找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Composition of Secure Multi-Party Protocols; A Comprehensive Stud Yehuda Lindell Book 2003 Springer-Verlag Berlin Heidelberg 2003 Byzantine

[復(fù)制鏈接]
查看: 46095|回復(fù): 35
樓主
發(fā)表于 2025-3-21 18:11:16 | 只看該作者 |倒序瀏覽 |閱讀模式
書目名稱Composition of Secure Multi-Party Protocols
副標(biāo)題A Comprehensive Stud
編輯Yehuda Lindell
視頻videohttp://file.papertrans.cn/232/231848/231848.mp4
叢書名稱Lecture Notes in Computer Science
圖書封面Titlebook: Composition of Secure Multi-Party Protocols; A Comprehensive Stud Yehuda Lindell Book 2003 Springer-Verlag Berlin Heidelberg 2003 Byzantine
描述.In the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs. General results concerning secure two-party or multi-party computation were first announced in the 1980s. Put briefly, these results assert that?under certain assumptions one can construct protocols for securely computing any desired multi-party functionality. However, this research relates only to a setting where a single protocol execution is carried out. In contrast, in modern networks, many different protocol executions are run at the same time...This book is devoted to the general and systematic study of secure multi-party computation under composition. Despite?its emphasis on a theoretically well-founded treatment of the subject, general techniques for designing secure protocols are developed that?may even result in schemes or modules to be incorporated in practical systems. The book clarifies fundamental issues regarding security in a multi-execution environment and gives a comprehensive and unique treatment of the composition of secure multi-party protocols..
出版日期Book 2003
關(guān)鍵詞Byzantine agreement protocols; broadcast protocols; cryptographic protocol; cryptographic protocols; e-c
版次1
doihttps://doi.org/10.1007/b13246
isbn_softcover978-3-540-20105-2
isbn_ebook978-3-540-39819-6Series ISSN 0302-9743 Series E-ISSN 1611-3349
issn_series 0302-9743
copyrightSpringer-Verlag Berlin Heidelberg 2003
The information of publication is updating

書目名稱Composition of Secure Multi-Party Protocols影響因子(影響力)




書目名稱Composition of Secure Multi-Party Protocols影響因子(影響力)學(xué)科排名




書目名稱Composition of Secure Multi-Party Protocols網(wǎng)絡(luò)公開度




書目名稱Composition of Secure Multi-Party Protocols網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Composition of Secure Multi-Party Protocols被引頻次




書目名稱Composition of Secure Multi-Party Protocols被引頻次學(xué)科排名




書目名稱Composition of Secure Multi-Party Protocols年度引用




書目名稱Composition of Secure Multi-Party Protocols年度引用學(xué)科排名




書目名稱Composition of Secure Multi-Party Protocols讀者反饋




書目名稱Composition of Secure Multi-Party Protocols讀者反饋學(xué)科排名




單選投票, 共有 1 人參與投票
 

0票 0.00%

Perfect with Aesthetics

 

0票 0.00%

Better Implies Difficulty

 

0票 0.00%

Good and Satisfactory

 

1票 100.00%

Adverse Performance

 

0票 0.00%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 21:10:46 | 只看該作者
0302-9743 t in schemes or modules to be incorporated in practical systems. The book clarifies fundamental issues regarding security in a multi-execution environment and gives a comprehensive and unique treatment of the composition of secure multi-party protocols..978-3-540-20105-2978-3-540-39819-6Series ISSN 0302-9743 Series E-ISSN 1611-3349
板凳
發(fā)表于 2025-3-22 04:06:56 | 只看該作者
https://doi.org/10.1007/978-94-017-3076-1 In particular, assuming a public-key infrastructure for digital signatures, it is known that secure broadcast can be achieved for . number of corrupted parties in the stand-alone model. In this chapter, we show that an analogous result that composes cannot be achieved. That is, when a third or more
地板
發(fā)表于 2025-3-22 07:15:20 | 只看該作者
5#
發(fā)表于 2025-3-22 09:20:06 | 只看該作者
Status as Concept and Social Fact,f corrupted parties. That is, we consider an asynchronous multi-party network and an adversary that can adaptively corrupt as many parties as it wishes. We present protocols that allow any subset of parties in this setting to securely realize any desired functionality of their inputs, and be guarant
6#
發(fā)表于 2025-3-22 13:43:11 | 只看該作者
7#
發(fā)表于 2025-3-22 20:38:22 | 只看該作者
https://doi.org/10.1007/b13246Byzantine agreement protocols; broadcast protocols; cryptographic protocol; cryptographic protocols; e-c
8#
發(fā)表于 2025-3-22 23:12:07 | 只看該作者
978-3-540-20105-2Springer-Verlag Berlin Heidelberg 2003
9#
發(fā)表于 2025-3-23 03:34:43 | 只看該作者
10#
發(fā)表于 2025-3-23 05:57:42 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-7 19:47
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
咸丰县| 凤凰县| 麻江县| 大渡口区| 黔西县| 巴南区| 洪泽县| 无锡市| 古浪县| 会东县| 祥云县| 同江市| 上高县| 南宁市| 丹凤县| 新安县| 昌都县| 洛扎县| 叙永县| 景洪市| 平安县| 安龙县| 樟树市| 当涂县| 铁岭市| 海兴县| 米林县| 安阳市| 馆陶县| 玉田县| 兴仁县| 辽阳县| 苏尼特左旗| 霍山县| 谷城县| 化德县| 海南省| 济阳县| 昌黎县| 新余市| 鹤岗市|