Applications of secure multiparty computation

We generate and gather a lot of data about ourselves and others, some of it highly confidential. The collection, storage and use of this data is strictly regulated by laws, but restricting the use of data often limits the benefits which could be obtained from its analysis. Secure multi-party computa...

Descripción completa

Detalles Bibliográficos
Otros Autores: L. Kamm (ed.) (auth), Laud, Peeter, editor (editor), Kamm, Liina, editor
Formato: Libro electrónico
Idioma:Inglés
Publicado: Amsterdam, [The Netherlands] : IOS Press 2015
2015.
Edición:1st ed
Colección:Cryptology and information security series ; Volume 13.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009434528106719
Tabla de Contenidos:
  • Title Page
  • Preface
  • Contents
  • Chapter 1. Basic Constructions of Secure Multiparty Computation
  • Chapter 2. Stateful Abstractions of Secure Multiparty Computation
  • Chapter 3. Social Need for Secure Multiparty Computation
  • Chapter 4. Statistical Analysis Methods Using Secure Multiparty Computation
  • Chapter 5. Achieving Optimal Utility for Distributed Differential Privacy Using Secure Multiparty Computation
  • Chapter 6. Oblivious Array Access for Secure Multiparty Computation
  • Chapter 7. Business Process Engineering and Secure Multiparty Computation
  • Chapter 8. Mechanism Design and Strong Truthfulness
  • Chapter 9. Verifiable Computation in Multiparty Protocols with Honest Majority
  • Chapter 10. Universally Verifiable Outsourcing and Application to Linear Programming
  • Chapter 11. Transformation-Based Computation and Impossibility Results
  • Chapter 12. Practical Applications of Secure Multiparty Computation
  • Author Index.