Secure multiparty computation and secret sharing:
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York, NY
Cambridge University Press
2015
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | x, 373 Seiten |
ISBN: | 9781107043053 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV042907850 | ||
003 | DE-604 | ||
005 | 20230523 | ||
007 | t | ||
008 | 151006s2015 |||| 00||| eng d | ||
010 | |a 2015002282 | ||
020 | |a 9781107043053 |c hardback |9 978-1-107-04305-3 | ||
035 | |a (OCoLC)918139909 | ||
035 | |a (DE-599)GBV824770471 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-29T |a DE-355 |a DE-384 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Cramer, Ronald J. F. |d 1968- |e Verfasser |0 (DE-588)174107587 |4 aut | |
245 | 1 | 0 | |a Secure multiparty computation and secret sharing |c Ronald Cramer, Ivan Bjerre Damgård, Jesper Buus Nielsen |
264 | 1 | |a New York, NY |b Cambridge University Press |c 2015 | |
300 | |a x, 373 Seiten | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Damgård, Ivan B. |e Verfasser |0 (DE-588)112774180 |4 aut | |
700 | 1 | |a Nielsen, Jesper Buus |e Verfasser |0 (DE-588)1078045542 |4 aut | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028335761&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-028335761 |
Datensatz im Suchindex
_version_ | 1804175203864936448 |
---|---|
adam_text | Contents
Preface page ix
Part I Secure Multiparty Computation
1 Introduction 3
1.1 Private Information, Uses and Misuses 3
1.2 Do We 1 lave to Trust Someone? 5
1.3 Multiparty Computation 6
2 Preliminaries 14
2.1 Basic Notation 14
2.2 Algorithms 16
2.3 Families of Random Variables 20
2.4 Interactive Systems 24
2.5 Public-Key Cryptosystems 30
3 MPC Protocols with Passive Security 32
3.1 Introduction 32
3.2 Secret Sharing 32
3.3 A Passively Secure Protocol 36
3.4 Optimality of the Corruption Bound 47
4 Models 51
4.1 Introduction 51
4.2 The UC Model 59
4.3 Adversaries and Their Powers 79
4.4 Some Ideal Functionalities 85
4.5 Adaptive versus Static Security Revisited 93
4.6 Notes 102
5 Information-Theoretic Robust MPC Protocols 104
5.1 Introduction 104
v
VI
( ontents
5.2 Model for Homomorphic C ommitments and Some Auxiliary
Protocols ^
5.3 A Secure Function Hvaluation Protocol for Active Adversaries 1 1 3
5.4 Realization of Homomorphic Commitments 1
5.5 Final Results and Optimality of Corruption Hounds I 33
5.6 Notes
6 MFC from General Linear Secret-Sharing Schemes 139
6.1 Introduction 1 ^
6.2 General Adversary Structures 13l
6.3 Linear Secret Sharing 141
6.4 A Passively Secure Protocol 14N
6.5 Actively Secure Protocols 149
6.6 Notes 13 7
7 Cryptographic MFC Protocols 159
7.1 Introduction 159
7.2 The Case of Honest Majority 159
7.3 The Case of Dishonest Majority 161
8 Some Techniques for Efficiency Improvements 163
8.1 Introduction 163
8.2 Circuit Randomization 163
8.3 Hyperinvertible Matrices 165
8.4 Packed Secret Sharing 171
8.5 Information-Theoretic Protocols in the Preprocessing Model 1 73
8.6 Open Problems in Complexity of MPC 1 79
8.7 Notes | xo
9 Applications of MPC j x0
9.1 A Double Auction I x~
9.2 Zero-Knowledge Proofs via MPC in the Head 191
9.3 Notes I w
Part II Secret Sharing
10 Algebraic Preliminaries
10.1 Introduction
10.2 Groups, Rings, Fields ^()4
10.3 Modules and Vector Spaces ^
10.4 Quotients
op
10.5 Direct Products and Direct Sums ~ ~
10.6 Basic Field Theory ^ ^
y 215
Contents
10.7 Algebraic Number Fields 220
10.8 Algebras 224
10.9 Tensor Products 229
11 Secret Sharing 236
11.1 introduction 236
11.2 Notation 237
11.3 Interpolation Codes 238
11.4 Secret Sharing from interpolation Codes 239
11.5 Hxistence of Interpolation Codes 242
11.6 Alternative Proofs of Lagrange’s Theorem 245
11.7 Using the Point at Infinity 247
11.8 Secret Recovery in the Presence of Corruptions 249
11.9 f ormal Definition of Secret Sharing 253
11.10 Linear Secret-Sharing Schemes 260
11.11 Generalizations of Linear Secret Sharing 267
11.12 Bounds for Secret Sharing 273
11.13 interpolation over Algebraic Number Fields and Black Box
Secret Sharing 282
12 Arithmetic Codices 299
12.1 Introduction 299
12.2 The Codex Definition 299
12.3 Equivalent Definitions 306
12.4 Basic Constructions 311
12.5 Applications 314
12.6 Basic Limitations on Codices 320
12.7 Towers of Algebraic Function Fields 327
12.8 Asymptotically Good Arithmetic Secret-Sharing Schemes 342
12.9 The Torsion Limit and Its Applications 348
12.10 Outlook 352
List of A Igorithms 355
List of Exercises 357
References 359
Index 369
|
any_adam_object | 1 |
author | Cramer, Ronald J. F. 1968- Damgård, Ivan B. Nielsen, Jesper Buus |
author_GND | (DE-588)174107587 (DE-588)112774180 (DE-588)1078045542 |
author_facet | Cramer, Ronald J. F. 1968- Damgård, Ivan B. Nielsen, Jesper Buus |
author_role | aut aut aut |
author_sort | Cramer, Ronald J. F. 1968- |
author_variant | r j f c rjf rjfc i b d ib ibd j b n jb jbn |
building | Verbundindex |
bvnumber | BV042907850 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)918139909 (DE-599)GBV824770471 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01539nam a2200361 c 4500</leader><controlfield tag="001">BV042907850</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230523 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">151006s2015 |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2015002282</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781107043053</subfield><subfield code="c">hardback</subfield><subfield code="9">978-1-107-04305-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)918139909</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV824770471</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-384</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cramer, Ronald J. F.</subfield><subfield code="d">1968-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)174107587</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secure multiparty computation and secret sharing</subfield><subfield code="c">Ronald Cramer, Ivan Bjerre Damgård, Jesper Buus Nielsen</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Cambridge University Press</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">x, 373 Seiten</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Damgård, Ivan B.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)112774180</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nielsen, Jesper Buus</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1078045542</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028335761&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028335761</subfield></datafield></record></collection> |
id | DE-604.BV042907850 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:12:34Z |
institution | BVB |
isbn | 9781107043053 |
language | English |
lccn | 2015002282 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028335761 |
oclc_num | 918139909 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-29T DE-355 DE-BY-UBR DE-384 |
owner_facet | DE-473 DE-BY-UBG DE-29T DE-355 DE-BY-UBR DE-384 |
physical | x, 373 Seiten |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Cambridge University Press |
record_format | marc |
spelling | Cramer, Ronald J. F. 1968- Verfasser (DE-588)174107587 aut Secure multiparty computation and secret sharing Ronald Cramer, Ivan Bjerre Damgård, Jesper Buus Nielsen New York, NY Cambridge University Press 2015 x, 373 Seiten txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s DE-604 Damgård, Ivan B. Verfasser (DE-588)112774180 aut Nielsen, Jesper Buus Verfasser (DE-588)1078045542 aut Digitalisierung UB Bamberg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028335761&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Cramer, Ronald J. F. 1968- Damgård, Ivan B. Nielsen, Jesper Buus Secure multiparty computation and secret sharing Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4274324-2 |
title | Secure multiparty computation and secret sharing |
title_auth | Secure multiparty computation and secret sharing |
title_exact_search | Secure multiparty computation and secret sharing |
title_full | Secure multiparty computation and secret sharing Ronald Cramer, Ivan Bjerre Damgård, Jesper Buus Nielsen |
title_fullStr | Secure multiparty computation and secret sharing Ronald Cramer, Ivan Bjerre Damgård, Jesper Buus Nielsen |
title_full_unstemmed | Secure multiparty computation and secret sharing Ronald Cramer, Ivan Bjerre Damgård, Jesper Buus Nielsen |
title_short | Secure multiparty computation and secret sharing |
title_sort | secure multiparty computation and secret sharing |
topic | Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028335761&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT cramerronaldjf securemultipartycomputationandsecretsharing AT damgardivanb securemultipartycomputationandsecretsharing AT nielsenjesperbuus securemultipartycomputationandsecretsharing |