Cover image for Secure multi-party computation
Title:
Secure multi-party computation
Series:
Cryptology and information security series ; v.10
Publication Information:
Amsterdam ; Washington : IOS Press, c2013
Physical Description:
ix, 285 p. ; 25 cm.
ISBN:
9781614991687
General Note:
Includes index

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010323217 QA76.9.A25 S43 2013 Open Access Book Book
Searching...

On Order

Summary

Summary

Secure Multi-Party Computation MPC is one of the most powerful tools developed by modern cryptography it facilitates collaboration among mutually distrusting parties by implementing a virtual trusted party. Despite the remarkable potential of such a tool, and decades of active research in the theoretical cryptography community, it remains a relatively inaccessible and lesser-known concept outside of this field. Only a handful of resources are available to students and researchers wishing to learn more about MPC. The editors of this book have assembled a comprehensive body of basic and advanced material on MPC, authored by


Excerpts

Excerpts

Secure Multi-Party Computation (MPC) is one of the most powerful tools developed by modern cryptography: it facilitates collaboration among mutually distrusting parties by implementing a virtual trusted party. Despite the remarkable potential of such a tool, and decades of active research in the theoretical cryptography community, it remains a relatively inaccessible and lesser-known concept outside of this field. Only a handful of resources are available to students and researchers wishing to learn more about MPC. The editors of this book have assembled a comprehensive body of basic and advanced material on MPC, authored by experts in the field. It will serve as a starting point for those interested in pursuing research related to MPC, whether they are students learning about it for the first time or researchers already working in the area. The book begins with tutorials introducing the concept of MPC and zero-knowledge proofs, an important theoretical platform where many of the concepts central to MPC were shaped. The remaining chapters deal with classical as well as recent MPC protocols, and a variety of related topics. Each chapter is self-contained and can be read independently of the others. Excerpted from Secure Multi-Party Computation All rights reserved by the original copyright owners. Excerpts are provided for display purposes only and may not be reproduced, reprinted or distributed without the written permission of the publisher.