000 -LEADER |
fixed length control field |
00530nam a2200169Ia 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
161214s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783540201052 |
Terms of availability |
pbk |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
004 |
Item number |
LIN |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Lindell, Yehuda |
245 #0 - TITLE STATEMENT |
Title |
Composition of Secure Multi-Party Protocols : Comprehensive Study |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
New York: |
Name of publisher, distributor, etc |
Springer-Verlag, |
Date of publication, distribution, etc |
2003 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xiv, 192 p.; |
Other physical details |
index: |
Dimensions |
23 cm. |
365 ## - TRADE PRICE |
Price type code |
INR |
Price amount |
2023.00/ EURO 34.00 |
490 ## - SERIES STATEMENT |
Series statement |
Lecture notes in computer science |
520 ## - SUMMARY, ETC. |
Summary, etc |
This book is devoted to the general and systematic study of secure multi-party computation under composition. Despite its emphasis on a theoretically well-founded treatment of the subject, general techniques for designing secure protocols are developed that may even result in schemes or modules to be incorporated in practical systems. The book clarifies fundamental issues regarding security in a multi-execution environment and gives a comprehensive and unique treatment of the composition of secure multi-party protocols."--BOOK JACKET. In the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs. General results concerning secure two-party or multi-party computation were first announced in the 1980s. Put briefly, these results assert that under certain assumptions one can construct protocols for securely computing any desired multi-party functionality. However, this research relates only to a setting where a single protocol execution is carried out. In contrast, in modern networks, many different protocol executions are run at the same time. This book is devoted to the general and systematic study of secure multi-party computation under composition. Despite its emphasis on a theoretically well-founded treatment of the subject, general techniques for designing secure protocols are developed that may even result in schemes or modules to be incorporated in practical systems. The book clarifies fundamental issues regarding security in a multi-execution environment and gives a comprehensive and unique treatment of the composition of secure multi-party protocols |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security |
|
Topical term or geographic name as entry element |
Authenticated Byzantine Agreement |
|
Topical term or geographic name as entry element |
Computer networks |
|
Topical term or geographic name as entry element |
Data encryption |
|
Topical term or geographic name as entry element |
Management information systems |
|
Topical term or geographic name as entry element |
Management of Computing and Information Systems |
|
Topical term or geographic name as entry element |
Operating systems |
|
Topical term or geographic name as entry element |
Computers and civilization |
|
Topical term or geographic name as entry element |
Multi-party protocols |
|
Topical term or geographic name as entry element |
Computers access control |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
Books |