TY - CHAP
T1 - General cryptographic protocols
T2 - The very basics
AU - Goldreich, Oded
PY - 2013
Y1 - 2013
N2 - We survey basic definitions and results concerning secure multi-party computations, where the two-party case is an important special case. In a nutshell, these results assert that, under a variety of reasonable settings and/or assumptions, it is possible to construct protocols for securely computing any desirable multi-party functionality. Confining ourselves to the very basics of this vast area of study, we focus on the stand-alone setting, while leaving the survey of the study of the security of concurrent executions to other surveys.
AB - We survey basic definitions and results concerning secure multi-party computations, where the two-party case is an important special case. In a nutshell, these results assert that, under a variety of reasonable settings and/or assumptions, it is possible to construct protocols for securely computing any desirable multi-party functionality. Confining ourselves to the very basics of this vast area of study, we focus on the stand-alone setting, while leaving the survey of the study of the security of concurrent executions to other surveys.
UR - http://www.scopus.com/inward/record.url?scp=84888196873&partnerID=8YFLogxK
U2 - https://doi.org/10.3233/978-1-61499-169-4-1
DO - https://doi.org/10.3233/978-1-61499-169-4-1
M3 - فصل
SN - 9781614991687
T3 - Cryptology and Information Security Series
SP - 1
EP - 27
BT - Secure Multi-Party Computation
PB - IOS Press
ER -