Hazay, Carmit
Efficient Secure Two-Party Protocols
1. Introduction
Carmit Hazay, Yehuda Lindell
2. Definitions
Carmit Hazay, Yehuda Lindell
3. Semi-honest Adversaries
Carmit Hazay, Yehuda Lindell
4. Malicious Adversaries
Carmit Hazay, Yehuda Lindell
5. Covert Adversaries
Carmit Hazay, Yehuda Lindell
6. Sigma Protocols and Efficient Zero-Knowledge
Carmit Hazay, Yehuda Lindell
7. Oblivious Transfer and Applications
Carmit Hazay, Yehuda Lindell
8. The
Carmit Hazay, Yehuda Lindell
9. Search Problems
Carmit Hazay, Yehuda Lindell
Nyckelord: Computer Science, Data Structures, Cryptology and Information Theory, Computer Communication Networks, Data Mining and Knowledge Discovery
- Författare
- Hazay, Carmit
- Lindell, Yehuda
- Utgivare
- Springer
- Utgivningsår
- 2010
- Språk
- en
- Utgåva
- 1
- Serie
- Information Security and Cryptography
- Sidantal
- 13 sidor
- Kategori
- Datateknik, Datakommunikation
- Format
- E-bok
- eISBN (PDF)
- 9783642143038