翻訳と辞書
Words near each other
・ Secure Operations Language
・ Secure Password Authentication
・ Secure Real-time Transport Protocol
・ Secure Remote Password protocol
・ Secure Rural Schools and Community Self-Determination Act of 2000
・ Secure Shell
・ Secure Socket Tunneling Protocol
・ Secure state
・ Secure Stations Scheme
・ Secure Store and Forward
・ Secure telephone
・ Secure tenancy
・ Secure Terminal Equipment
・ Secure transmission
・ Secure Trust Bank
Secure two-party computation
・ Secure units for children
・ Secure User Plane Location
・ Secure voice
・ Secure Web SmartFilter EDU
・ Secure-adaptive architecture
・ Secure64 Software
・ SecureAuth
・ Securebox
・ SecureCRT
・ Secured creditor
・ Secured loan
・ Secured transaction
・ Secured transactions in the United States
・ SecureDataRecovery


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Secure two-party computation : ウィキペディア英語版
Secure two-party computation
Secure two-party computation (2PC) is sub-problem of secure multi-party computation (MPC) that has received special attention by researchers because of its close relation to many cryptographic tasks. It is concerned with the question: 'Can two party computation be achieved more efficiently and under weaker security assumptions than general MPC?'
Yao's protocol for two-party computation only provided security against passive adversaries. 2PC protocols that are secure against active adversaries were proposed by Lindell and Pinkas, Ishai, Prabhakaran and Sahai and Nielsen and Orlandi.
Another solution for this problem, that explicitly works with committed input was proposed by Jarecki and Shmatikov.
==Security==
The security of a two-party computation protocol is usually defined through a comparison with an idealised scenario that is secure by definition. The idealised scenario involves a trusted party that collects the input of the two parties over secure channels and returns the result if none of the parties chooses to abort. The cryptographic two-party computation protocol is secure, if it behaves no worse than this ideal protocol, but without the additional trust assumptions. This is usually modeled using a simulator. The task of the simulator is to act as a wrapper around the idealised protocol to make it appear like the cryptographic protocol. The simulation succeeds with respect to an information theoretic, respectively computationally bounded adversary if the output of the simulator is statistically close to, respectively computationally indistinguishable from the output of the cryptographic protocol. A two-party computation protocol is secure, if for all adversaries there exists a successful simulator.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Secure two-party computation」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.