
Efficient secure two-party protocols: techniques and contructions
Hazay, Carmit
Lindell, Yehuda
The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation. They study both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The aim of the book is to focus on techniques for bothconstructing protocols and proving them secure. In addition, the authors study the different definitional paradigms used and compare the efficiency of protocols achieved under these different definitions. This book is essential for practitioners and researchers in the field of secure protocols, particularly those with a focus on efficiency, and for researchers in the area of privacy-preserving data mining. Essential reading for researchers in the area of secure protocols The authors compare the efficiencies of different protocols Essentialreading for researchers in the area of privacy-preserving data mining INDICE: Introduction.- Definitions.- Semi-honest Adversaries.- Malicious Adversaries.- Covert Adversaries.- Sigma Protocols and Efficient Zero-Knowledge.- Oblivious Transfer and Applications.- The k-th Ranked Element.- Search Problems.- References.- Index
- ISBN: 978-3-642-14302-1
- Editorial: Springer
- Encuadernacion: Cartoné
- Páginas: 265
- Fecha Publicación: 15/09/2010
- Nº Volúmenes: 1
- Idioma: Inglés