×







We sell 100% Genuine & New Books only!

Secure Multiparty Computation And Secret Sharing at Meripustak

Secure Multiparty Computation And Secret Sharing by Ronald Cramer , Ivan Bjerre Damgård , Jesper Buus Nielsen, CAMBRIDGE UNIVERSITY PRESS

Books from same Author: Ronald Cramer , Ivan Bjerre Damgård , Jesper Buus Nielsen

Books from same Publisher: CAMBRIDGE UNIVERSITY PRESS

Related Category: Author List / Publisher List


  • Price: ₹ 7566.00/- [ 15.00% off ]

    Seller Price: ₹ 6431.00

Estimated Delivery Time : 4-5 Business Days

Sold By: Meripustak      Click for Bulk Order

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

We deliver across all postal codes in India

Orders Outside India


Add To Cart


Outside India Order Estimated Delivery Time
7-10 Business Days


  • We Deliver Across 100+ Countries

  • MeriPustak’s Books are 100% New & Original
  • General Information  
    Author(s)Ronald Cramer , Ivan Bjerre Damgård , Jesper Buus Nielsen
    PublisherCAMBRIDGE UNIVERSITY PRESS
    ISBN9781107043053
    Pages416
    BindingPaperback
    Language_x000D_English
    Publish YearMay 2018

    Description

    CAMBRIDGE UNIVERSITY PRESS Secure Multiparty Computation And Secret Sharing by Ronald Cramer , Ivan Bjerre Damgård , Jesper Buus Nielsen

    In a data-driven society, individuals and companies encounter numerous situations where private information is an important resource. How can parties handle confidential data if they do not trust everyone involved? This text is the first to present a comprehensive treatment of unconditionally secure techniques for multiparty computation MPC and secret sharing. In a secure MPC, each party possesses some private data, while secret sharing provides a way for one party to spread information on a secret such that all parties together hold full information, yet no single party has all the information. The authors present basic feasibility results from the last 30 years, generalizations to arbitrary access structures using linear secret sharing, some recent techniques for efficiency improvements, and a general treatment of the theory of secret sharing, focusing on asymptotic results with interesting applications related to MPC.show more



    Book Successfully Added To Your Cart