Multiparty Computations in Non-private Environments
Private multi-party computations is an intensively studied subject of modern cryptography. In general, private computation can be defined as follows: Consider a set of players, where each player knows an individual secret. The goal is to compute a function depending on these secrets such that after...
Saved in:
Published in | General Theory of Information Transfer and Combinatorics pp. 1097 - 1099 |
---|---|
Main Author | |
Format | Book Chapter |
Language | English |
Published |
Berlin, Heidelberg
Springer Berlin Heidelberg
2006
|
Series | Lecture Notes in Computer Science |
Subjects | |
Online Access | Get full text |
ISBN | 9783540462446 3540462449 |
ISSN | 0302-9743 1611-3349 |
DOI | 10.1007/11889342_80 |
Cover
Abstract | Private multi-party computations is an intensively studied subject of modern cryptography. In general, private computation can be defined as follows: Consider a set of players, where each player knows an individual secret. The goal is to compute a function depending on these secrets such that after the computation none of the players knows anything about the secrets of others that cannot be derived from his own input and the result of the function. To compute the function, the players exchange messages with each other using secure links. For a formal definition of cryptographically secure privacy see [8] and for privacy in information theoretic sense see [5,2]. |
---|---|
AbstractList | Private multi-party computations is an intensively studied subject of modern cryptography. In general, private computation can be defined as follows: Consider a set of players, where each player knows an individual secret. The goal is to compute a function depending on these secrets such that after the computation none of the players knows anything about the secrets of others that cannot be derived from his own input and the result of the function. To compute the function, the players exchange messages with each other using secure links. For a formal definition of cryptographically secure privacy see [8] and for privacy in information theoretic sense see [5,2]. |
Author | Liśkiewicz, M. |
Author_xml | – sequence: 1 givenname: M. surname: Liśkiewicz fullname: Liśkiewicz, M. |
BookMark | eNpVkE1LxDAYhKOuYF178g_06qH6Jm8-mqOUXRVWvei5pG0i1d2kNNkF_70VPehchmFgeJhzsvDBW0IuKVxTAHVDaVVp5Kyp4IjkWlUoOHDJuMBjklFJaYnI9cm_jssFyQCBlVpxPCN5jO8wCxlyVBnBx_02DaOZ0mdRh924TyYNwcdi8MVT8OU4DQeTbLHyh2EKfmd9ihfk1JlttPmvL8nrevVS35eb57uH-nZTRgocSqqtY0pLoXvsJAM9I4FzLdNOKIH9nKDrK2OcaFsuDHXcGiM1aDOzdhSX5OpnN84U_s1OTRvCR2woNN-HNH8OwS8GzU5M |
ContentType | Book Chapter |
Copyright | Springer-Verlag Berlin Heidelberg 2006 |
Copyright_xml | – notice: Springer-Verlag Berlin Heidelberg 2006 |
DOI | 10.1007/11889342_80 |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Mathematics Computer Science |
EISBN | 9783540462453 3540462457 |
EISSN | 1611-3349 |
Editor | Cai, Ning Blinovsky, Vladimir Bäumer, Lars Ahlswede, Rudolf Mashurian, Haik Deppe, Christian Aydinian, Harout |
Editor_xml | – sequence: 1 givenname: Rudolf surname: Ahlswede fullname: Ahlswede, Rudolf email: hollmann@math.uni-bielefeld.de – sequence: 2 givenname: Lars surname: Bäumer fullname: Bäumer, Lars email: baeumer@math.uni-bielefeld.de – sequence: 3 givenname: Ning surname: Cai fullname: Cai, Ning email: cai@mathematik.uni-bielefeld.de – sequence: 4 givenname: Harout surname: Aydinian fullname: Aydinian, Harout email: ayd@math.uni-bielefeld.de – sequence: 5 givenname: Vladimir surname: Blinovsky fullname: Blinovsky, Vladimir email: blinov@postman.ru – sequence: 6 givenname: Christian surname: Deppe fullname: Deppe, Christian email: cdeppe@math.uni-bielefeld.de – sequence: 7 givenname: Haik surname: Mashurian fullname: Mashurian, Haik email: hmashur@math.uni-bielefeld.de |
EndPage | 1099 |
GroupedDBID | -DT -GH -~X 1SB 29L 2HA 2HV 5QI 875 AASHB ABMNI ACGFS ADCXD AEFIE ALMA_UNASSIGNED_HOLDINGS EJD F5P FEDTE HVGLF LAS LDH P2P RIG RNI RSU SVGTG VI1 ~02 |
ID | FETCH-LOGICAL-s1040-19ef279659d3c62095400ffb29f5753d4000cd8aaf5bb45a1f4eaa6909a974c13 |
ISBN | 9783540462446 3540462449 |
ISSN | 0302-9743 |
IngestDate | Tue Jul 29 20:14:58 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-s1040-19ef279659d3c62095400ffb29f5753d4000cd8aaf5bb45a1f4eaa6909a974c13 |
PageCount | 3 |
ParticipantIDs | springer_books_10_1007_11889342_80 |
PublicationCentury | 2000 |
PublicationDate | 2006 |
PublicationDateYYYYMMDD | 2006-01-01 |
PublicationDate_xml | – year: 2006 text: 2006 |
PublicationDecade | 2000 |
PublicationPlace | Berlin, Heidelberg |
PublicationPlace_xml | – name: Berlin, Heidelberg |
PublicationSeriesTitle | Lecture Notes in Computer Science |
PublicationTitle | General Theory of Information Transfer and Combinatorics |
PublicationYear | 2006 |
Publisher | Springer Berlin Heidelberg |
Publisher_xml | – name: Springer Berlin Heidelberg |
RelatedPersons | Kleinberg, Jon M. Mattern, Friedemann Nierstrasz, Oscar Tygar, Dough Steffen, Bernhard Kittler, Josef Vardi, Moshe Y. Weikum, Gerhard Sudan, Madhu Naor, Moni Mitchell, John C. Terzopoulos, Demetri Pandu Rangan, C. Kanade, Takeo Hutchison, David |
RelatedPersons_xml | – sequence: 1 givenname: David surname: Hutchison fullname: Hutchison, David organization: Lancaster University, UK – sequence: 2 givenname: Takeo surname: Kanade fullname: Kanade, Takeo organization: Carnegie Mellon University, Pittsburgh, USA – sequence: 3 givenname: Josef surname: Kittler fullname: Kittler, Josef organization: University of Surrey, Guildford, UK – sequence: 4 givenname: Jon M. surname: Kleinberg fullname: Kleinberg, Jon M. organization: Cornell University, Ithaca, USA – sequence: 5 givenname: Friedemann surname: Mattern fullname: Mattern, Friedemann organization: ETH Zurich, Switzerland – sequence: 6 givenname: John C. surname: Mitchell fullname: Mitchell, John C. organization: Stanford University, CA, USA – sequence: 7 givenname: Moni surname: Naor fullname: Naor, Moni organization: Weizmann Institute of Science, Rehovot, Israel – sequence: 8 givenname: Oscar surname: Nierstrasz fullname: Nierstrasz, Oscar organization: University of Bern, Switzerland – sequence: 9 givenname: C. surname: Pandu Rangan fullname: Pandu Rangan, C. organization: Indian Institute of Technology, Madras, India – sequence: 10 givenname: Bernhard surname: Steffen fullname: Steffen, Bernhard organization: University of Dortmund, Germany – sequence: 11 givenname: Madhu surname: Sudan fullname: Sudan, Madhu organization: Massachusetts Institute of Technology, MA, USA – sequence: 12 givenname: Demetri surname: Terzopoulos fullname: Terzopoulos, Demetri organization: University of California, Los Angeles, USA – sequence: 13 givenname: Dough surname: Tygar fullname: Tygar, Dough organization: University of California, Berkeley, USA – sequence: 14 givenname: Moshe Y. surname: Vardi fullname: Vardi, Moshe Y. organization: Rice University, Houston, USA – sequence: 15 givenname: Gerhard surname: Weikum fullname: Weikum, Gerhard organization: Max-Planck Institute of Computer Science, Saarbruecken, Germany |
SSID | ssj0000323437 ssj0002792 |
Score | 1.2957337 |
Snippet | Private multi-party computations is an intensively studied subject of modern cryptography. In general, private computation can be defined as follows: Consider... |
SourceID | springer |
SourceType | Publisher |
StartPage | 1097 |
SubjectTerms | Boolean Function Bridge Node Random String Secure Link Secure Privacy |
Title | Multiparty Computations in Non-private Environments |
URI | http://link.springer.com/10.1007/11889342_80 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3PS-wwEA66IqgHfT4f_qbI87RU2ibNJgcPKisiu3tS8bakaQLlQVfciuBf76RJ2_gD8Xkpu6V0s_OlXyeT-WYQ-pswEccyUqEeiCgkVA1CzrQMBcU0V1IkLDdxyPGEXt2S6_v0vuvfWatLquxEvnyqK_kJqnAOcDUq2f9Atr0pnIDPgC8cAWE4vnN-34ZZC9cETnXqeisJaaWItmi5VjZDEh56WACLuh5I60OPiuOL9Jif_yvUcyHrOPL4xJ9BtTb3AaaWZY2nqss7n8zK8OHRNEZT_aEnlbMcZWonz09HbndiMqvqpK9-00Ci4ZMvAw5NwLH_RT0uF08iFJwH6jEaBvqFBYxlNGUZl5o6itjWLXUsanbFvTey2bz7lO1tggcskcDpIsmURYtoccBIDy2dDa9Hd22sLcIJJt1CPDJFE-3ukh2O0_zUw-XLbTjMDt-JOo3e0vulDxvntT9ys4HWjEYlMOIRMOgvtKDKTbTeGDhwBt5Eq-O2Ku_8N8IdooGPaFCUgYdo4CO6hW4vhzcXV6FrmhHOY5MdGnOl4f_RlOdY0gQ8aGBprbOEa_DMcQ7fIpkzIXSaZSQVsSZKCMojLsAUMsZ_UK-clWobBSLlXMWcYQJXyoFgSWaK-zPNpda5zHfQUWODqXkM5tOmBrZnqN3vXLSHVrqZto961eOTOgBnr8oOHZavL7JOiA |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=General+Theory+of+Information+Transfer+and+Combinatorics&rft.au=Li%C5%9Bkiewicz%2C+M.&rft.atitle=Multiparty+Computations+in+Non-private+Environments&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2006-01-01&rft.pub=Springer+Berlin+Heidelberg&rft.isbn=9783540462446&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=1097&rft.epage=1099&rft_id=info:doi/10.1007%2F11889342_80 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon |