569d0aba3567e.jpg
PDF
Secure Multiparty Computation And Secret Sharing

This text is the first to present a comprehensive treatment of unconditionally secure techniques for multiparty computation and secret sharing. The authors present feasibility results from the last 30 years, generalizations to arbitrary access structures, some techniques for efficiency improvements, and a general treatment of the theory of secret sharing. In a data-driven society, individuals and companies encounter numerous situatio...