找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Composition of Secure Multi-Party Protocols; A Comprehensive Stud Yehuda Lindell Book 2003 Springer-Verlag Berlin Heidelberg 2003 Byzantine

[復(fù)制鏈接]
查看: 46097|回復(fù): 35
樓主
發(fā)表于 2025-3-21 18:11:16 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書目名稱Composition of Secure Multi-Party Protocols
副標(biāo)題A Comprehensive Stud
編輯Yehuda Lindell
視頻videohttp://file.papertrans.cn/232/231848/231848.mp4
叢書名稱Lecture Notes in Computer Science
圖書封面Titlebook: Composition of Secure Multi-Party Protocols; A Comprehensive Stud Yehuda Lindell Book 2003 Springer-Verlag Berlin Heidelberg 2003 Byzantine
描述.In the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs. General results concerning secure two-party or multi-party computation were first announced in the 1980s. Put briefly, these results assert that?under certain assumptions one can construct protocols for securely computing any desired multi-party functionality. However, this research relates only to a setting where a single protocol execution is carried out. In contrast, in modern networks, many different protocol executions are run at the same time...This book is devoted to the general and systematic study of secure multi-party computation under composition. Despite?its emphasis on a theoretically well-founded treatment of the subject, general techniques for designing secure protocols are developed that?may even result in schemes or modules to be incorporated in practical systems. The book clarifies fundamental issues regarding security in a multi-execution environment and gives a comprehensive and unique treatment of the composition of secure multi-party protocols..
出版日期Book 2003
關(guān)鍵詞Byzantine agreement protocols; broadcast protocols; cryptographic protocol; cryptographic protocols; e-c
版次1
doihttps://doi.org/10.1007/b13246
isbn_softcover978-3-540-20105-2
isbn_ebook978-3-540-39819-6Series ISSN 0302-9743 Series E-ISSN 1611-3349
issn_series 0302-9743
copyrightSpringer-Verlag Berlin Heidelberg 2003
The information of publication is updating

書目名稱Composition of Secure Multi-Party Protocols影響因子(影響力)




書目名稱Composition of Secure Multi-Party Protocols影響因子(影響力)學(xué)科排名




書目名稱Composition of Secure Multi-Party Protocols網(wǎng)絡(luò)公開度




書目名稱Composition of Secure Multi-Party Protocols網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Composition of Secure Multi-Party Protocols被引頻次




書目名稱Composition of Secure Multi-Party Protocols被引頻次學(xué)科排名




書目名稱Composition of Secure Multi-Party Protocols年度引用




書目名稱Composition of Secure Multi-Party Protocols年度引用學(xué)科排名




書目名稱Composition of Secure Multi-Party Protocols讀者反饋




書目名稱Composition of Secure Multi-Party Protocols讀者反饋學(xué)科排名




單選投票, 共有 1 人參與投票
 

0票 0.00%

Perfect with Aesthetics

 

0票 0.00%

Better Implies Difficulty

 

0票 0.00%

Good and Satisfactory

 

1票 100.00%

Adverse Performance

 

0票 0.00%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 21:10:46 | 只看該作者
0302-9743 t in schemes or modules to be incorporated in practical systems. The book clarifies fundamental issues regarding security in a multi-execution environment and gives a comprehensive and unique treatment of the composition of secure multi-party protocols..978-3-540-20105-2978-3-540-39819-6Series ISSN 0302-9743 Series E-ISSN 1611-3349
板凳
發(fā)表于 2025-3-22 04:06:56 | 只看該作者
https://doi.org/10.1007/978-94-017-3076-1 In particular, assuming a public-key infrastructure for digital signatures, it is known that secure broadcast can be achieved for . number of corrupted parties in the stand-alone model. In this chapter, we show that an analogous result that composes cannot be achieved. That is, when a third or more
地板
發(fā)表于 2025-3-22 07:15:20 | 只看該作者
5#
發(fā)表于 2025-3-22 09:20:06 | 只看該作者
Status as Concept and Social Fact,f corrupted parties. That is, we consider an asynchronous multi-party network and an adversary that can adaptively corrupt as many parties as it wishes. We present protocols that allow any subset of parties in this setting to securely realize any desired functionality of their inputs, and be guarant
6#
發(fā)表于 2025-3-22 13:43:11 | 只看該作者
7#
發(fā)表于 2025-3-22 20:38:22 | 只看該作者
https://doi.org/10.1007/b13246Byzantine agreement protocols; broadcast protocols; cryptographic protocol; cryptographic protocols; e-c
8#
發(fā)表于 2025-3-22 23:12:07 | 只看該作者
978-3-540-20105-2Springer-Verlag Berlin Heidelberg 2003
9#
發(fā)表于 2025-3-23 03:34:43 | 只看該作者
10#
發(fā)表于 2025-3-23 05:57:42 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-7 21:21
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
远安县| 黔西县| 灵璧县| 兴仁县| 凤阳县| 辽源市| 青冈县| 当雄县| 周至县| 获嘉县| 密山市| 谢通门县| 闽侯县| 靖宇县| 襄城县| 杭州市| 长顺县| 旌德县| 佛坪县| 荔浦县| 依兰县| 福泉市| 绍兴县| 永善县| 阿拉善盟| 日喀则市| 射阳县| 封开县| 沁水县| 成武县| 唐海县| 邵武市| 东莞市| 延长县| 内丘县| 平潭县| 鄂伦春自治旗| 林口县| 禹州市| 江口县| 湘西|