Protecting privacy through homomorphic encryption:
This book summarizes recent inventions, provides guidelines and recommendations, and demonstrates many practical applications of homomorphic encryption. This collection of papers represents the combined wisdom of the community of leading experts on homomorphic encryption. In the past 3 years, a glob...
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cham, Switzerland
Springer Nature
2022
|
Ausgabe: | corrected publication |
Schlagworte: | |
Zusammenfassung: | This book summarizes recent inventions, provides guidelines and recommendations, and demonstrates many practical applications of homomorphic encryption. This collection of papers represents the combined wisdom of the community of leading experts on homomorphic encryption. In the past 3 years, a global community consisting of researchers in academia, industry, and government, has been working closely to standardize homomorphic encryption. This is the first publication of whitepapers created by these experts that comprehensively describes the scientific inventions, presents a concrete security analysis, and broadly discusses applicable use scenarios and markets. This book also features a collection of privacy-preserving machine learning applications powered by homomorphic encryption designed by groups of top graduate students worldwide at the Private AI Bootcamp hosted by Microsoft Research. The volume aims to connect non-expert readers with this important new cryptographic technology in an accessible and actionable way. Readers who have heard good things about homomorphic encryption but are not familiar with the details will find this book full of inspiration. Readers who have preconceived biases based on out-of-date knowledge will see the recent progress made by industrial and academic pioneers on optimizing and standardizing this technology. A clear picture of how homomorphic encryption works, how to use it to solve real-world problems, and how to efficiently strengthen privacy protection, will naturally become clear. |
Beschreibung: | xvi, 176, C1 Seiten Illustrationen |
ISBN: | 9783030772864 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV049037373 | ||
003 | DE-604 | ||
005 | 20230727 | ||
007 | t | ||
008 | 230706s2022 sz a||| |||| 00||| eng d | ||
020 | |a 9783030772864 |9 978-3-030-77286-4 | ||
035 | |a (OCoLC)1322799308 | ||
035 | |a (DE-599)KXP1805843982 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a sz |c XA-CH | ||
049 | |a DE-1102 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a 94A60 |2 msc | ||
084 | |a 68-06 |2 msc | ||
084 | |a 94-06 |2 msc | ||
084 | |a 00B25 |2 msc | ||
084 | |a 68P25 |2 msc | ||
245 | 1 | 0 | |a Protecting privacy through homomorphic encryption |c Kristin Lauter, Wei Dai, Kim Laine (editors) |
250 | |a corrected publication | ||
264 | 1 | |a Cham, Switzerland |b Springer Nature |c 2022 | |
300 | |a xvi, 176, C1 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
520 | 3 | |a This book summarizes recent inventions, provides guidelines and recommendations, and demonstrates many practical applications of homomorphic encryption. This collection of papers represents the combined wisdom of the community of leading experts on homomorphic encryption. In the past 3 years, a global community consisting of researchers in academia, industry, and government, has been working closely to standardize homomorphic encryption. This is the first publication of whitepapers created by these experts that comprehensively describes the scientific inventions, presents a concrete security analysis, and broadly discusses applicable use scenarios and markets. This book also features a collection of privacy-preserving machine learning applications powered by homomorphic encryption designed by groups of top graduate students worldwide at the Private AI Bootcamp hosted by Microsoft Research. The volume aims to connect non-expert readers with this important new cryptographic technology in an accessible and actionable way. Readers who have heard good things about homomorphic encryption but are not familiar with the details will find this book full of inspiration. Readers who have preconceived biases based on out-of-date knowledge will see the recent progress made by industrial and academic pioneers on optimizing and standardizing this technology. A clear picture of how homomorphic encryption works, how to use it to solve real-world problems, and how to efficiently strengthen privacy protection, will naturally become clear. | |
653 | 0 | |a Computer science—Mathematics. | |
653 | 0 | |a Cryptography. | |
653 | 0 | |a Data encryption (Computer science). | |
653 | 0 | |a Number theory. | |
653 | 0 | |a Algebraic geometry. | |
653 | 0 | |a Data protection—Law and legislation. | |
653 | 0 | |a Security systems. | |
700 | 1 | |a Lauter, Kristin E. |d 1969- |0 (DE-588)137142757 |4 edt | |
700 | 1 | |a Dai, Wei |4 edt | |
700 | 1 | |a Laine, Kim |4 edt | |
776 | 0 | |z 9783030772871 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 9783030772871 |
999 | |a oai:aleph.bib-bvb.de:BVB01-034299989 |
Datensatz im Suchindex
_version_ | 1804185327652306944 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Lauter, Kristin E. 1969- Dai, Wei Laine, Kim |
author2_role | edt edt edt |
author2_variant | k e l ke kel w d wd k l kl |
author_GND | (DE-588)137142757 |
author_facet | Lauter, Kristin E. 1969- Dai, Wei Laine, Kim |
building | Verbundindex |
bvnumber | BV049037373 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)1322799308 (DE-599)KXP1805843982 |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | corrected publication |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03043nam a2200493 c 4500</leader><controlfield tag="001">BV049037373</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230727 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">230706s2022 sz a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030772864</subfield><subfield code="9">978-3-030-77286-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1322799308</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KXP1805843982</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">sz</subfield><subfield code="c">XA-CH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1102</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">94A60</subfield><subfield code="2">msc</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">68-06</subfield><subfield code="2">msc</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">94-06</subfield><subfield code="2">msc</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">00B25</subfield><subfield code="2">msc</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">68P25</subfield><subfield code="2">msc</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Protecting privacy through homomorphic encryption</subfield><subfield code="c">Kristin Lauter, Wei Dai, Kim Laine (editors)</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">corrected publication</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham, Switzerland</subfield><subfield code="b">Springer Nature</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xvi, 176, C1 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">This book summarizes recent inventions, provides guidelines and recommendations, and demonstrates many practical applications of homomorphic encryption. This collection of papers represents the combined wisdom of the community of leading experts on homomorphic encryption. In the past 3 years, a global community consisting of researchers in academia, industry, and government, has been working closely to standardize homomorphic encryption. This is the first publication of whitepapers created by these experts that comprehensively describes the scientific inventions, presents a concrete security analysis, and broadly discusses applicable use scenarios and markets. This book also features a collection of privacy-preserving machine learning applications powered by homomorphic encryption designed by groups of top graduate students worldwide at the Private AI Bootcamp hosted by Microsoft Research. The volume aims to connect non-expert readers with this important new cryptographic technology in an accessible and actionable way. Readers who have heard good things about homomorphic encryption but are not familiar with the details will find this book full of inspiration. Readers who have preconceived biases based on out-of-date knowledge will see the recent progress made by industrial and academic pioneers on optimizing and standardizing this technology. A clear picture of how homomorphic encryption works, how to use it to solve real-world problems, and how to efficiently strengthen privacy protection, will naturally become clear.</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer science—Mathematics.</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cryptography.</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science).</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Number theory.</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Algebraic geometry.</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Data protection—Law and legislation.</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Security systems.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lauter, Kristin E.</subfield><subfield code="d">1969-</subfield><subfield code="0">(DE-588)137142757</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dai, Wei</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Laine, Kim</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="z">9783030772871</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">9783030772871</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034299989</subfield></datafield></record></collection> |
id | DE-604.BV049037373 |
illustrated | Illustrated |
index_date | 2024-07-03T22:18:11Z |
indexdate | 2024-07-10T09:53:28Z |
institution | BVB |
isbn | 9783030772864 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034299989 |
oclc_num | 1322799308 |
open_access_boolean | |
owner | DE-1102 |
owner_facet | DE-1102 |
physical | xvi, 176, C1 Seiten Illustrationen |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Springer Nature |
record_format | marc |
spelling | Protecting privacy through homomorphic encryption Kristin Lauter, Wei Dai, Kim Laine (editors) corrected publication Cham, Switzerland Springer Nature 2022 xvi, 176, C1 Seiten Illustrationen txt rdacontent n rdamedia nc rdacarrier This book summarizes recent inventions, provides guidelines and recommendations, and demonstrates many practical applications of homomorphic encryption. This collection of papers represents the combined wisdom of the community of leading experts on homomorphic encryption. In the past 3 years, a global community consisting of researchers in academia, industry, and government, has been working closely to standardize homomorphic encryption. This is the first publication of whitepapers created by these experts that comprehensively describes the scientific inventions, presents a concrete security analysis, and broadly discusses applicable use scenarios and markets. This book also features a collection of privacy-preserving machine learning applications powered by homomorphic encryption designed by groups of top graduate students worldwide at the Private AI Bootcamp hosted by Microsoft Research. The volume aims to connect non-expert readers with this important new cryptographic technology in an accessible and actionable way. Readers who have heard good things about homomorphic encryption but are not familiar with the details will find this book full of inspiration. Readers who have preconceived biases based on out-of-date knowledge will see the recent progress made by industrial and academic pioneers on optimizing and standardizing this technology. A clear picture of how homomorphic encryption works, how to use it to solve real-world problems, and how to efficiently strengthen privacy protection, will naturally become clear. Computer science—Mathematics. Cryptography. Data encryption (Computer science). Number theory. Algebraic geometry. Data protection—Law and legislation. Security systems. Lauter, Kristin E. 1969- (DE-588)137142757 edt Dai, Wei edt Laine, Kim edt 9783030772871 Erscheint auch als Online-Ausgabe 9783030772871 |
spellingShingle | Protecting privacy through homomorphic encryption |
title | Protecting privacy through homomorphic encryption |
title_auth | Protecting privacy through homomorphic encryption |
title_exact_search | Protecting privacy through homomorphic encryption |
title_exact_search_txtP | Protecting privacy through homomorphic encryption |
title_full | Protecting privacy through homomorphic encryption Kristin Lauter, Wei Dai, Kim Laine (editors) |
title_fullStr | Protecting privacy through homomorphic encryption Kristin Lauter, Wei Dai, Kim Laine (editors) |
title_full_unstemmed | Protecting privacy through homomorphic encryption Kristin Lauter, Wei Dai, Kim Laine (editors) |
title_short | Protecting privacy through homomorphic encryption |
title_sort | protecting privacy through homomorphic encryption |
work_keys_str_mv | AT lauterkristine protectingprivacythroughhomomorphicencryption AT daiwei protectingprivacythroughhomomorphicencryption AT lainekim protectingprivacythroughhomomorphicencryption |