LEADER 04302nam 22007695 450 001 996465963103316 005 20200701202833.0 010 $a3-540-39819-8 024 7 $a10.1007/b13246 035 $a(CKB)1000000000212178 035 $a(SSID)ssj0000322001 035 $a(PQKBManifestationID)11246239 035 $a(PQKBTitleCode)TC0000322001 035 $a(PQKBWorkID)10282219 035 $a(PQKB)10534419 035 $a(DE-He213)978-3-540-39819-6 035 $a(MiAaPQ)EBC3087777 035 $a(PPN)155195964 035 $a(EXLCZ)991000000000212178 100 $a20121227d2003 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aComposition of Secure Multi-Party Protocols$b[electronic resource] $eA Comprehensive Study /$fby Yehuda Lindell 205 $a1st ed. 2003. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2003. 215 $a1 online resource (XVI, 200 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v2815 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-20105-X 320 $aIncludes bibliographical references and index. 327 $a1. Introduction -- 2. The Composition of Authenticated Byzantine Agreement -- 3. Secure Computation without Agreement -- 4. Universally Composable Multi-party Computation. 330 $aIn the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs. General results concerning secure two-party or multi-party computation were first announced in the 1980s. Put briefly, these results assert that under certain assumptions one can construct protocols for securely computing any desired multi-party functionality. However, this research relates only to a setting where a single protocol execution is carried out. In contrast, in modern networks, many different protocol executions are run at the same time. This book is devoted to the general and systematic study of secure multi-party computation under composition. Despite its emphasis on a theoretically well-founded treatment of the subject, general techniques for designing secure protocols are developed that may even result in schemes or modules to be incorporated in practical systems. The book clarifies fundamental issues regarding security in a multi-execution environment and gives a comprehensive and unique treatment of the composition of secure multi-party protocols. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v2815 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aOperating systems (Computers) 606 $aComputers and civilization 606 $aManagement information systems 606 $aComputer science 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aOperating systems (Computers). 615 0$aComputers and civilization. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aOperating Systems. 615 24$aComputers and Society. 615 24$aManagement of Computing and Information Systems. 676 $a005.8 700 $aLindell$b Yehuda$4aut$4http://id.loc.gov/vocabulary/relators/aut$0564936 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465963103316 996 $aComposition of Secure Multi-Party Protocols$9954165 997 $aUNISA LEADER 01197oam 2200289z- 450 001 996279799303316 005 20230628091641.0 010 $a1-4799-4061-5 035 $a(CKB)3780000000083515 035 $a(EXLCZ)993780000000083515 100 $a20220628c2013uuuu -u- - 101 0 $aeng 200 10$a2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE 2013) $eHong Kong, 21-22 November 2013 /$fIEEE 210 $cIEEE 311 $a1-4799-4060-7 517 $a2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering 517 $a2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE) 517 $aSystematic Approaches to Digital Forensic Engineering 606 $aComputer crimes$xInvestigation$vCongresses 606 $aForensic engineering$vCongresses 615 0$aComputer crimes$xInvestigation 615 0$aForensic engineering 676 $a363.25/968 906 $aPROCEEDING 912 $a996279799303316 996 $a2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE 2013)$93403391 997 $aUNISA