Abstract
The focus of this book is on constructing efficientsecure protocols for the two-party setting. In this introduction, we begin with a general high-level survey of secure multiparty computation. This places the topic of this book in its larger context. Following this, we describe the basic results and techniques related to efficiency in secure computation. Finally, we conclude with a roadmap to the book.
| Original language | English |
|---|---|
| Pages (from-to) | 3-18 |
| Number of pages | 16 |
| Journal | Information Security and Cryptography |
| Volume | 15 |
| DOIs | |
| State | Published - 2010 |
Bibliographical note
Publisher Copyright:© 2010, Springer-Verlag Berlin Heidelberg.
Fingerprint
Dive into the research topics of 'Introduction'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver