The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation – both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions. The book opens with a general introduction to secure computation and then presents definitions of security for a number of different adversary models and definitional paradigms. In the second part, the book shows how any functionality can be securely computed in an efficient way in the presence of semi-honest, malicious and covert adversaries. These general constructions provide a basis for understanding the feasibility of secure computation, and they are a good introduction to design paradigms and proof techniques for efficient protocols. Friday, November 12, 2010
Efficient Secure Two-Party Protocols
Labels:
Computer,
Information Security,
Internet,
IT,
Networking,
Protocols
The Standard of Good Practice for Information Security
The Standard of Good Practice for Information Security (the Standard) has been produced by the Information Security Forum (ISF), an international association of over 300 leading organisations which fund and co-operate in the development of a practical research programme in information security. During the last 18 years the ISF has spent more than US$100 million providing authoritative material to its Members. The ISF’s work represents the most comprehensive and integrated set of material anywhere in the world in the area of information risk management. The Standard of Good Practice is a key deliverable from the ISF’s extensive work programme.
Labels:
Information Security,
Internet,
IT