Efficient secure two-party protocols: techniques and contructions
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2010
|
Schriftenreihe: | Information security and cryptography
|
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | XIII, 263 S. graph. Darst. |
ISBN: | 9783642143021 9783642143038 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV037219009 | ||
003 | DE-604 | ||
005 | 20110217 | ||
007 | t | ||
008 | 110210s2010 gw d||| |||| 00||| eng d | ||
015 | |a 10,N24 |2 dnb | ||
015 | |a 11,A02 |2 dnb | ||
016 | 7 | |a 1003339530 |2 DE-101 | |
020 | |a 9783642143021 |c Pp. : EUR 85.55 (freier Pr.) |9 978-3-642-14302-1 | ||
020 | |a 9783642143038 |9 978-3-642-14303-8 | ||
024 | 3 | |a 9783642143021 | |
028 | 5 | 2 | |a 12817351 |
035 | |a (OCoLC)845778411 | ||
035 | |a (DE-599)DNB1003339530 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-355 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a ST 201 |0 (DE-625)143612: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
100 | 1 | |a Hazay, Carmit |e Verfasser |0 (DE-588)1031887504 |4 aut | |
245 | 1 | 0 | |a Efficient secure two-party protocols |b techniques and contructions |c Carmit Hazay ; Yehuda Lindell |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2010 | |
300 | |a XIII, 263 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Information security and cryptography | |
500 | |a Literaturangaben | ||
650 | 0 | 7 | |a Mehrparteienprotokoll |0 (DE-588)4480818-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Mehrparteienprotokoll |0 (DE-588)4480818-5 |D s |
689 | 0 | 1 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Lindell, Yehuda |d 1971- |e Verfasser |0 (DE-588)1031893946 |4 aut | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3489740&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=021132930&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-021132930 |
Datensatz im Suchindex
_version_ | 1805095387386609664 |
---|---|
adam_text |
IMAGE 1
CONTENTS
PART I INTRODUCTION AND DEFINITIONS 1 INTRODUCTION 3
1.1 SECURE MULTIPARTY COMPUTATION - BACKGROUND 3
1.2 THE GMW PROTOCOL FOR SECURE COMPUTATION 11
1.3 A ROADMAP TO THE BOOK 13
1.3.1 PART I - INTRODUCTION AND DEFINITIONS 13
1.3.2 PART II - GENERAL CONSTRUCTIONS 15
1.3.3 PART III - SPECIFIC CONSTRUCTIONS 17
2 DEFINITIONS 19
2.1 PRELIMINARIES 19
2.2 SECURITY IN THE PRESENCE OF SEMI-HONEST ADVERSARIES 20 2.3 SECURITY
IN THE PRESENCE OF MALICIOUS ADVERSARIES 23
2.3.1 THE DEFINITION 24
2.3.2 EXTENSION TO REACTIVE FUNCTIONALITIES 25
2.3.3 MALICIOUS VERSUS SEMI-HONEST ADVERSARIES 26
2.4 SECURITY IN THE PRESENCE OF COVERT ADVERSARIES 30
2.4.1 MOTIVATION 30
2.4.2 THE ACTUAL DEFINITION 33
2.4.3 CHEATING AND ABORTING 35
2.4.4 RELATIONS BETWEEN SECURITY MODELS 36
2.5 RESTRICTED VERSUS GENERAL FUNCTIONALITIES 38
2.5.1 DETERMINISTIC FUNCTIONALITIES 39
2.5.2 SINGLE-OUTPUT FUNCTIONALITIES 39
2.5.3 NON-REACTIVE FUNCTIONALITIES 41
2.6 NON-SIMULATION-BASED DEFINITIONS 42
2.6.1 PRIVACY ONLY 42
2.6.2 ONE-SIDED SIMULATABILITY 45
2.7 SEQUENTIAL COMPOSITION - SIMULATION-BASED DEFINITIONS 46
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1003339530
DIGITALISIERT DURCH
IMAGE 2
XII CONTENTS
PART II GENERAL CONSTRUCTIONS
3 SEMI-HONEST ADVERSARIES 53
3.1 AN OVERVIEW OF THE PROTOCOL 53
3.2 TOOLS 57
3.2.1 "SPECIAL" PRIVATE-KEY ENCRYPTION 57
3.2.2 OBLIVIOUS TRANSFER 61
3.3 THE GARBLED-CIRCUIT CONSTRUCTION 63
3.4 YAO'S TWO-PARTY PROTOCOL 66
3.5 EFFICIENCY OF THE PROTOCOL 78
4 MALICIOUS ADVERSARIES 81
4.1 AN OVERVIEW OF THE PROTOCOL 81
4.1.1 HIGH-LEVEL PROTOCOL DESCRIPTION 82
4.1.2 CHECKS FOR CORRECTNESS AND CONSISTENCY 84
4.2 THE PROTOCOL 89
4.3 PROOF OF SECURITY 93
4.3.1 SECURITY AGAINST A MALICIOUS PI 93
4.3.2 SECURITY AGAINST A MALICIOUS P 2 99
4.4 EFFICIENT IMPLEMENTATION OF THE DIFFERENT PRIMITIVES 105 4.5
EFFICIENCY OF THE PROTOCOL 106
4.6 SUGGESTIONS FOR FURTHER READING 107
5 COVERT ADVERSARIES 109
5.1 OBLIVIOUS TRANSFER 109
5.1.1 THE BASIC PROTOCOL I LL
5.1.2 EXTENSIONS 119
5.2 SECURE TWO-PARTY COMPUTATION 121
5.2.1 OVERVIEW OF THE PROTOCOL 122
5.2.2 THE PROTOCOL FOR TWO-PARTY COMPUTATION 124
5.2.3 NON-HALTING DETECTION ACCURACY 141
5.3 EFFICIENCY OF THE PROTOCOL 143
PART III SPECIFIC CONSTRUCTIONS
6 SIGMA PROTOCOLS AND EFFICIENT ZERO-KNOWLEDGE 147
6.1 AN EXAMPLE 147
6.2 DEFINITIONS AND PROPERTIES 149
6.3 PROOFS OF KNOWLEDGE 153
6.4 PROVING COMPOUND STATEMENTS 158
6.5 ZERO-KNOWLEDGE FROM U-PROTOCOLS 160
6.5.1 THE BASIC ZERO-KNOWLEDGE CONSTRUCTION 161
6.5.2 ZERO-KNOWLEDGE PROOFS OF KNOWLEDGE 164
6.5.3 THE ZKPOK IDEAL FUNCTIONALITY 167
6.6 EFFICIENT COMMITMENT SCHEMES FROM -E-PROTOCOLS 173 6.7 SUMMARY 175
IMAGE 3
CONTENTS XIII
7 OBLIVIOUS TRANSFER AND APPLICATIONS 177
7.1 NOTATIONAL CONVENTIONS FOR PROTOCOLS 178
7.2 OBLIVIOUS TRANSFER - PRIVACY ONLY 178
7.2.1 A PROTOCOL BASED ON THE DDH ASSUMPTION 178
7.2.2 A PROTOCOL FROM HOMOMORPHIC ENCRYPTION 182 7.3 OBLIVIOUS TRANSFER
- ONE-SIDED SIMULATION 185
7.4 OBLIVIOUS TRANSFER - FULL SIMULATION 188
7.4.1 L-OUT-OF-2 OBLIVIOUS TRANSFER 188
7.4.2 BATCH OBLIVIOUS TRANSFER 196
7.5 ANOTHER OBLIVIOUS TRANSFER - FULL SIMULATION 201
7.6 SECURE PSEUDORANDOM FUNCTION EVALUATION 202
7.6.1 PSEUDORANDOM FUNCTION - PRIVACY ONLY 203
7.6.2 PSEUDORANDOM FUNCTION - FULL SIMULATION 209
7.6.3 COVERT AND ONE-SIDED SIMULATION 211
7.6.4 BATCH PSEUDORANDOM FUNCTION EVALUATION 212
8 THE FCTH-RANKED ELEMENT 213
8.1 BACKGROUND 213
8.1.1 A PROTOCOL FOR FINDING THE MEDIAN 214
8.1.2 REDUCING THE FCTH-RANKED ELEMENT TO THE MEDIAN 216 8.2 COMPUTING
THE MEDIAN - SEMI-HONEST 218
8.3 COMPUTING THE MEDIAN - MALICIOUS 221
8.3.1 THE REACTIVE GREATER-THAN FUNCTIONALITY 221
8.3.2 THE PROTOCOL 223
9 SEARCH PROBLEMS 227
9.1 BACKGROUND 228
9.2 SECURE DATABASE SEARCH 229
9.2.1 SECURELY REALIZING BASIC DATABASE SEARCH 231
9.2.2 SECURELY REALIZING FULL DATABASE SEARCH 236
9.2.3 COVERT AND ONE-SIDED SIMULATION 237
9.3 SECURE DOCUMENT SEARCH 238
9.4 IMPLEMENTING FUNCTIONALITY J^PRP WITH SMARTCARDS 242 9.4.1 STANDARD
SMARTCARD FUNCTIONALITY AND SECURITY 243 9.4.2 IMPLEMENTING ^ C P RP
WITH SMARTCARDS 246
9.5 SECURE TEXT SEARCH (PATTERN MATCHING) 248
9.5.1 INDEXED IMPLEMENTATION FOR NAOR-REINGOLD 249 9.5.2 THE PROTOCOL
FOR SECURE TEXT SEARCH 252
REFERENCES 255
INDEX 261 |
any_adam_object | 1 |
author | Hazay, Carmit Lindell, Yehuda 1971- |
author_GND | (DE-588)1031887504 (DE-588)1031893946 |
author_facet | Hazay, Carmit Lindell, Yehuda 1971- |
author_role | aut aut |
author_sort | Hazay, Carmit |
author_variant | c h ch y l yl |
building | Verbundindex |
bvnumber | BV037219009 |
classification_rvk | ST 201 |
ctrlnum | (OCoLC)845778411 (DE-599)DNB1003339530 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV037219009</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20110217</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">110210s2010 gw d||| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">10,N24</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">11,A02</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1003339530</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642143021</subfield><subfield code="c">Pp. : EUR 85.55 (freier Pr.)</subfield><subfield code="9">978-3-642-14302-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642143038</subfield><subfield code="9">978-3-642-14303-8</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642143021</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">12817351</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)845778411</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1003339530</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 201</subfield><subfield code="0">(DE-625)143612:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hazay, Carmit</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1031887504</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Efficient secure two-party protocols</subfield><subfield code="b">techniques and contructions</subfield><subfield code="c">Carmit Hazay ; Yehuda Lindell</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIII, 263 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Information security and cryptography</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mehrparteienprotokoll</subfield><subfield code="0">(DE-588)4480818-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Mehrparteienprotokoll</subfield><subfield code="0">(DE-588)4480818-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lindell, Yehuda</subfield><subfield code="d">1971-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1031893946</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3489740&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=021132930&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-021132930</subfield></datafield></record></collection> |
id | DE-604.BV037219009 |
illustrated | Illustrated |
indexdate | 2024-07-20T10:58:28Z |
institution | BVB |
isbn | 9783642143021 9783642143038 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-021132930 |
oclc_num | 845778411 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR |
owner_facet | DE-355 DE-BY-UBR |
physical | XIII, 263 S. graph. Darst. |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Springer |
record_format | marc |
series2 | Information security and cryptography |
spelling | Hazay, Carmit Verfasser (DE-588)1031887504 aut Efficient secure two-party protocols techniques and contructions Carmit Hazay ; Yehuda Lindell Berlin [u.a.] Springer 2010 XIII, 263 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Information security and cryptography Literaturangaben Mehrparteienprotokoll (DE-588)4480818-5 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf Mehrparteienprotokoll (DE-588)4480818-5 s Sicherheitsprotokoll (DE-588)4709127-7 s DE-604 Lindell, Yehuda 1971- Verfasser (DE-588)1031893946 aut X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=3489740&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=021132930&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Hazay, Carmit Lindell, Yehuda 1971- Efficient secure two-party protocols techniques and contructions Mehrparteienprotokoll (DE-588)4480818-5 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
subject_GND | (DE-588)4480818-5 (DE-588)4709127-7 |
title | Efficient secure two-party protocols techniques and contructions |
title_auth | Efficient secure two-party protocols techniques and contructions |
title_exact_search | Efficient secure two-party protocols techniques and contructions |
title_full | Efficient secure two-party protocols techniques and contructions Carmit Hazay ; Yehuda Lindell |
title_fullStr | Efficient secure two-party protocols techniques and contructions Carmit Hazay ; Yehuda Lindell |
title_full_unstemmed | Efficient secure two-party protocols techniques and contructions Carmit Hazay ; Yehuda Lindell |
title_short | Efficient secure two-party protocols |
title_sort | efficient secure two party protocols techniques and contructions |
title_sub | techniques and contructions |
topic | Mehrparteienprotokoll (DE-588)4480818-5 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
topic_facet | Mehrparteienprotokoll Sicherheitsprotokoll |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3489740&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=021132930&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT hazaycarmit efficientsecuretwopartyprotocolstechniquesandcontructions AT lindellyehuda efficientsecuretwopartyprotocolstechniquesandcontructions |