Secure multi-party computation:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Washington
IOS Press
2013
|
Schriftenreihe: | Cryptology and information security series
v. 10 |
Schlagworte: | |
Beschreibung: | Includes author index Title page from PDF version; (IOS Press; viewed on Feb. 26, 2013) |
Beschreibung: | 1 online resource |
ISBN: | 9781614991694 1614991693 1614991685 9781614991687 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV045349941 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2013 |||| o||u| ||||||eng d | ||
020 | |a 9781614991694 |9 978-1-61499-169-4 | ||
020 | |a 1614991693 |9 1-61499-169-3 | ||
020 | |a 1614991685 |9 1-61499-168-5 | ||
020 | |a 9781614991687 |9 978-1-61499-168-7 | ||
035 | |a (ZDB-4-ITC)ocn828560992 | ||
035 | |a (OCoLC)828560992 | ||
035 | |a (DE-599)BVBBV045349941 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8/2 |2 23 | |
245 | 1 | 0 | |a Secure multi-party computation |c edited by Manoj M. Prabhakaran and Amit Sahai |
264 | 1 | |a Amsterdam ; Washington |b IOS Press |c 2013 | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Cryptology and information security series |v v. 10 | |
500 | |a Includes author index | ||
500 | |a Title page from PDF version; (IOS Press; viewed on Feb. 26, 2013) | ||
505 | 8 | |a Secure Multi-Party Computation (MPC) is one of the most powerful tools developed by modern cryptography: it facilitates collaboration among mutually distrusting parties by implementing a virtual trusted party. Despite the remarkable potential of such a tool, and decades of active research in the theoretical cryptography community, it remains a relatively inaccessible and lesser-known concept outside of this field. Only a handful of resources are available to students and researchers wishing to learn more about MPC. The editors of this book have assembled a comprehensive body of basic and advanced material on MPC, authored by experts in the field. It will serve as a starting point for those interested in pursuing research related to MPC, whether they are students learning about it for the first time or researchers already working in the area. The book begins with tutorials introducing the concept of MPC and zero-knowledge proofs, an important theoretical platform where many of the concepts central to MPC were shaped. The remaining chapters deal with classical as well as recent MPC protocols, and a variety of related topics. Each chapter is self-contained and can be read independently of the others | |
650 | 7 | |a COMPUTERS / Security / Cryptography |2 bisacsh | |
650 | 7 | |a Data encryption (Computer science) |2 fast | |
650 | 4 | |a Data encryption (Computer science) | |
700 | 1 | |a Prabhakaran, Manoj |d 1979- |e Sonstige |4 oth | |
700 | 1 | |a Sahai, Amit |e Sonstige |4 oth | |
710 | 2 | |a IOS Press |e Sonstige |4 oth | |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030736595 |
Datensatz im Suchindex
_version_ | 1804179174211977216 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV045349941 |
collection | ZDB-4-ITC |
contents | Secure Multi-Party Computation (MPC) is one of the most powerful tools developed by modern cryptography: it facilitates collaboration among mutually distrusting parties by implementing a virtual trusted party. Despite the remarkable potential of such a tool, and decades of active research in the theoretical cryptography community, it remains a relatively inaccessible and lesser-known concept outside of this field. Only a handful of resources are available to students and researchers wishing to learn more about MPC. The editors of this book have assembled a comprehensive body of basic and advanced material on MPC, authored by experts in the field. It will serve as a starting point for those interested in pursuing research related to MPC, whether they are students learning about it for the first time or researchers already working in the area. The book begins with tutorials introducing the concept of MPC and zero-knowledge proofs, an important theoretical platform where many of the concepts central to MPC were shaped. The remaining chapters deal with classical as well as recent MPC protocols, and a variety of related topics. Each chapter is self-contained and can be read independently of the others |
ctrlnum | (ZDB-4-ITC)ocn828560992 (OCoLC)828560992 (DE-599)BVBBV045349941 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02635nmm a2200421zcb4500</leader><controlfield tag="001">BV045349941</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781614991694</subfield><subfield code="9">978-1-61499-169-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1614991693</subfield><subfield code="9">1-61499-169-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1614991685</subfield><subfield code="9">1-61499-168-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781614991687</subfield><subfield code="9">978-1-61499-168-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn828560992</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)828560992</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045349941</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secure multi-party computation</subfield><subfield code="c">edited by Manoj M. Prabhakaran and Amit Sahai</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam ; Washington</subfield><subfield code="b">IOS Press</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Cryptology and information security series</subfield><subfield code="v">v. 10</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes author index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title page from PDF version; (IOS Press; viewed on Feb. 26, 2013)</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Secure Multi-Party Computation (MPC) is one of the most powerful tools developed by modern cryptography: it facilitates collaboration among mutually distrusting parties by implementing a virtual trusted party. Despite the remarkable potential of such a tool, and decades of active research in the theoretical cryptography community, it remains a relatively inaccessible and lesser-known concept outside of this field. Only a handful of resources are available to students and researchers wishing to learn more about MPC. The editors of this book have assembled a comprehensive body of basic and advanced material on MPC, authored by experts in the field. It will serve as a starting point for those interested in pursuing research related to MPC, whether they are students learning about it for the first time or researchers already working in the area. The book begins with tutorials introducing the concept of MPC and zero-knowledge proofs, an important theoretical platform where many of the concepts central to MPC were shaped. The remaining chapters deal with classical as well as recent MPC protocols, and a variety of related topics. Each chapter is self-contained and can be read independently of the others</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Cryptography</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Prabhakaran, Manoj</subfield><subfield code="d">1979-</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sahai, Amit</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IOS Press</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030736595</subfield></datafield></record></collection> |
id | DE-604.BV045349941 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:15:40Z |
institution | BVB |
isbn | 9781614991694 1614991693 1614991685 9781614991687 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030736595 |
oclc_num | 828560992 |
open_access_boolean | |
physical | 1 online resource |
psigel | ZDB-4-ITC |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | IOS Press |
record_format | marc |
series2 | Cryptology and information security series |
spelling | Secure multi-party computation edited by Manoj M. Prabhakaran and Amit Sahai Amsterdam ; Washington IOS Press 2013 1 online resource txt rdacontent c rdamedia cr rdacarrier Cryptology and information security series v. 10 Includes author index Title page from PDF version; (IOS Press; viewed on Feb. 26, 2013) Secure Multi-Party Computation (MPC) is one of the most powerful tools developed by modern cryptography: it facilitates collaboration among mutually distrusting parties by implementing a virtual trusted party. Despite the remarkable potential of such a tool, and decades of active research in the theoretical cryptography community, it remains a relatively inaccessible and lesser-known concept outside of this field. Only a handful of resources are available to students and researchers wishing to learn more about MPC. The editors of this book have assembled a comprehensive body of basic and advanced material on MPC, authored by experts in the field. It will serve as a starting point for those interested in pursuing research related to MPC, whether they are students learning about it for the first time or researchers already working in the area. The book begins with tutorials introducing the concept of MPC and zero-knowledge proofs, an important theoretical platform where many of the concepts central to MPC were shaped. The remaining chapters deal with classical as well as recent MPC protocols, and a variety of related topics. Each chapter is self-contained and can be read independently of the others COMPUTERS / Security / Cryptography bisacsh Data encryption (Computer science) fast Data encryption (Computer science) Prabhakaran, Manoj 1979- Sonstige oth Sahai, Amit Sonstige oth IOS Press Sonstige oth |
spellingShingle | Secure multi-party computation Secure Multi-Party Computation (MPC) is one of the most powerful tools developed by modern cryptography: it facilitates collaboration among mutually distrusting parties by implementing a virtual trusted party. Despite the remarkable potential of such a tool, and decades of active research in the theoretical cryptography community, it remains a relatively inaccessible and lesser-known concept outside of this field. Only a handful of resources are available to students and researchers wishing to learn more about MPC. The editors of this book have assembled a comprehensive body of basic and advanced material on MPC, authored by experts in the field. It will serve as a starting point for those interested in pursuing research related to MPC, whether they are students learning about it for the first time or researchers already working in the area. The book begins with tutorials introducing the concept of MPC and zero-knowledge proofs, an important theoretical platform where many of the concepts central to MPC were shaped. The remaining chapters deal with classical as well as recent MPC protocols, and a variety of related topics. Each chapter is self-contained and can be read independently of the others COMPUTERS / Security / Cryptography bisacsh Data encryption (Computer science) fast Data encryption (Computer science) |
title | Secure multi-party computation |
title_auth | Secure multi-party computation |
title_exact_search | Secure multi-party computation |
title_full | Secure multi-party computation edited by Manoj M. Prabhakaran and Amit Sahai |
title_fullStr | Secure multi-party computation edited by Manoj M. Prabhakaran and Amit Sahai |
title_full_unstemmed | Secure multi-party computation edited by Manoj M. Prabhakaran and Amit Sahai |
title_short | Secure multi-party computation |
title_sort | secure multi party computation |
topic | COMPUTERS / Security / Cryptography bisacsh Data encryption (Computer science) fast Data encryption (Computer science) |
topic_facet | COMPUTERS / Security / Cryptography Data encryption (Computer science) |
work_keys_str_mv | AT prabhakaranmanoj securemultipartycomputation AT sahaiamit securemultipartycomputation AT iospress securemultipartycomputation |