Artículos relacionados a Secure Multi-Party Computation Against Passive Adversaries...

Secure Multi-Party Computation Against Passive Adversaries (Synthesis Lectures on Distributed Computing Theory) - Tapa blanda

 
9783031121661: Secure Multi-Party Computation Against Passive Adversaries (Synthesis Lectures on Distributed Computing Theory)

Sinopsis

This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model). The authors present seminal possibility and feasibility results in this model and includes formal security proofs. Even though the passive corruption model may seem very weak, achieving security against such a benign form of adversary turns out to be non-trivial and demands sophisticated and highly advanced techniques. MPC is a fundamental concept, both in cryptography as well as distributed computing. On a very high level, an MPC protocol allows a set of mutually-distrusting parties with their private inputs to jointly and securely perform any computation on their inputs. Examples of such computation include, but not limited to, privacy-preserving data mining; secure e-auction; private set-intersection; and privacy-preserving machine learning. MPC protocols emulate the role of an imaginary, centralized trusted third party (TTP) that collects the inputs of the parties, performs the desired computation, and publishes the result. Due to its powerful abstraction, the MPC problem has been widely studied over the last four decades.

"Sinopsis" puede pertenecer a otra edición de este libro.

Acerca del autor

Ashish Choudhury, Ph.D., is an Associate Professor at the Inter national Institute of Information Technology, Bangalore, India. He received his M.S. and Ph.D. degrees from the Indian Institute of Technology, Madras, India. His research interests include theoretical cryptography, with specialization in cryptographic protocols.
Arpita Patra, Ph.D., is an Associate Professor at the Indian Institute of Science. She received her Ph.D from the Indian Institute of Technology and held post-doctoral positions at the University of Bristol, ETH Zurich, and Aarhus University. Her research interests include cryptography, with a focus on theoretical and practical aspects of secure multiparty computation protocols.

De la contraportada

This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model). The authors present seminal possibility and feasibility results in this model and includes formal security proofs. Even though the passive corruption model may seem very weak, achieving security against such a benign form of adversary turns out to be non-trivial and demands sophisticated and highly advanced techniques. MPC is a fundamental concept, both in cryptography as well as distributed computing. On a very high level, an MPC protocol allows a set of mutually-distrusting parties with their private inputs to jointly and securely perform any computation on their inputs. Examples of such computation include, but not limited to, privacy-preserving data mining; secure e-auction; private set-intersection; and privacy-preserving machine learning. MPC protocols emulate the role of an imaginary, centralized trusted third party (TTP) that collects the inputs of the parties, performs the desired computation, and publishes the result. Due to its powerful abstraction, the MPC problem has been widely studied over the last four decades.

In addition, this book:
  • Includes detailed security proofs for seminal protocols and state-of-theart efficiency improvement techniques
  • Presents protocols against computationally bounded as well as computationally unbounded adversaries
  • Focuses on MPC protocols in the passive corruption model, presents seminal possibility and feasibility results, and features companion video lectures

"Sobre este título" puede pertenecer a otra edición de este libro.

  • EditorialSpringer
  • Año de publicación2023
  • ISBN 10 303112166X
  • ISBN 13 9783031121661
  • EncuadernaciónTapa blanda
  • IdiomaInglés
  • Número de edición1
  • Número de páginas248
  • Contacto del fabricanteno disponible

Comprar nuevo

Ver este artículo

EUR 11,00 gastos de envío desde Alemania a España

Destinos, gastos y plazos de envío

Otras ediciones populares con el mismo título

9783031121630: Secure Multi-Party Computation Against Passive Adversaries (Synthesis Lectures on Distributed Computing Theory)

Edición Destacada

ISBN 10:  3031121635 ISBN 13:  9783031121630
Editorial: Springer-Verlag GmbH, 2022
Tapa dura

Resultados de la búsqueda para Secure Multi-Party Computation Against Passive Adversaries...

Imagen del vendedor

Arpita Patra
ISBN 10: 303112166X ISBN 13: 9783031121661
Nuevo Taschenbuch
Impresión bajo demanda

Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Taschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model). The authorspresent seminal possibility and feasibility results in this model and includes formalsecurity proofs. Even though the passive corruption model may seem very weak,achieving security against such a benign form of adversary turns out to be non-trivialand demands sophisticated and highly advanced techniques. MPC is a fundamentalconcept, both in cryptography as well as distributed computing. On a very high level, an MPC protocol allows a set of mutually-distrusting parties with their privateinputs to jointly and securely perform any computation on their inputs. Examples ofsuch computation include, but not limited to, privacy-preserving data mining; securee-auction; private set-intersection; and privacy-preserving machine learning. MPCprotocols emulate the role of an imaginary, centralized trusted third party (TTP) thatcollects the inputs of the parties, performs the desired computation, and publishes theresult. Due to its powerful abstraction, the MPC problem has been widely studied overthe last four decades. 248 pp. Englisch. Nº de ref. del artículo: 9783031121661

Contactar al vendedor

Comprar nuevo

EUR 58,84
Convertir moneda
Gastos de envío: EUR 11,00
De Alemania a España
Destinos, gastos y plazos de envío

Cantidad disponible: 2 disponibles

Añadir al carrito

Imagen del vendedor

Arpita Patra
ISBN 10: 303112166X ISBN 13: 9783031121661
Nuevo Taschenbuch

Librería: AHA-BUCH GmbH, Einbeck, Alemania

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Taschenbuch. Condición: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model). The authorspresent seminal possibility and feasibility results in this model and includes formalsecurity proofs. Even though the passive corruption model may seem very weak,achieving security against such a benign form of adversary turns out to be non-trivialand demands sophisticated and highly advanced techniques. MPC is a fundamentalconcept, both in cryptography as well as distributed computing. On a very high level, an MPC protocol allows a set of mutually-distrusting parties with their privateinputs to jointly and securely perform any computation on their inputs. Examples ofsuch computation include, but not limited to, privacy-preserving data mining; securee-auction; private set-intersection; and privacy-preserving machine learning. MPCprotocols emulate the role of an imaginary, centralized trusted third party (TTP) thatcollects the inputs of the parties, performs the desired computation, and publishes theresult. Due to its powerful abstraction, the MPC problem has been widely studied overthe last four decades. Nº de ref. del artículo: 9783031121661

Contactar al vendedor

Comprar nuevo

EUR 58,84
Convertir moneda
Gastos de envío: EUR 11,99
De Alemania a España
Destinos, gastos y plazos de envío

Cantidad disponible: 1 disponibles

Añadir al carrito

Imagen del vendedor

Choudhury, Ashish|Patra, Arpita
ISBN 10: 303112166X ISBN 13: 9783031121661
Nuevo Kartoniert / Broschiert

Librería: moluna, Greven, Alemania

Calificación del vendedor: 4 de 5 estrellas Valoración 4 estrellas, Más información sobre las valoraciones de los vendedores

Kartoniert / Broschiert. Condición: New. Nº de ref. del artículo: 1106327511

Contactar al vendedor

Comprar nuevo

EUR 53,17
Convertir moneda
Gastos de envío: EUR 19,49
De Alemania a España
Destinos, gastos y plazos de envío

Cantidad disponible: Más de 20 disponibles

Añadir al carrito

Imagen de archivo

Choudhury, Ashish; Patra, Arpita
Publicado por Springer, 2023
ISBN 10: 303112166X ISBN 13: 9783031121661
Nuevo Tapa blanda

Librería: Ria Christie Collections, Uxbridge, Reino Unido

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Condición: New. In. Nº de ref. del artículo: ria9783031121661_new

Contactar al vendedor

Comprar nuevo

EUR 69,00
Convertir moneda
Gastos de envío: EUR 4,76
De Reino Unido a España
Destinos, gastos y plazos de envío

Cantidad disponible: Más de 20 disponibles

Añadir al carrito

Imagen del vendedor

Arpita Patra
ISBN 10: 303112166X ISBN 13: 9783031121661
Nuevo Taschenbuch

Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Taschenbuch. Condición: Neu. Neuware -This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model). The authors present seminal possibility and feasibility results in this model and includes formal security proofs. Even though the passive corruption model may seem very weak, achieving security against such a benign form of adversary turns out to be non-trivial and demands sophisticated and highly advanced techniques. MPC is a fundamental concept, both in cryptography as well as distributed computing. On a very high level, an MPC protocol allows a set of mutually-distrusting parties with their private inputs to jointly and securely perform any computation on their inputs. Examples of such computation include, but not limited to, privacy-preserving data mining; secure e-auction; private set-intersection; and privacy-preserving machine learning. MPC protocols emulate the role of an imaginary, centralized trusted third party (TTP) that collects the inputs of the parties, performs the desired computation, and publishes the result. Due to its powerful abstraction, the MPC problem has been widely studied over the last four decades.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 248 pp. Englisch. Nº de ref. del artículo: 9783031121661

Contactar al vendedor

Comprar nuevo

EUR 58,84
Convertir moneda
Gastos de envío: EUR 35,00
De Alemania a España
Destinos, gastos y plazos de envío

Cantidad disponible: 2 disponibles

Añadir al carrito

Imagen de archivo

Choudhury, Ashish/ Patra, Arpita
Publicado por Springer-Nature New York Inc, 2023
ISBN 10: 303112166X ISBN 13: 9783031121661
Nuevo Paperback

Librería: Revaluation Books, Exeter, Reino Unido

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Paperback. Condición: Brand New. 244 pages. 9.45x6.61x0.52 inches. In Stock. Nº de ref. del artículo: x-303112166X

Contactar al vendedor

Comprar nuevo

EUR 87,71
Convertir moneda
Gastos de envío: EUR 11,96
De Reino Unido a España
Destinos, gastos y plazos de envío

Cantidad disponible: 2 disponibles

Añadir al carrito