Composition of Secure Multi-Party Protocols [electronic resource] : A Comprehensive Study /

In the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs. General results concerning secure two-party or multi-party computation were first announced in the 1980s. Put briefly, these results assert that under certain assumptions one can construct protocols for securely computing any desired multi-party functionality. However, this research relates only to a setting where a single protocol execution is carried out. In contrast, in modern networks, many different protocol executions are run at the same time. This book is devoted to the general and systematic study of secure multi-party computation under composition. Despite its emphasis on a theoretically well-founded treatment of the subject, general techniques for designing secure protocols are developed that may even result in schemes or modules to be incorporated in practical systems. The book clarifies fundamental issues regarding security in a multi-execution environment and gives a comprehensive and unique treatment of the composition of secure multi-party protocols.

Saved in:
Bibliographic Details
Main Authors: Lindell, Yehuda. author., SpringerLink (Online service)
Format: Texto biblioteca
Language:eng
Published: Berlin, Heidelberg : Springer Berlin Heidelberg, 2003
Subjects:Computer science., Computer communication systems., Operating systems (Computers)., Data encryption (Computer science)., Computers and civilization., Management information systems., Computer Science., Data Encryption., Computer Communication Networks., Operating Systems., Computers and Society., Management of Computing and Information Systems.,
Online Access:http://dx.doi.org/10.1007/b13246
Tags: Add Tag
No Tags, Be the first to tag this record!
id KOHA-OAI-TEST:206655
record_format koha
spelling KOHA-OAI-TEST:2066552018-07-30T23:36:30ZComposition of Secure Multi-Party Protocols [electronic resource] : A Comprehensive Study / Lindell, Yehuda. author. SpringerLink (Online service) textBerlin, Heidelberg : Springer Berlin Heidelberg,2003.engIn the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs. General results concerning secure two-party or multi-party computation were first announced in the 1980s. Put briefly, these results assert that under certain assumptions one can construct protocols for securely computing any desired multi-party functionality. However, this research relates only to a setting where a single protocol execution is carried out. In contrast, in modern networks, many different protocol executions are run at the same time. This book is devoted to the general and systematic study of secure multi-party computation under composition. Despite its emphasis on a theoretically well-founded treatment of the subject, general techniques for designing secure protocols are developed that may even result in schemes or modules to be incorporated in practical systems. The book clarifies fundamental issues regarding security in a multi-execution environment and gives a comprehensive and unique treatment of the composition of secure multi-party protocols.1. Introduction -- 2. The Composition of Authenticated Byzantine Agreement -- 3. Secure Computation without Agreement -- 4. Universally Composable Multi-party Computation.In the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs. General results concerning secure two-party or multi-party computation were first announced in the 1980s. Put briefly, these results assert that under certain assumptions one can construct protocols for securely computing any desired multi-party functionality. However, this research relates only to a setting where a single protocol execution is carried out. In contrast, in modern networks, many different protocol executions are run at the same time. This book is devoted to the general and systematic study of secure multi-party computation under composition. Despite its emphasis on a theoretically well-founded treatment of the subject, general techniques for designing secure protocols are developed that may even result in schemes or modules to be incorporated in practical systems. The book clarifies fundamental issues regarding security in a multi-execution environment and gives a comprehensive and unique treatment of the composition of secure multi-party protocols.Computer science.Computer communication systems.Operating systems (Computers).Data encryption (Computer science).Computers and civilization.Management information systems.Computer Science.Data Encryption.Computer Communication Networks.Operating Systems.Computers and Society.Management of Computing and Information Systems.Springer eBookshttp://dx.doi.org/10.1007/b13246URN:ISBN:9783540398196
institution COLPOS
collection Koha
country México
countrycode MX
component Bibliográfico
access En linea
En linea
databasecode cat-colpos
tag biblioteca
region America del Norte
libraryname Departamento de documentación y biblioteca de COLPOS
language eng
topic Computer science.
Computer communication systems.
Operating systems (Computers).
Data encryption (Computer science).
Computers and civilization.
Management information systems.
Computer Science.
Data Encryption.
Computer Communication Networks.
Operating Systems.
Computers and Society.
Management of Computing and Information Systems.
Computer science.
Computer communication systems.
Operating systems (Computers).
Data encryption (Computer science).
Computers and civilization.
Management information systems.
Computer Science.
Data Encryption.
Computer Communication Networks.
Operating Systems.
Computers and Society.
Management of Computing and Information Systems.
spellingShingle Computer science.
Computer communication systems.
Operating systems (Computers).
Data encryption (Computer science).
Computers and civilization.
Management information systems.
Computer Science.
Data Encryption.
Computer Communication Networks.
Operating Systems.
Computers and Society.
Management of Computing and Information Systems.
Computer science.
Computer communication systems.
Operating systems (Computers).
Data encryption (Computer science).
Computers and civilization.
Management information systems.
Computer Science.
Data Encryption.
Computer Communication Networks.
Operating Systems.
Computers and Society.
Management of Computing and Information Systems.
Lindell, Yehuda. author.
SpringerLink (Online service)
Composition of Secure Multi-Party Protocols [electronic resource] : A Comprehensive Study /
description In the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs. General results concerning secure two-party or multi-party computation were first announced in the 1980s. Put briefly, these results assert that under certain assumptions one can construct protocols for securely computing any desired multi-party functionality. However, this research relates only to a setting where a single protocol execution is carried out. In contrast, in modern networks, many different protocol executions are run at the same time. This book is devoted to the general and systematic study of secure multi-party computation under composition. Despite its emphasis on a theoretically well-founded treatment of the subject, general techniques for designing secure protocols are developed that may even result in schemes or modules to be incorporated in practical systems. The book clarifies fundamental issues regarding security in a multi-execution environment and gives a comprehensive and unique treatment of the composition of secure multi-party protocols.
format Texto
topic_facet Computer science.
Computer communication systems.
Operating systems (Computers).
Data encryption (Computer science).
Computers and civilization.
Management information systems.
Computer Science.
Data Encryption.
Computer Communication Networks.
Operating Systems.
Computers and Society.
Management of Computing and Information Systems.
author Lindell, Yehuda. author.
SpringerLink (Online service)
author_facet Lindell, Yehuda. author.
SpringerLink (Online service)
author_sort Lindell, Yehuda. author.
title Composition of Secure Multi-Party Protocols [electronic resource] : A Comprehensive Study /
title_short Composition of Secure Multi-Party Protocols [electronic resource] : A Comprehensive Study /
title_full Composition of Secure Multi-Party Protocols [electronic resource] : A Comprehensive Study /
title_fullStr Composition of Secure Multi-Party Protocols [electronic resource] : A Comprehensive Study /
title_full_unstemmed Composition of Secure Multi-Party Protocols [electronic resource] : A Comprehensive Study /
title_sort composition of secure multi-party protocols [electronic resource] : a comprehensive study /
publisher Berlin, Heidelberg : Springer Berlin Heidelberg,
publishDate 2003
url http://dx.doi.org/10.1007/b13246
work_keys_str_mv AT lindellyehudaauthor compositionofsecuremultipartyprotocolselectronicresourceacomprehensivestudy
AT springerlinkonlineservice compositionofsecuremultipartyprotocolselectronicresourceacomprehensivestudy
_version_ 1756268278341173248