Efficient Secure Two-Party Protocols Techniques and Constructions /
The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation – both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing effic...
Κύριοι συγγραφείς: | , |
---|---|
Συγγραφή απο Οργανισμό/Αρχή: | |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2010.
|
Σειρά: | Information Security and Cryptography,
|
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- and Definitions
- Definitions
- General Constructions
- Semi-honest Adversaries
- Malicious Adversaries
- Covert Adversaries
- Specific Constructions
- Sigma Protocols and Efficient Zero-Knowledge1
- Oblivious Transfer and Applications
- The kth-Ranked Element
- Search Problems.