Friday, November 12, 2010

Efficient Secure Two-Party Protocols

The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation – both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions. The book opens with a general introduction to secure computation and then presents definitions of security for a number of different adversary models and definitional paradigms. In the second part, the book shows how any functionality can be securely computed in an efficient way in the presence of semi-honest, malicious and covert adversaries. These general constructions provide a basis for understanding the feasibility of secure computation, and they are a good introduction to design paradigms and proof techniques for efficient protocols.

The Standard of Good Practice for Information Security

The  Standard  of  Good  Practice  for  Information  Security  (the  Standard)  has  been  produced  by  the Information Security Forum  (ISF), an  international association of over 300  leading organisations which fund  and  co-operate  in  the  development  of  a  practical  research  programme  in  information  security. During the last 18 years the ISF has spent more than US$100 million providing authoritative material to its Members. The ISF’s work represents the most comprehensive and integrated set of material anywhere in the world in the area of information risk management. The Standard of Good Practice is a key deliverable from the ISF’s extensive work programme.