Items related to Secure Multi-Party Computation Against Passive Adversaries...

Secure Multi-Party Computation Against Passive Adversaries (Synthesis Lectures on Distributed Computing Theory) - Softcover

 
9783031121661: Secure Multi-Party Computation Against Passive Adversaries (Synthesis Lectures on Distributed Computing Theory)
  • PublisherSpringer
  • Publication date2023
  • ISBN 10 303112166X
  • ISBN 13 9783031121661
  • BindingPaperback
  • LanguageEnglish
  • Edition number1
  • Number of pages248

Buy New

View this item

US$ 15.92 shipping from United Kingdom to U.S.A.

Destination, rates & speeds

Other Popular Editions of the Same Title

9783031121630: Secure Multi-Party Computation Against Passive Adversaries (Synthesis Lectures on Distributed Computing Theory)

Featured Edition

ISBN 10:  3031121635 ISBN 13:  9783031121630
Publisher: Springer, 2022
Hardcover

Search results for Secure Multi-Party Computation Against Passive Adversaries...

Stock Image

Choudhury, Ashish; Patra, Arpita
Published by Springer, 2023
ISBN 10: 303112166X ISBN 13: 9783031121661
New Softcover

Seller: Ria Christie Collections, Uxbridge, United Kingdom

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: New. In. Seller Inventory # ria9783031121661_new

Contact seller

Buy New

US$ 76.66
Convert currency
Shipping: US$ 15.92
From United Kingdom to U.S.A.
Destination, rates & speeds

Quantity: Over 20 available

Add to basket

Seller Image

Arpita Patra
ISBN 10: 303112166X ISBN 13: 9783031121661
New Taschenbuch
Print on Demand

Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model). The authorspresent seminal possibility and feasibility results in this model and includes formalsecurity proofs. Even though the passive corruption model may seem very weak,achieving security against such a benign form of adversary turns out to be non-trivialand demands sophisticated and highly advanced techniques. MPC is a fundamentalconcept, both in cryptography as well as distributed computing. On a very high level, an MPC protocol allows a set of mutually-distrusting parties with their privateinputs to jointly and securely perform any computation on their inputs. Examples ofsuch computation include, but not limited to, privacy-preserving data mining; securee-auction; private set-intersection; and privacy-preserving machine learning. MPCprotocols emulate the role of an imaginary, centralized trusted third party (TTP) thatcollects the inputs of the parties, performs the desired computation, and publishes theresult. Due to its powerful abstraction, the MPC problem has been widely studied overthe last four decades. 248 pp. Englisch. Seller Inventory # 9783031121661

Contact seller

Buy New

US$ 68.05
Convert currency
Shipping: US$ 25.82
From Germany to U.S.A.
Destination, rates & speeds

Quantity: 2 available

Add to basket

Seller Image

Arpita Patra
ISBN 10: 303112166X ISBN 13: 9783031121661
New Taschenbuch

Seller: AHA-BUCH GmbH, Einbeck, Germany

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Taschenbuch. Condition: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model). The authorspresent seminal possibility and feasibility results in this model and includes formalsecurity proofs. Even though the passive corruption model may seem very weak,achieving security against such a benign form of adversary turns out to be non-trivialand demands sophisticated and highly advanced techniques. MPC is a fundamentalconcept, both in cryptography as well as distributed computing. On a very high level, an MPC protocol allows a set of mutually-distrusting parties with their privateinputs to jointly and securely perform any computation on their inputs. Examples ofsuch computation include, but not limited to, privacy-preserving data mining; securee-auction; private set-intersection; and privacy-preserving machine learning. MPCprotocols emulate the role of an imaginary, centralized trusted third party (TTP) thatcollects the inputs of the parties, performs the desired computation, and publishes theresult. Due to its powerful abstraction, the MPC problem has been widely studied overthe last four decades. Seller Inventory # 9783031121661

Contact seller

Buy New

US$ 68.05
Convert currency
Shipping: US$ 33.81
From Germany to U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Choudhury, Ashish/ Patra, Arpita
Published by Springer-Nature New York Inc, 2023
ISBN 10: 303112166X ISBN 13: 9783031121661
New Paperback

Seller: Revaluation Books, Exeter, United Kingdom

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Paperback. Condition: Brand New. 244 pages. 9.45x6.61x0.52 inches. In Stock. Seller Inventory # x-303112166X

Contact seller

Buy New

US$ 98.64
Convert currency
Shipping: US$ 13.29
From United Kingdom to U.S.A.
Destination, rates & speeds

Quantity: 2 available

Add to basket

Seller Image

Choudhury, Ashish|Patra, Arpita
ISBN 10: 303112166X ISBN 13: 9783031121661
New Kartoniert / Broschiert

Seller: moluna, Greven, Germany

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Kartoniert / Broschiert. Condition: New. Seller Inventory # 1106327511

Contact seller

Buy New

US$ 59.58
Convert currency
Shipping: US$ 55.01
From Germany to U.S.A.
Destination, rates & speeds

Quantity: Over 20 available

Add to basket