Efficient Secure Two-Party Protocols Techniques and Constructions

These general constructions provide a basis for understanding the feasibility of secure computation, and they are a good introduction to design paradigms and proof techniques for efficient protocols. In the final part, the book presents specific constructions of importance. The authors begin with an...

Full description

Bibliographic Details
Main Authors: Hazay, Carmit, Lindell, Yehuda (Author)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2010, 2010
Edition:1st ed. 2010
Series:Information Security and Cryptography
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • and Definitions
  • Definitions
  • General Constructions
  • Semi-honest Adversaries
  • Malicious Adversaries
  • Covert Adversaries
  • Specific Constructions
  • Sigma Protocols and Efficient Zero-Knowledge1
  • Oblivious Transfer and Applications
  • The kth-Ranked Element
  • Search Problems