Basic constructions of secure multiparty computation

P. Laud, A. Pankova, L. Kamm, M.G. Veeningen

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureHoofdstukAcademic

2 Citaten (Scopus)
11 Downloads (Pure)

Samenvatting

In this chapter, we formally define multiparty computation tasks and the security of protocols realizing them. We give a broad presentation of the existing constructions of secure multiparty computation (SMC) protocols and explain why they are correct and secure. We discuss the different environmental aspects of SMC protocols and explain the requirements that are necessary and sufficient for their existence.
Originele taal-2Engels
TitelApplications of Secure Multiparty Computation
RedacteurenP. Laud, L. Kamm
Plaats van productieAmsterdam
UitgeverijIOS Press
Pagina's1-25
ISBN van geprinte versie978-1-61499-531-9
DOI's
StatusGepubliceerd - 2015

Publicatie series

NaamCryptology and Information Security Series
Volume13

Citeer dit