Applications of Secure Multiparty Computation (Record no. 40776)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02635naaaa2200361uu 4500 |
| 001 - CONTROL NUMBER | |
| control field | https://directory.doabooks.org/handle/20.500.12854/41078 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20220219200915.0 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 978-1-61499-532-6-1 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781614995319 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781614995326 |
| 024 7# - OTHER STANDARD IDENTIFIER | |
| Standard number or code | 10.3233/978-1-61499-532-6-1 |
| Terms of availability | doi |
| 041 0# - LANGUAGE CODE | |
| Language code of text/sound track or separate title | English |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | dc |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | L. Kamm (ed.) |
| Relationship | auth |
| 245 10 - TITLE STATEMENT | |
| Title | Applications of Secure Multiparty Computation |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Name of publisher, distributor, etc. | IOS Press |
| Date of publication, distribution, etc. | 2015 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 1 electronic resource (264 p.) |
| 506 0# - RESTRICTIONS ON ACCESS NOTE | |
| Terms governing access | Open Access |
| Source of term | star |
| Standardized terminology for access restriction | Unrestricted online access |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | We generate and gather a lot of data about ourselves and others, some of it highly confidential. The collection, storage and use of this data is strictly regulated by laws, but restricting the use of data often limits the benefits which could be obtained from its analysis. Secure multi-party computation (SMC), a cryptographic technology, makes it possible to execute specific programs on confidential data while ensuring that no other sensitive information from the data is leaked. SMC has been the subject of academic study for more than 30 years, but first attempts to use it for actual computations in the early 2000s – although theoretically efficient – were initially not practicable. However, improvements in the situation have made possible the secure solving of even relatively large computational tasks. This book describes how many different computational tasks can be solved securely, yet efficiently. It describes how protocols can be combined to larger applications, and how the security-efficiency trade-offs of different components of an SMC application should be chosen. Many of the results described in this book were achieved as part of the project Usable and Efficient Secure Multi-party Computation (UaESMC), which was funded by the European Commission. The book will be of interest to all those whose work involves the secure analysis of confidential data. |
| 540 ## - TERMS GOVERNING USE AND REPRODUCTION NOTE | |
| Terms governing use and reproduction | Creative Commons |
| Use and reproduction rights | https://creativecommons.org/licenses/by-nc/4.0/ |
| Source of term | cc |
| -- | https://creativecommons.org/licenses/by-nc/4.0/ |
| 546 ## - LANGUAGE NOTE | |
| Language note | English |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | security |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | UaESMC |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | data |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | confidentiality |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | SMC |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | cryptology |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | legislation |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | multi-party computation |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | P. Laud (ed.) |
| Relationship | auth |
| 856 40 - ELECTRONIC LOCATION AND ACCESS | |
| Host name | www.oapen.org |
| Uniform Resource Identifier | <a href="http://www.ebooks.iospress.nl/isbn/9781614995326">http://www.ebooks.iospress.nl/isbn/9781614995326</a> |
| Access status | 0 |
| Public note | DOAB: download the publication |
| 856 40 - ELECTRONIC LOCATION AND ACCESS | |
| Host name | www.oapen.org |
| Uniform Resource Identifier | <a href="https://directory.doabooks.org/handle/20.500.12854/41078">https://directory.doabooks.org/handle/20.500.12854/41078</a> |
| Access status | 0 |
| Public note | DOAB: description of the publication |
No items available.
