Fr. 69.00

An Introduction to Silent Secure Computation

English · Paperback / Softback

Will be released 03.12.2025

Description

Read more

Secure computation allows any number of mutually distrustful parties to jointly run an
arbitrary computation on their combined inputs without compromising their privacy. Secure
computation offers a theoretical solution to a vast array of problems where one wishes to
simultaneously maintain a fine-grained control over the users privacy and have flexibility
in how their data is used in a protocol. Over the past decade, secure computation has
largely emerged from the depth of theoretical research to enter the realm of practically-usable
technologies, and secure protocols are now routinely implemented and deployed. This is
the result of a widespread and ongoing research effort from the cryptography community,
which has produced a diverse ecosystem of protocols and paradigms optimized for a variety
of concrete applications. This book covers one such recent paradigm, the area of silent
secure computation, which strikes a careful balance between communication and computation
overheads. This paradigm has recently emerged as a promising path towards fast secure
computation in bandwidth-restricted settings, and has had a significant influence on the
landscape of practical secure computation. The goal of the book is to provide an accessible
introduction to silent secure computation. It is aimed at Ph.D. students and researchers
in cryptography and has a strong focus on explaining the intuitions and giving the reader
a sense of scale, in the hope of conveying insights about the practicality of silent secure
computation in various contexts and to give a clear overview of some of the core challenges
in the field.

List of contents

1. Introduction.- 2. Secure Computation:  a Primer.- 3. Silent Secure Computation.- 4. Advanced Topics in Silent Secure Computation.- 5. Bibliography.

About the author

The author is a CNRS research scientist at IRIF, Université Paris Cité. He received his PhD from École Normale supérieure (ENS) in November 2017, under the supervision of David Pointcheval and Hoeteck Wee. In 2017-2019,  he was a postdoctoral researcher at Karlsruhe Institute of Technology (KIT), in the team of Dennis Hofheinz. His main research interests are secure computation and zero-knowledge proofs (both foundational and pratical aspects), as well as the theoretical foundations of cryptography. Over the past decade, some of his main lines of work include the development of methods to generate correlated pseudorandomness, the design of secure protocols with communication sublinear in the circuit size, the study of minimal assumptions for non-interactive zero-knowledge, and some explorations in the realm of fine-grained cryptography.

Summary

Secure computation allows any number of mutually distrustful parties to jointly run an
arbitrary computation on their combined inputs without compromising their privacy. Secure
computation offers a theoretical solution to a vast array of problems where one wishes to
simultaneously maintain a fine-grained control over the users’ privacy and have flexibility
in how their data is used in a protocol. Over the past decade, secure computation has
largely emerged from the depth of theoretical research to enter the realm of practically-usable
technologies, and secure protocols are now routinely implemented and deployed. This is
the result of a widespread and ongoing research effort from the cryptography community,
which has produced a diverse ecosystem of protocols and paradigms optimized for a variety
of concrete applications. This book covers one such recent paradigm, the area of silent
secure computation, which strikes a careful balance between communication and computation
overheads. This paradigm has recently emerged as a promising path towards fast secure
computation in bandwidth-restricted settings, and has had a significant influence on the
landscape of practical secure computation. The goal of the book is to provide an accessible
introduction to silent secure computation. It is aimed at Ph.D. students and researchers
in cryptography and has a strong focus on explaining the intuitions and giving the reader
a sense of scale, in the hope of conveying insights about the practicality of silent secure
computation in various contexts and to give a clear overview of some of the core challenges
in the field.

Product details

Authors Geoffroy Couteau
Publisher Springer, Berlin
 
Languages English
Product format Paperback / Softback
Release 03.12.2025
 
EAN 9783032070883
ISBN 978-3-0-3207088-3
No. of pages 140
Illustrations XII, 140 p. 11 illus., 6 illus. in color.
Series SpringerBriefs in Information Security and Cryptography
Subjects Natural sciences, medicine, IT, technology > IT, data processing > IT

Computersicherheit, Netzwerksicherheit, Kryptografie, Verschlüsselungstechnologie, Theoretische Informatik, cryptography, Data and Information Security, Theory of Computation, Cryptology, secure computation, Correlated pseudorandomness, Zero-knowledge, Provable Security

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.