Generalized corruption models in secure multi-party computation:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Abschlussarbeit Buch |
Sprache: | English |
Veröffentlicht: |
Konstanz
Hartung-Gorre
2010
|
Ausgabe: | 1. ed. |
Schriftenreihe: | ETH series in information security and cryptography
10 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | 180 S. graph. Darst. 21 cm |
ISBN: | 9783866283381 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV037295600 | ||
003 | DE-604 | ||
005 | 20110513 | ||
007 | t | ||
008 | 110323s2010 gw d||| m||| 00||| eng d | ||
015 | |a 10,N31 |2 dnb | ||
015 | |a 11,A05 |2 dnb | ||
016 | 7 | |a 1005005729 |2 DE-101 | |
020 | |a 9783866283381 |c kart. : EUR 64.00, sfr 125.20 (freier Pr.) |9 978-3-86628-338-1 | ||
024 | 3 | |a 9783866283381 | |
035 | |a (OCoLC)699737591 | ||
035 | |a (DE-599)DNB1005005729 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BW | ||
049 | |a DE-473 |a DE-12 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
084 | |a 24,1 |2 ssgn | ||
100 | 1 | |a Zikas, Vassilis |e Verfasser |0 (DE-588)141973935 |4 aut | |
245 | 1 | 0 | |a Generalized corruption models in secure multi-party computation |c Vassilis Zikas |
250 | |a 1. ed. | ||
264 | 1 | |a Konstanz |b Hartung-Gorre |c 2010 | |
300 | |a 180 S. |b graph. Darst. |c 21 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a ETH series in information security and cryptography |v 10 | |
502 | |a Zugl.: Zürich, Techn. Hochsch., Diss., 2010 | ||
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Byzantinische Einigung |0 (DE-588)4304923-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mehrparteienprotokoll |0 (DE-588)4480818-5 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
689 | 0 | 0 | |a Mehrparteienprotokoll |0 (DE-588)4480818-5 |D s |
689 | 0 | 1 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 2 | |a Byzantinische Einigung |0 (DE-588)4304923-0 |D s |
689 | 0 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
830 | 0 | |a ETH series in information security and cryptography |v 10 |w (DE-604)BV023116009 |9 10 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=021208114&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-021208114 |
Datensatz im Suchindex
_version_ | 1804143931812741120 |
---|---|
adam_text | IMAGE 1
CONTENTS
1 INTRODUCTION 13
1.1 MULTI-PARTY COMPUTATION 14
1.2 MISBEHAVIOR AND ADVERSARY 15
1.3 REACTIVE AND NON-REACTIVE COMPUTATION: (MPC AND SEE) . . .. 20
1.4 BYZANTINE AGREEMENT 21
1.5 TYPICAL ASSUMPTIONS 21
1.6 RELEVANT LITERATURE 24
1.7 CONTRIBUTIONS OF THIS THESIS 26
2 SETTING THE LANDSCAPE 29
2.1 SECURITY OF MULTI-PARTY PROTOCOLS 29
2.2 CORRUPTIONS AND GUARANTEES 32
2.3 GENERAL ADVERSARY 33
2.4 CHARACTERIZING THE PLAYERS 36
2.5 THE COMPUTATION 36
2.6 THE NETWORK 37
2.7 COMPUTATIONAL ASSUMPTIONS 38
Z8 DIGITAL SIGNATURES AND COMMITMENTS 38
9
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1005005729
DIGITALISIERT DURCH
IMAGE 2
I MIXED GENERAL ADVERSARY 41
3 MULTI-PARTY COMPUTATION 43
3.1 OUTLINE 45
3.2 MPC AND/VS. SEE 45
3.3 PASSIVE/FAIL ADVERSARY WITH PERFECT SECURITY 48
3.4 ADDING ACTIVE CORRUPTION 59
3.5 STATISTICAL SECURITY 67
3.6 COMPUTATIONAL SECURITY 82
3.7 SUMMARIZING 85
4 BYZANTINE AGREEMENT 87
4.1 OUTLINE 88
4.2 CONSENSUS AND BROADCAST 88
4.3 PERFECT SECURITY (NO SETUP) 93
4.4 STATISTICAL AND COMPUTATIONAL SECURITY (WITH SETUP) 102
4.5 COMPOSABILITY CONSIDERATIONS 119
II ALTERNATIVE CORRUPTION TYPES 123
5 OMISSION-CORRUPTION 125
5.1 OUTLINE 126
5.2 THE FUNCTIONALITY 126
5.3 THE SEE PROTOCOL- A HIGH-LEVEL DESCRIPTION 128
5.4 ENGINEERING THE NETWORK 131
5.5 DETECTABLE SEE 139
5.6 ROBUSTSFE 140
5.7 NECESSITY 145
5.8 (REACTIVEJMPC 147
5.9 STATISTICAL AND COMPUTATIONAL SECURITY 147
10
IMAGE 3
ILL ADAPTIVE CORRUPTION 153
6 ADAPTIVELY SECURE BROADCAST 155
6.1 OUTLINE 156
6.2 (INJCOMPOSABILITY OF THE PROPERTY-BASED DEFINITION 156 6.3 THEMODEL
158
6.4 THE BROADCAST FUNCTIONALITY 159
6.5 PERFECT SECURITY (WITHOUT SETUP) 163
6.6 STATISTICAL AND COMPUTATIONAL SECURITY (WITH SETUP) 164 6.7
OTHERMODELS 172
11
|
any_adam_object | 1 |
author | Zikas, Vassilis |
author_GND | (DE-588)141973935 |
author_facet | Zikas, Vassilis |
author_role | aut |
author_sort | Zikas, Vassilis |
author_variant | v z vz |
building | Verbundindex |
bvnumber | BV037295600 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)699737591 (DE-599)DNB1005005729 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1. ed. |
format | Thesis Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02181nam a2200541 cb4500</leader><controlfield tag="001">BV037295600</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20110513 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">110323s2010 gw d||| m||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">10,N31</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">11,A05</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1005005729</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783866283381</subfield><subfield code="c">kart. : EUR 64.00, sfr 125.20 (freier Pr.)</subfield><subfield code="9">978-3-86628-338-1</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783866283381</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)699737591</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1005005729</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BW</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-12</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">24,1</subfield><subfield code="2">ssgn</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Zikas, Vassilis</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)141973935</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Generalized corruption models in secure multi-party computation</subfield><subfield code="c">Vassilis Zikas</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Konstanz</subfield><subfield code="b">Hartung-Gorre</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">180 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">21 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">ETH series in information security and cryptography</subfield><subfield code="v">10</subfield></datafield><datafield tag="502" ind1=" " ind2=" "><subfield code="a">Zugl.: Zürich, Techn. Hochsch., Diss., 2010</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Byzantinische Einigung</subfield><subfield code="0">(DE-588)4304923-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mehrparteienprotokoll</subfield><subfield code="0">(DE-588)4480818-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Mehrparteienprotokoll</subfield><subfield code="0">(DE-588)4480818-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Byzantinische Einigung</subfield><subfield code="0">(DE-588)4304923-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">ETH series in information security and cryptography</subfield><subfield code="v">10</subfield><subfield code="w">(DE-604)BV023116009</subfield><subfield code="9">10</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=021208114&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-021208114</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV037295600 |
illustrated | Illustrated |
indexdate | 2024-07-09T22:55:30Z |
institution | BVB |
isbn | 9783866283381 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-021208114 |
oclc_num | 699737591 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-12 |
owner_facet | DE-473 DE-BY-UBG DE-12 |
physical | 180 S. graph. Darst. 21 cm |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Hartung-Gorre |
record_format | marc |
series | ETH series in information security and cryptography |
series2 | ETH series in information security and cryptography |
spelling | Zikas, Vassilis Verfasser (DE-588)141973935 aut Generalized corruption models in secure multi-party computation Vassilis Zikas 1. ed. Konstanz Hartung-Gorre 2010 180 S. graph. Darst. 21 cm txt rdacontent n rdamedia nc rdacarrier ETH series in information security and cryptography 10 Zugl.: Zürich, Techn. Hochsch., Diss., 2010 Computersicherheit (DE-588)4274324-2 gnd rswk-swf Byzantinische Einigung (DE-588)4304923-0 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Mehrparteienprotokoll (DE-588)4480818-5 gnd rswk-swf (DE-588)4113937-9 Hochschulschrift gnd-content Mehrparteienprotokoll (DE-588)4480818-5 s Kryptologie (DE-588)4033329-2 s Byzantinische Einigung (DE-588)4304923-0 s Computersicherheit (DE-588)4274324-2 s DE-604 ETH series in information security and cryptography 10 (DE-604)BV023116009 10 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=021208114&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Zikas, Vassilis Generalized corruption models in secure multi-party computation ETH series in information security and cryptography Computersicherheit (DE-588)4274324-2 gnd Byzantinische Einigung (DE-588)4304923-0 gnd Kryptologie (DE-588)4033329-2 gnd Mehrparteienprotokoll (DE-588)4480818-5 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4304923-0 (DE-588)4033329-2 (DE-588)4480818-5 (DE-588)4113937-9 |
title | Generalized corruption models in secure multi-party computation |
title_auth | Generalized corruption models in secure multi-party computation |
title_exact_search | Generalized corruption models in secure multi-party computation |
title_full | Generalized corruption models in secure multi-party computation Vassilis Zikas |
title_fullStr | Generalized corruption models in secure multi-party computation Vassilis Zikas |
title_full_unstemmed | Generalized corruption models in secure multi-party computation Vassilis Zikas |
title_short | Generalized corruption models in secure multi-party computation |
title_sort | generalized corruption models in secure multi party computation |
topic | Computersicherheit (DE-588)4274324-2 gnd Byzantinische Einigung (DE-588)4304923-0 gnd Kryptologie (DE-588)4033329-2 gnd Mehrparteienprotokoll (DE-588)4480818-5 gnd |
topic_facet | Computersicherheit Byzantinische Einigung Kryptologie Mehrparteienprotokoll Hochschulschrift |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=021208114&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV023116009 |
work_keys_str_mv | AT zikasvassilis generalizedcorruptionmodelsinsecuremultipartycomputation |