Secure Multi-Party Computation Against Passive Adversaries

CHF 71.95
Auf Lager
SKU
OLF93FBHJUB
Stock 1 Verfügbar
Geliefert zwischen Fr., 24.04.2026 und Mo., 27.04.2026

Details

This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model). The authors present seminal possibility and feasibility results in this model and includes formal security proofs. Even though the passive corruption model may seem very weak, achieving security against such a benign form of adversary turns out to be non-trivial and demands sophisticated and highly advanced techniques. MPC is a fundamental concept, both in cryptography as well as distributed computing. On a very high level, an MPC protocol allows a set of mutually-distrusting parties with their private inputs to jointly and securely perform any computation on their inputs. Examples of such computation include, but not limited to, privacy-preserving data mining; secure e-auction; private set-intersection; and privacy-preserving machine learning. MPC protocols emulate the role of an imaginary, centralized trusted third party (TTP) that collects the inputs of the parties, performs the desired computation, and publishes the result. Due to its powerful abstraction, the MPC problem has been widely studied over the last four decades.

Includes detailed security proofs for seminal protocols and state-of-theart efficiency improvement techniques Presents protocols against computationally bounded as well as computationally unbounded adversaries Focuses on MPC protocols in the passive corruption model and presents seminal possibility and feasibility results

Autorentext

Arpita Patra: Arpita Patra is presently an Associate Professor at the Indian Institute of Science. She previously held several industry positions, such as (a) visiting faculty at Silence Laboratories, Singapore, in the summer of 2024 and (b) visiting faculty researcher at Google Research between 2022-2023. Her area of interest is Cryptography, focusing on theoretical and practical aspects of secure multiparty computation protocols. She received her PhD from the Indian Institute of Technology (IIT), Madras and held post-doctoral positions at the University of Bristol, UK, ETH Zurich, Switzerland, and Aarhus University, Denmark. Her research has been recognized with the Prof. S. K. Chatterjee Award for Outstanding Woman Researcher or Industry Leader 2023 by IISc (2023), Google Privacy Research Faculty Award 2023, J P Morgan Chase Faculty Award 2022, SONY Faculty Innovation Award 2021, Google Research Award 2020, NASI Young Scientist Platinum Jubilee Award 2018, SERB Women Excellence award 2016, INAE Young Engineer award 2016 and associateships with various scientific bodies such as Indian Academy of Sciences (IAS), Indian National Academy of Engineering (INAE), The World Academy of Sciences (TWAS) and Indian Association for Research in Computing Science (IARCS). She has co-authored a research monogram on Multi-party Computation titled "Secure Multiparty Computation against Passive Adversaries". Ashish Choudhury: Ashish Choudhury received his PhD in Computer Science from IIT Madras, India. He held postdoctoral positions at the University of Bristol and the Indian Statistical Institute. Dr. Choudhury received the Infosys Foundation Career Development Chair Professor award and the Visvesvaraya Young Faculty Research Fellow award. He has been selected for the ACM India eminent speaker program. His research interest is in the theoretical aspect of cryptography, with a special focus on designing and analyzing multi-party computation protocols. He has offered multiple courses on cryptography and secure multiparty computation on NPTEL, a project funded by the Govt. of India, which offers free online courses in various science and engineering disciplines. He has co-authored a book titled "Secure Multi-Party Computation Against Passive Adversaries".


Inhalt
Introduction.- Relevant Topics from Abstract Algebra.- Secret Sharing.- A Toy MPC Protocol.- The BGW Perfectly-Secure MPC Protocol for Linear Functions.- The BGW Perfectly-Secure MPC Protocol for Any Arbitrary Function.- Perfectly-Secure MPC in the Pre-Processing Model.- Perfectly-Secure MPC Tolerating General Adversaries.- Perfectly-Secure MPC for Small Number of parties.- The GMW MPC Protocol.- Oblivious Transfer. <p

Weitere Informationen

  • Allgemeine Informationen
    • GTIN 09783031121630
    • Genre Information Technology
    • Lesemotiv Verstehen
    • Anzahl Seiten 231
    • Größe H17mm x B168mm x T240mm
    • Jahr 2022
    • EAN 9783031121630
    • Format Fester Einband
    • ISBN 978-3-031-12163-0
    • Titel Secure Multi-Party Computation Against Passive Adversaries
    • Autor Ashish Choudhury , Arpita Patra
    • Untertitel Synthesis Lectures on Distributed Computing Theory
    • Herausgeber Springer
    • Sprache Englisch

Bewertungen

Schreiben Sie eine Bewertung
Nur registrierte Benutzer können Bewertungen schreiben. Bitte loggen Sie sich ein oder erstellen Sie ein Konto.
Made with ♥ in Switzerland | ©2025 Avento by Gametime AG
Gametime AG | Hohlstrasse 216 | 8004 Zürich | Schweiz | UID: CHE-112.967.470
Kundenservice: customerservice@avento.shop | Tel: +41 44 248 38 38