General cryptographic protocols: The very basics

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

We survey basic definitions and results concerning secure multi-party computations, where the two-party case is an important special case. In a nutshell, these results assert that, under a variety of reasonable settings and/or assumptions, it is possible to construct protocols for securely computing any desirable multi-party functionality. Confining ourselves to the very basics of this vast area of study, we focus on the stand-alone setting, while leaving the survey of the study of the security of concurrent executions to other surveys.

Original languageEnglish
Title of host publicationSecure Multi-Party Computation
PublisherIOS Press
Pages1-27
Number of pages27
ISBN (Print)9781614991687
DOIs
StatePublished - 2013

Publication series

NameCryptology and Information Security Series

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Electrical and Electronic Engineering
  • Computer Science Applications

Cite this