Record Detail Back

XML

Computer Security – ESORICS 2013


For many decades multi-party computation (MPC) had been a predominantly theoretic endeavour in cryptography, but in recent years interest has arisen on the practical side. This has resulted in various implementation improvements and such protocols are becoming more applicable to practical situations. A key part in this transformation from theory to practice is in adapting theoretical protocols and applying implementation techniques so as to significantly improve performance, whilst not sacrificing the level of security required by real world applications. This paper follows this modern, more practical, trend. Early applied work on MPC focused on the case of protocols secure against passive adversaries, both in the case of two-party protocols based on Yao circuits [18] and that of many-party protocols, based on secret sharing techniques [5,9,22]. Only in recent years work has shifted to achieve active security [16,17,21], which appears to come at vastly increased cost when dealing with more than two players. On the other hand, in the real applications active security may be more stringent than one would actually require.
978-3-642-40202-9
NONE
Information Technology
English
2013
1-810
LOADING LIST...
LOADING LIST...