Applications of secure multiparty computation
We generate and gather a lot of data about ourselves and others, some of it highly confidential. The collection, storage and use of this data is strictly regulated by laws, but restricting the use of data often limits the benefits which could be obtained from its analysis. Secure multi-party computa...
Otros Autores: | , , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Amsterdam, [The Netherlands] :
IOS Press
2015
2015. |
Edición: | 1st ed |
Colección: | Cryptology and information security series ;
Volume 13. |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009434528106719 |
Tabla de Contenidos:
- Title Page
- Preface
- Contents
- Chapter 1. Basic Constructions of Secure Multiparty Computation
- Chapter 2. Stateful Abstractions of Secure Multiparty Computation
- Chapter 3. Social Need for Secure Multiparty Computation
- Chapter 4. Statistical Analysis Methods Using Secure Multiparty Computation
- Chapter 5. Achieving Optimal Utility for Distributed Differential Privacy Using Secure Multiparty Computation
- Chapter 6. Oblivious Array Access for Secure Multiparty Computation
- Chapter 7. Business Process Engineering and Secure Multiparty Computation
- Chapter 8. Mechanism Design and Strong Truthfulness
- Chapter 9. Verifiable Computation in Multiparty Protocols with Honest Majority
- Chapter 10. Universally Verifiable Outsourcing and Application to Linear Programming
- Chapter 11. Transformation-Based Computation and Impossibility Results
- Chapter 12. Practical Applications of Secure Multiparty Computation
- Author Index.