1 Scopus citations

Abstract

The focus of this book is on constructing efficientsecure protocols for the two-party setting. In this introduction, we begin with a general high-level survey of secure multiparty computation. This places the topic of this book in its larger context. Following this, we describe the basic results and techniques related to efficiency in secure computation. Finally, we conclude with a roadmap to the book.

Original languageEnglish
Pages (from-to)3-18
Number of pages16
JournalInformation Security and Cryptography
Volume15
DOIs
StatePublished - 2010

Bibliographical note

Publisher Copyright:
© 2010, Springer-Verlag Berlin Heidelberg.

Fingerprint

Dive into the research topics of 'Introduction'. Together they form a unique fingerprint.

Cite this