商品簡介
Computer scientists explain a cryptographic technology in which the parties provide their inputs to a cryptographic protocol that is used to compute a pre-agreed function in such a manner that during the protocol, a party or a sufficiently small coalition of parties sees nothing more that they could deduce from the party's or coalition's inputs and outputs. Their topics include stated abstractions of secure multiparty computation (SMC), statistical analysis methods using SMC, oblivious array access, mechanism design and strong truthfulness, universally verifiable outsourcing and application to linear programming, and transformation-based computation and impossible results. Annotation c2015 Ringgold, Inc., Portland, OR (protoview.com)