The Fictioning Horror Sale
 
 

Recently Viewed clear list


Powell's Q&A | September 3, 2014

Emily St. John Mandel: IMG Powell’s Q&A: Emily St. John Mandel



Describe your latest book. My new novel is called Station Eleven. It's about a traveling Shakespearean theatre company in a post-apocalyptic North... Continue »
  1. $17.47 Sale Hardcover add to wish list

    Station Eleven

    Emily St. John Mandel 9780385353304

spacer
Qualifying orders ship free.
$160.50
New Hardcover
Ships in 1 to 3 days
Add to Wishlist
available for shipping or prepaid pickup only
Qty Store Section
25 Local Warehouse Personal Computers- General

This title in other editions

Efficient Secure Two-Party Protocols: Techniques and Contructions (Information Security and Cryptography)

by

Efficient Secure Two-Party Protocols: Techniques and Contructions (Information Security and Cryptography) Cover

 

Synopses & Reviews

Publisher Comments:

The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation - both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions. The book opens with a general introduction to secure computation and then presents definitions of security for a number of different adversary models and definitional paradigms. In the second part, the book shows how any functionality can be securely computed in an efficient way in the presence of semi-honest, malicious and covert adversaries. These general constructions provide a basis for understanding the feasibility of secure computation, and they are a good introduction to design paradigms and proof techniques for efficient protocols. In the final part, the book presents specific constructions of importance. The authors begin with an in-depth study of sigma protocols and zero knowledge, focusing on secure computation, and they then provide a comprehensive study of the fundamental oblivious transfer function. Starting from protocols that achieve privacy only, they show highly efficient constructions that achieve security in the presence of malicious adversaries for both a single and multiple batch executions. Oblivious pseudorandom function evaluation is then presented as an immediate application of oblivious transfer. Finally, the book concludes with two examples of high-level protocol problems that demonstrate how specific properties of a problem can be exploited to gain high efficiency: securely computing the kth-ranked element, and secure database and text search. This book is essential for practitioners and researchers in the field of secure protocols, particularly those with a focus on efficiency, and for researchers in the area of privacy-preserving data mining. This book can also be used as a textbook for an advanced course on secure protocols.

Synopsis:

The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation. They study both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The aim of the book is to focus on techniques for both constructing protocols and proving them secure. In addition, the authors study the different definitional paradigms used and compare the efficiency of protocols achieved under these different definitions. This book is essential for practitioners and researchers in the field of secure protocols, particularly those with a focus on efficiency, and for researchers in the area of privacy-preserving data mining.

Synopsis:

The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation. They study both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest.

Table of Contents

Introduction.- Definitions.- Semi-honest Adversaries.- Malicious Adversaries.- Covert Adversaries.- Sigma Protocols and Efficient Zero-Knowledge.- Oblivious Transfer and Applications.- The k-th Ranked Element.- Search Problems.- References.- Index

Product Details

ISBN:
9783642143021
Author:
Hazay, Carmit
Publisher:
Springer
Author:
Lindell, Yehuda
Subject:
Computer Science
Subject:
Networking - General
Subject:
Database Management - Database Mining
Subject:
Covert Adversaries
Subject:
Definitions
Subject:
Index
Subject:
Introduction
Subject:
Malicious Adversaries
Subject:
Oblivious Transfer and Applications
Subject:
references
Subject:
Search Problems
Subject:
Semi-honest Adversaries
Subject:
Sigma Protocols and Efficient Zero-Knowledge
Subject:
The k-th Ranked Element
Subject:
Data Structures, Cryptology and Information Theory
Subject:
Computer Communication Networks
Subject:
Data Mining and Knowledge Discovery
Subject:
Personal Computers-General
Subject:
Information Theory
Copyright:
Edition Description:
2010
Series:
Information Security and Cryptography
Publication Date:
20101103
Binding:
HARDCOVER
Language:
English
Pages:
276
Dimensions:
235 x 155 mm 584 gr

Related Subjects

» Computers and Internet » Computers Reference » General
» Computers and Internet » Networking » General
» Computers and Internet » Personal Computers » General

Efficient Secure Two-Party Protocols: Techniques and Contructions (Information Security and Cryptography) New Hardcover
0 stars - 0 reviews
$160.50 In Stock
Product details 276 pages Not Avail - English 9783642143021 Reviews:
"Synopsis" by , The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation. They study both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The aim of the book is to focus on techniques for both constructing protocols and proving them secure. In addition, the authors study the different definitional paradigms used and compare the efficiency of protocols achieved under these different definitions. This book is essential for practitioners and researchers in the field of secure protocols, particularly those with a focus on efficiency, and for researchers in the area of privacy-preserving data mining.
"Synopsis" by , The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation. They study both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest.
spacer
spacer
  • back to top
Follow us on...




Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.