set-intersection; and privacy-preserving machine learning. MPC protocols emulate the role of an imaginary, centralized trusted third party (TTP) that collects the inputs of the parties, performs the desired computation, and publishes the result. Due to its powerful abstraction, the MPC problem has been widely studied over the last four decades.
In addition, this book:Includes detailed security proofs for seminal protocols and state-of-theart efficiency improvement techniquesPresents protocols against computationally bounded as well as computationally unbounded adversariesFocuses on MPC protocols in the passive corruption model, presents seminal possibility and feasibility results, and features companion video lectures

GENRE
Computer und Internet
ERSCHIENEN
2022
7. Oktober
SPRACHE
EN
Englisch
UMFANG
244
Seiten
VERLAG
Springer International Publishing
GRÖSSE
35,3
 MB

Mehr ähnliche Bücher

Contemporary Cryptology Contemporary Cryptology
2006
Advances in Cryptology – ASIACRYPT 2020 Advances in Cryptology – ASIACRYPT 2020
2020
Advances in Cryptology – CRYPTO 2022 Advances in Cryptology – CRYPTO 2022
2022
Advances in Cryptology – EUROCRYPT 2022 Advances in Cryptology – EUROCRYPT 2022
2022
Advances in Cryptology – CRYPTO 2021 Advances in Cryptology – CRYPTO 2021
2021
Advances in Cryptology – ASIACRYPT 2022 Advances in Cryptology – ASIACRYPT 2022
2023

Andere Bücher in dieser Reihe