Multiparty Computations in Non-private Environments

Private multi-party computations is an intensively studied subject of modern cryptography. In general, private computation can be defined as follows: Consider a set of players, where each player knows an individual secret. The goal is to compute a function depending on these secrets such that after...

Full description

Saved in:
Bibliographic Details
Published inGeneral Theory of Information Transfer and Combinatorics pp. 1097 - 1099
Main Author Liśkiewicz, M.
Format Book Chapter
LanguageEnglish
Published Berlin, Heidelberg Springer Berlin Heidelberg 2006
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN9783540462446
3540462449
ISSN0302-9743
1611-3349
DOI10.1007/11889342_80

Cover

Abstract Private multi-party computations is an intensively studied subject of modern cryptography. In general, private computation can be defined as follows: Consider a set of players, where each player knows an individual secret. The goal is to compute a function depending on these secrets such that after the computation none of the players knows anything about the secrets of others that cannot be derived from his own input and the result of the function. To compute the function, the players exchange messages with each other using secure links. For a formal definition of cryptographically secure privacy see [8] and for privacy in information theoretic sense see [5,2].
AbstractList Private multi-party computations is an intensively studied subject of modern cryptography. In general, private computation can be defined as follows: Consider a set of players, where each player knows an individual secret. The goal is to compute a function depending on these secrets such that after the computation none of the players knows anything about the secrets of others that cannot be derived from his own input and the result of the function. To compute the function, the players exchange messages with each other using secure links. For a formal definition of cryptographically secure privacy see [8] and for privacy in information theoretic sense see [5,2].
Author Liśkiewicz, M.
Author_xml – sequence: 1
  givenname: M.
  surname: Liśkiewicz
  fullname: Liśkiewicz, M.
BookMark eNpVkE1LxDAYhKOuYF178g_06qH6Jm8-mqOUXRVWvei5pG0i1d2kNNkF_70VPehchmFgeJhzsvDBW0IuKVxTAHVDaVVp5Kyp4IjkWlUoOHDJuMBjklFJaYnI9cm_jssFyQCBlVpxPCN5jO8wCxlyVBnBx_02DaOZ0mdRh924TyYNwcdi8MVT8OU4DQeTbLHyh2EKfmd9ihfk1JlttPmvL8nrevVS35eb57uH-nZTRgocSqqtY0pLoXvsJAM9I4FzLdNOKIH9nKDrK2OcaFsuDHXcGiM1aDOzdhSX5OpnN84U_s1OTRvCR2woNN-HNH8OwS8GzU5M
ContentType Book Chapter
Copyright Springer-Verlag Berlin Heidelberg 2006
Copyright_xml – notice: Springer-Verlag Berlin Heidelberg 2006
DOI 10.1007/11889342_80
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Mathematics
Computer Science
EISBN 9783540462453
3540462457
EISSN 1611-3349
Editor Cai, Ning
Blinovsky, Vladimir
Bäumer, Lars
Ahlswede, Rudolf
Mashurian, Haik
Deppe, Christian
Aydinian, Harout
Editor_xml – sequence: 1
  givenname: Rudolf
  surname: Ahlswede
  fullname: Ahlswede, Rudolf
  email: hollmann@math.uni-bielefeld.de
– sequence: 2
  givenname: Lars
  surname: Bäumer
  fullname: Bäumer, Lars
  email: baeumer@math.uni-bielefeld.de
– sequence: 3
  givenname: Ning
  surname: Cai
  fullname: Cai, Ning
  email: cai@mathematik.uni-bielefeld.de
– sequence: 4
  givenname: Harout
  surname: Aydinian
  fullname: Aydinian, Harout
  email: ayd@math.uni-bielefeld.de
– sequence: 5
  givenname: Vladimir
  surname: Blinovsky
  fullname: Blinovsky, Vladimir
  email: blinov@postman.ru
– sequence: 6
  givenname: Christian
  surname: Deppe
  fullname: Deppe, Christian
  email: cdeppe@math.uni-bielefeld.de
– sequence: 7
  givenname: Haik
  surname: Mashurian
  fullname: Mashurian, Haik
  email: hmashur@math.uni-bielefeld.de
EndPage 1099
GroupedDBID -DT
-GH
-~X
1SB
29L
2HA
2HV
5QI
875
AASHB
ABMNI
ACGFS
ADCXD
AEFIE
ALMA_UNASSIGNED_HOLDINGS
EJD
F5P
FEDTE
HVGLF
LAS
LDH
P2P
RIG
RNI
RSU
SVGTG
VI1
~02
ID FETCH-LOGICAL-s1040-19ef279659d3c62095400ffb29f5753d4000cd8aaf5bb45a1f4eaa6909a974c13
ISBN 9783540462446
3540462449
ISSN 0302-9743
IngestDate Tue Jul 29 20:14:58 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-s1040-19ef279659d3c62095400ffb29f5753d4000cd8aaf5bb45a1f4eaa6909a974c13
PageCount 3
ParticipantIDs springer_books_10_1007_11889342_80
PublicationCentury 2000
PublicationDate 2006
PublicationDateYYYYMMDD 2006-01-01
PublicationDate_xml – year: 2006
  text: 2006
PublicationDecade 2000
PublicationPlace Berlin, Heidelberg
PublicationPlace_xml – name: Berlin, Heidelberg
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationTitle General Theory of Information Transfer and Combinatorics
PublicationYear 2006
Publisher Springer Berlin Heidelberg
Publisher_xml – name: Springer Berlin Heidelberg
RelatedPersons Kleinberg, Jon M.
Mattern, Friedemann
Nierstrasz, Oscar
Tygar, Dough
Steffen, Bernhard
Kittler, Josef
Vardi, Moshe Y.
Weikum, Gerhard
Sudan, Madhu
Naor, Moni
Mitchell, John C.
Terzopoulos, Demetri
Pandu Rangan, C.
Kanade, Takeo
Hutchison, David
RelatedPersons_xml – sequence: 1
  givenname: David
  surname: Hutchison
  fullname: Hutchison, David
  organization: Lancaster University, UK
– sequence: 2
  givenname: Takeo
  surname: Kanade
  fullname: Kanade, Takeo
  organization: Carnegie Mellon University, Pittsburgh, USA
– sequence: 3
  givenname: Josef
  surname: Kittler
  fullname: Kittler, Josef
  organization: University of Surrey, Guildford, UK
– sequence: 4
  givenname: Jon M.
  surname: Kleinberg
  fullname: Kleinberg, Jon M.
  organization: Cornell University, Ithaca, USA
– sequence: 5
  givenname: Friedemann
  surname: Mattern
  fullname: Mattern, Friedemann
  organization: ETH Zurich, Switzerland
– sequence: 6
  givenname: John C.
  surname: Mitchell
  fullname: Mitchell, John C.
  organization: Stanford University, CA, USA
– sequence: 7
  givenname: Moni
  surname: Naor
  fullname: Naor, Moni
  organization: Weizmann Institute of Science, Rehovot, Israel
– sequence: 8
  givenname: Oscar
  surname: Nierstrasz
  fullname: Nierstrasz, Oscar
  organization: University of Bern, Switzerland
– sequence: 9
  givenname: C.
  surname: Pandu Rangan
  fullname: Pandu Rangan, C.
  organization: Indian Institute of Technology, Madras, India
– sequence: 10
  givenname: Bernhard
  surname: Steffen
  fullname: Steffen, Bernhard
  organization: University of Dortmund, Germany
– sequence: 11
  givenname: Madhu
  surname: Sudan
  fullname: Sudan, Madhu
  organization: Massachusetts Institute of Technology, MA, USA
– sequence: 12
  givenname: Demetri
  surname: Terzopoulos
  fullname: Terzopoulos, Demetri
  organization: University of California, Los Angeles, USA
– sequence: 13
  givenname: Dough
  surname: Tygar
  fullname: Tygar, Dough
  organization: University of California, Berkeley, USA
– sequence: 14
  givenname: Moshe Y.
  surname: Vardi
  fullname: Vardi, Moshe Y.
  organization: Rice University, Houston, USA
– sequence: 15
  givenname: Gerhard
  surname: Weikum
  fullname: Weikum, Gerhard
  organization: Max-Planck Institute of Computer Science, Saarbruecken, Germany
SSID ssj0000323437
ssj0002792
Score 1.2957337
Snippet Private multi-party computations is an intensively studied subject of modern cryptography. In general, private computation can be defined as follows: Consider...
SourceID springer
SourceType Publisher
StartPage 1097
SubjectTerms Boolean Function
Bridge Node
Random String
Secure Link
Secure Privacy
Title Multiparty Computations in Non-private Environments
URI http://link.springer.com/10.1007/11889342_80
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3PS-wwEA66IqgHfT4f_qbI87RU2ibNJgcPKisiu3tS8bakaQLlQVfciuBf76RJ2_gD8Xkpu6V0s_OlXyeT-WYQ-pswEccyUqEeiCgkVA1CzrQMBcU0V1IkLDdxyPGEXt2S6_v0vuvfWatLquxEvnyqK_kJqnAOcDUq2f9Atr0pnIDPgC8cAWE4vnN-34ZZC9cETnXqeisJaaWItmi5VjZDEh56WACLuh5I60OPiuOL9Jif_yvUcyHrOPL4xJ9BtTb3AaaWZY2nqss7n8zK8OHRNEZT_aEnlbMcZWonz09HbndiMqvqpK9-00Ci4ZMvAw5NwLH_RT0uF08iFJwH6jEaBvqFBYxlNGUZl5o6itjWLXUsanbFvTey2bz7lO1tggcskcDpIsmURYtoccBIDy2dDa9Hd22sLcIJJt1CPDJFE-3ukh2O0_zUw-XLbTjMDt-JOo3e0vulDxvntT9ys4HWjEYlMOIRMOgvtKDKTbTeGDhwBt5Eq-O2Ku_8N8IdooGPaFCUgYdo4CO6hW4vhzcXV6FrmhHOY5MdGnOl4f_RlOdY0gQ8aGBprbOEa_DMcQ7fIpkzIXSaZSQVsSZKCMojLsAUMsZ_UK-clWobBSLlXMWcYQJXyoFgSWaK-zPNpda5zHfQUWODqXkM5tOmBrZnqN3vXLSHVrqZto961eOTOgBnr8oOHZavL7JOiA
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=General+Theory+of+Information+Transfer+and+Combinatorics&rft.au=Li%C5%9Bkiewicz%2C+M.&rft.atitle=Multiparty+Computations+in+Non-private+Environments&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2006-01-01&rft.pub=Springer+Berlin+Heidelberg&rft.isbn=9783540462446&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=1097&rft.epage=1099&rft_id=info:doi/10.1007%2F11889342_80
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon