Applications Of Secure Multiparty Computation

eBook Download

BOOK EXCERPT:

We generate and gather a lot of data about ourselves and others, some of it highly confidential. The collection, storage and use of this data is strictly regulated by laws, but restricting the use of data often limits the benefits which could be obtained from its analysis. Secure multi-party computation (SMC), a cryptographic technology, makes it possible to execute specific programs on confidential data while ensuring that no other sensitive information from the data is leaked. SMC has been the subject of academic study for more than 30 years, but first attempts to use it for actual computations in the early 2000s – although theoretically efficient – were initially not practicable. However, improvements in the situation have made possible the secure solving of even relatively large computational tasks. This book describes how many different computational tasks can be solved securely, yet efficiently. It describes how protocols can be combined to larger applications, and how the security-efficiency trade-offs of different components of an SMC application should be chosen. Many of the results described in this book were achieved as part of the project Usable and Efficient Secure Multi-party Computation (UaESMC), which was funded by the European Commission. The book will be of interest to all those whose work involves the secure analysis of confidential data.

Product Details :

Genre : Computers
Author : P. Laud
Publisher : IOS Press
Release : 2015-07-30
File : 264 Pages
ISBN-13 : 9781614995326


Secure Multi Party Computation

eBook Download

BOOK EXCERPT:

Secure Multi-Party Computation (MPC) is one of the most powerful tools developed by modern cryptography: it facilitates collaboration among mutually distrusting parties by implementing a virtual trusted party. Despite the remarkable potential of such a tool, and decades of active research in the theoretical cryptography community, it remains a relatively inaccessible and lesser-known concept outside of this field. Only a handful of resources are available to students and researchers wishing to learn more about MPC. The editors of this book have assembled a comprehensive body of basic and advanced material on MPC, authored by experts in the field. It will serve as a starting point for those interested in pursuing research related to MPC, whether they are students learning about it for the first time or researchers already working in the area. The book begins with tutorials introducing the concept of MPC and zero-knowledge proofs, an important theoretical platform where many of the concepts central to MPC were shaped. The remaining chapters deal with classical as well as recent MPC protocols, and a variety of related topics. Each chapter is self-contained and can be read independently of the others.

Product Details :

Genre : Computers
Author : M.M. Prabhakaran
Publisher : IOS Press
Release : 2013-01-17
File : 296 Pages
ISBN-13 : 9781614991694


Secure Multi Party Computation Against Passive Adversaries

eBook Download

BOOK EXCERPT:

This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model). The authors present seminal possibility and feasibility results in this model and includes formal security proofs. Even though the passive corruption model may seem very weak, achieving security against such a benign form of adversary turns out to be non-trivial and demands sophisticated and highly advanced techniques. MPC is a fundamental concept, both in cryptography as well as distributed computing. On a very high level, an MPC protocol allows a set of mutually-distrusting parties with their private inputs to jointly and securely perform any computation on their inputs. Examples of such computation include, but not limited to, privacy-preserving data mining; secure e-auction; private set-intersection; and privacy-preserving machine learning. MPC protocols emulate the role of an imaginary, centralized trusted third party (TTP) that collects the inputs of the parties, performs the desired computation, and publishes the result. Due to its powerful abstraction, the MPC problem has been widely studied over the last four decades.

Product Details :

Genre : Computers
Author : Ashish Choudhury
Publisher : Springer Nature
Release : 2022-10-07
File : 238 Pages
ISBN-13 : 9783031121647


Secure Multiparty Computation

eBook Download

BOOK EXCERPT:

This book provides information on theoretically secure multiparty computation (MPC) and secret sharing, and the fascinating relationship between the two concepts.

Product Details :

Genre : Computers
Author : Ronald Cramer
Publisher : Cambridge University Press
Release : 2015-07-15
File : 385 Pages
ISBN-13 : 9781107043053


Contemporary Cryptology

eBook Download

BOOK EXCERPT:

The aim of this text is to treat selected topics of the subject of contemporary cryptology, structured in five quite independent but related themes: Efficient distributed computation modulo a shared secret, multiparty computation, modern cryptography, provable security for public key schemes, and efficient and secure public-key cryptosystems.

Product Details :

Genre : Computers
Author : Dario Catalano
Publisher : Springer Science & Business Media
Release : 2005-07-19
File : 252 Pages
ISBN-13 : 376437294X


Handbook Of Research On Security Considerations In Cloud Computing

eBook Download

BOOK EXCERPT:

Cloud computing has quickly become the next big step in security development for companies and institutions all over the world. With the technology changing so rapidly, it is important that businesses carefully consider the available advancements and opportunities before implementing cloud computing in their organizations. The Handbook of Research on Security Considerations in Cloud Computing brings together discussion on current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field. Highlighting the need for consumers to understand the unique nature of cloud-delivered security and to evaluate the different aspects of this service to verify if it will meet their needs, this book is an essential reference source for researchers, scholars, postgraduate students, and developers of cloud security systems.

Product Details :

Genre : Computers
Author : Munir, Kashif
Publisher : IGI Global
Release : 2015-07-28
File : 409 Pages
ISBN-13 : 9781466683884


Distributed Computing And Networking

eBook Download

BOOK EXCERPT:

This book constitutes the proceedings of the 15th International Conference on Distributed Computing and Networking, ICDCN 2014, held in Coimbatore, India, in January 2014. The 32 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 110 submissions. They are organized in topical sections named: mutual exclusion, agreement and consensus; parallel and multi-core computing; distributed algorithms; transactional memory; P2P and distributed networks; resource sharing and scheduling; cellular and cognitive radio networks and backbone networks.

Product Details :

Genre : Computers
Author : Mainak Chatterjee
Publisher : Springer
Release : 2014-01-02
File : 567 Pages
ISBN-13 : 9783642452499


Interdisciplinary Perspectives On Business Convergence Computing And Legality

eBook Download

BOOK EXCERPT:

As digital technologies develop, companies envision new ways to incorporate ever more disparate elements in their products, such as the combination of computing power and telecommunications in modern smart phones. Interdisciplinary Perspectives on Business Convergence, Computing, and Legality investigates the development of convergent and interoperable systems in business environments, with a particular focus on potential legal implications that emerge when a company begins branching out into domains traditionally occupied by suppliers and consumers. Business and law professionals—both in academia and in practice—will use this book to gain a greater understanding of the growth of convergence in the field of information technologies and how such transformations affect business practices around the world.

Product Details :

Genre : Business & Economics
Author : Khurana, Reema
Publisher : IGI Global
Release : 2013-06-30
File : 271 Pages
ISBN-13 : 9781466642102


Security Privacy And Anonymity In Computation Communication And Storage

eBook Download

BOOK EXCERPT:

This book constitutes the refereed proceedings of six symposiums and two workshops co-located with SpaCCS 2019, the 12th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage. The 26 full papers were carefully reviewed and selected from 75 submissions. This year's symposiums and workshops are: SPIoT 2019 – Security and Privacy of Internet of Things; TSP 2019 – Trust, Security and Privacy for Emerging Applications; SCS 2019 – Sensor-Cloud Systems; UbiSafe 2019 – UbiSafe Computing; ISSR 2019 – Security in e-Science and e-Research; CMRM 2019 – Cybersecurity Metrics and Risk Modeling.

Product Details :

Genre : Computers
Author : Guojun Wang
Publisher : Springer
Release : 2019-07-10
File : 340 Pages
ISBN-13 : 9783030249007


Cloud Computing And Security

eBook Download

BOOK EXCERPT:

This six volume set LNCS 11063 – 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics.

Product Details :

Genre : Computers
Author : Xingming Sun
Publisher : Springer
Release : 2018-09-12
File : 738 Pages
ISBN-13 : 9783030000127