Efficient Secure Two-Party Protocols Techniques and Constructions /

The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation – both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing effic...

Full description

Bibliographic Details
Main Authors: Hazay, Carmit (Author), Lindell, Yehuda (Author)
Corporate Author: SpringerLink (Online service)
Format: Electronic eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010.
Series:Information Security and Cryptography,
Subjects:
Online Access:Full Text via HEAL-Link
Table of Contents:
  • and Definitions
  • Definitions
  • General Constructions
  • Semi-honest Adversaries
  • Malicious Adversaries
  • Covert Adversaries
  • Specific Constructions
  • Sigma Protocols and Efficient Zero-Knowledge1
  • Oblivious Transfer and Applications
  • The kth-Ranked Element
  • Search Problems.