Abstract
In this chapter we present a number of definitions of security for secure computation. Specifically, in Sections 2.2 to 2.4 we present definitions of security for semi-honest, malicious and covert adversaries; all these definitions are based on the ideal/real-model paradigm for formulating security. We begin with the classic definitions of security in the presence of semi-honest and malicious adversaries, and then proceed to the more recent notion of security in the presence of covert adversaries.
Original language | English |
---|---|
Title of host publication | Information Security and Cryptography |
Publisher | Springer International Publishing |
Pages | 19-49 |
Number of pages | 31 |
DOIs | |
State | Published - 2010 |
Publication series
Name | Information Security and Cryptography |
---|---|
Volume | 15 |
ISSN (Print) | 1619-7100 |
ISSN (Electronic) | 2197-845X |
Bibliographical note
Publisher Copyright:© 2010, Springer-Verlag Berlin Heidelberg.