The Resource Engineering secure two-party computation protocols : design, optimization, and applications of efficient secure function evaluation, Thomas Schneider, (electronic resource)

Engineering secure two-party computation protocols : design, optimization, and applications of efficient secure function evaluation, Thomas Schneider, (electronic resource)

Label
Engineering secure two-party computation protocols : design, optimization, and applications of efficient secure function evaluation
Title
Engineering secure two-party computation protocols
Title remainder
design, optimization, and applications of efficient secure function evaluation
Statement of responsibility
Thomas Schneider
Creator
Contributor
Provider
Subject
Genre
Language
eng
Summary
Secure two-party computation, called secure function evaluation (SFE), enables two mutually mistrusting parties, the client and server, to evaluate an arbitrary function on their respective private inputs while revealing nothing but the result. Originally the technique was considered to be too inefficient for practical privacy-preserving applications, but in recent years rapid speed-up in computers and communication networks, algorithmic improvements, automatic generation, and optimizations have enabled their application in many scenarios. The author offers an extensive overview of the most practical and efficient modern techniques used in the design and implementation of secure computation and related protocols. After an introduction that sets secure computation in its larger context of other privacy-enhancing technologies such as secure channels and trusted computing, he covers the basics of practically efficient secure function evaluation, circuit optimizations and constructions, hardware-assisted garbled circuit protocols, and the modular design of efficient SFE protocols. The goal of the author's research is to use algorithm engineering methods to engineer efficient secure protocols, both as a generic tool and for solving practical applications, and he achieves an excellent balance between the theory and applicability. The book is essential for researchers, students and practitioners in the area of applied cryptography and information security who aim to construct practical cryptographic protocols for privacy-preserving real-world applications
Cataloging source
GW5XE
http://library.link/vocab/creatorDate
1983-
http://library.link/vocab/creatorName
Schneider, Thomas
Image bit depth
0
LC call number
TK5105.55
LC item number
.S36 2012
Literary form
non fiction
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
SpringerLink
http://library.link/vocab/subjectName
  • Computer network protocols
  • Data encryption (Computer science)
  • Computer networks
  • Informatique
  • Computer network protocols
  • Computer networks
  • Data encryption (Computer science)
Label
Engineering secure two-party computation protocols : design, optimization, and applications of efficient secure function evaluation, Thomas Schneider, (electronic resource)
Instantiates
Publication
Antecedent source
mixed
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Chap. 1, Introduction -- Chap. 2, Basics of Practically Efficient Secure Function Evaluation -- Chap. 3, Circuit Optimizations and Constructions -- Chap. 4, Hardware-Assisted Garbled Circuit Protocols -- Chap. 5, Modular Design of Efficient SFE Protocols -- Chap. 6, Conclusions -- References -- Index
Dimensions
unknown
Extent
1 online resource.
File format
multiple file formats
Form of item
  • online
  • electronic
Isbn
9783642300417
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other control number
9786613942487
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
Stock number
394248
System control number
  • (OCoLC)805560401
  • (OCoLC)ocn805560401
Label
Engineering secure two-party computation protocols : design, optimization, and applications of efficient secure function evaluation, Thomas Schneider, (electronic resource)
Publication
Antecedent source
mixed
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Chap. 1, Introduction -- Chap. 2, Basics of Practically Efficient Secure Function Evaluation -- Chap. 3, Circuit Optimizations and Constructions -- Chap. 4, Hardware-Assisted Garbled Circuit Protocols -- Chap. 5, Modular Design of Efficient SFE Protocols -- Chap. 6, Conclusions -- References -- Index
Dimensions
unknown
Extent
1 online resource.
File format
multiple file formats
Form of item
  • online
  • electronic
Isbn
9783642300417
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other control number
9786613942487
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
Stock number
394248
System control number
  • (OCoLC)805560401
  • (OCoLC)ocn805560401

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...