Composition of Secure Multi-Party Protocols

Composition of Secure Multi-Party Protocols
About this book
"This book is devoted to the general and systematic study of secure multi-party computation under composition. Despite its emphasis on a theoretically well-founded treatment of the subject, general techniques for designing secure protocols are developed that may even result in schemes or modules to be incorporated in practical systems.
The book clarifies fundamental issues regarding security in a multi-execution environment and gives a comprehensive and unique treatment of the composition of secure multi-party protocols."--Jacket.
Details
- OL Work ID
- OL9240406W
Subjects
ComputersComputer securityAccess controlComputers, access controlComputer scienceComputer networksOperating systems (Computers)Data encryption (Computer science)