skip to content
Covid-19 virus
COVID-19 Resources

Reliable information about the coronavirus (COVID-19) is available from the World Health Organization (current situation, international travel). Numerous and frequently-updated resource results are available from this WorldCat.org search. OCLC’s WebJunction has pulled together information and resources to assist library staff as they consider how to handle coronavirus issues in their communities.

Image provided by: CDC/ Alissa Eckert, MS; Dan Higgins, MAM
Secure multiparty computation and secret sharing Preview this item
ClosePreview this item
Checking...

Secure multiparty computation and secret sharing

Author: Ronald Cramer, aut; Ivan Bjerre Damgaard, aut; Jesper Buus Nielsen, aut
Publisher: Cambridge ; New York : Cambridge University Press, 2015
Edition/Format:   Print book : EnglishView all editions and formats
Summary:

This text is the first to present a comprehensive treatment of unconditionally secure techniques for multiparty computation and secret sharing. The authors present feasibility results from the last  Read more...

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Document Type: Book
All Authors / Contributors: Ronald Cramer, aut; Ivan Bjerre Damgaard, aut; Jesper Buus Nielsen, aut
ISBN: 9781107043053 1107043050
OCLC Number: 926657110
Description: 373 s
Contents: Part I. Secure Multiparty Computation: 1. Introduction; 2. Preliminaries; 3. MPC protocols with passive security; 4. Models; 5. Information theoretic robust MPC protocols; 6. MPC from general linear secret sharing schemes; 7. Cryptographic MPC protocols; 8. Some techniques for efficiency improvements; 9. Applications of MPC; Part II. Secret Sharing: 10. Algebraic preliminaries; 11. Secret sharing; 12. Arithmetic codices; Part III. Back Material.
Responsibility: Ronald Cramer, Centrum Wiskunde & Informatica, Ivan BjerreDamgård, Aarhus University, Jesper Buus Nielsen, Aarhus University

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/926657110<\/a>> # Secure multiparty computation and secret sharing<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Book<\/a>, schema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"926657110<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/uik<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2607441112#Topic\/information_theory<\/a>> ; # Information theory<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/005.8\/e23\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2607441112#Topic\/computer_network_protocols<\/a>> ; # Computer network protocols<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2607441112#Topic\/computer_security<\/a>> ; # Computer security<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2607441112#Topic\/computer_networks_security_measures<\/a>> ; # Computer networks--Security measures<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> bgn:PrintBook<\/a> ;\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2607441112#Person\/damgaard_ivan_bjerre_aut_1956<\/a>> ; # aut Ivan Bjerre Damgaard<\/span>\n\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2607441112#Person\/cramer_ronald_aut_1968<\/a>> ; # aut Ronald Cramer<\/span>\n\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2607441112#Person\/buus_nielsen_jesper_aut_1973<\/a>> ; # aut Jesper Buus Nielsen<\/span>\n\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2015<\/span>\" ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/2607441112<\/a>> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Secure multiparty computation and secret sharing<\/span>\" ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"926657110<\/span>\" ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781107043053<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/926657110<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/005.8\/e23\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2607441112#Person\/buus_nielsen_jesper_aut_1973<\/a>> # aut Jesper Buus Nielsen<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:birthDate<\/a> \"1973<\/span>\" ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Buus Nielsen<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Jesper<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"aut Jesper Buus Nielsen<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2607441112#Person\/cramer_ronald_aut_1968<\/a>> # aut Ronald Cramer<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:birthDate<\/a> \"1968<\/span>\" ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Cramer<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Ronald<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"aut Ronald Cramer<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2607441112#Person\/damgaard_ivan_bjerre_aut_1956<\/a>> # aut Ivan Bjerre Damgaard<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:birthDate<\/a> \"1956<\/span>\" ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Damgaard<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Ivan Bjerre<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"aut Ivan Bjerre Damgaard<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2607441112#Topic\/computer_network_protocols<\/a>> # Computer network protocols<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer network protocols<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2607441112#Topic\/computer_networks_security_measures<\/a>> # Computer networks--Security measures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer networks--Security measures<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2607441112#Topic\/computer_security<\/a>> # Computer security<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer security<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2607441112#Topic\/information_theory<\/a>> # Information theory<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Information theory<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/uik<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"uik<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781107043053<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1107043050<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781107043053<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n