TY - JOUR
T1 - Introduction
AU - Hazay, Carmit
AU - Lindell, Yehuda
N1 - Publisher Copyright:
© 2010, Springer-Verlag Berlin Heidelberg.
PY - 2010
Y1 - 2010
N2 - The focus of this book is on constructing efficientsecure protocols for the two-party setting. In this introduction, we begin with a general high-level survey of secure multiparty computation. This places the topic of this book in its larger context. Following this, we describe the basic results and techniques related to efficiency in secure computation. Finally, we conclude with a roadmap to the book.
AB - The focus of this book is on constructing efficientsecure protocols for the two-party setting. In this introduction, we begin with a general high-level survey of secure multiparty computation. This places the topic of this book in its larger context. Following this, we describe the basic results and techniques related to efficiency in secure computation. Finally, we conclude with a roadmap to the book.
UR - http://www.scopus.com/inward/record.url?scp=85019677622&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-14303-8_1
DO - 10.1007/978-3-642-14303-8_1
M3 - ???researchoutput.researchoutputtypes.contributiontojournal.editorial???
AN - SCOPUS:85019677622
SN - 1619-7100
VL - 15
SP - 3
EP - 18
JO - Information Security and Cryptography
JF - Information Security and Cryptography
ER -