Efficient Secure Two-Party Protocols Techniques and Constructions
These general constructions provide a basis for understanding the feasibility of secure computation, and they are a good introduction to design paradigms and proof techniques for efficient protocols. In the final part, the book presents specific constructions of importance. The authors begin with an...
Main Authors: | , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Berlin, Heidelberg
Springer Berlin Heidelberg
2010, 2010
|
Edition: | 1st ed. 2010 |
Series: | Information Security and Cryptography
|
Subjects: | |
Online Access: | |
Collection: | Springer eBooks 2005- - Collection details see MPG.ReNa |
Table of Contents:
- and Definitions
- Definitions
- General Constructions
- Semi-honest Adversaries
- Malicious Adversaries
- Covert Adversaries
- Specific Constructions
- Sigma Protocols and Efficient Zero-Knowledge1
- Oblivious Transfer and Applications
- The kth-Ranked Element
- Search Problems