An Introduction to Silent Secure Computation (Springerbriefs in Information Security and Cryptography)

個数:
  • 予約

An Introduction to Silent Secure Computation (Springerbriefs in Information Security and Cryptography)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 140 p.
  • 言語 ENG
  • 商品コード 9783032070883

Full Description

Secure computation allows any number of mutually distrustful parties to jointly run an
arbitrary computation on their combined inputs without compromising their privacy. Secure
computation offers a theoretical solution to a vast array of problems where one wishes to
simultaneously maintain a fine-grained control over the users' privacy and have flexibility
in how their data is used in a protocol. Over the past decade, secure computation has
largely emerged from the depth of theoretical research to enter the realm of practically-usable
technologies, and secure protocols are now routinely implemented and deployed. This is
the result of a widespread and ongoing research effort from the cryptography community,
which has produced a diverse ecosystem of protocols and paradigms optimized for a variety
of concrete applications. This book covers one such recent paradigm, the area of silent
secure computation, which strikes a careful balance between communication and computation
overheads. This paradigm has recently emerged as a promising path towards fast secure
computation in bandwidth-restricted settings, and has had a significant influence on the
landscape of practical secure computation. The goal of the book is to provide an accessible
introduction to silent secure computation. It is aimed at Ph.D. students and researchers
in cryptography and has a strong focus on explaining the intuitions and giving the reader
a sense of scale, in the hope of conveying insights about the practicality of silent secure
computation in various contexts and to give a clear overview of some of the core challenges
in the field.

Contents

1. Introduction.- 2. Secure Computation:  a Primer.- 3. Silent Secure Computation.- 4. Advanced Topics in Silent Secure Computation.- 5. Bibliography.

最近チェックした商品