Book contents
- Frontmatter
- Dedication
- Contents
- Preface
- 1 Introduction
- Part I External Adversary: Encryption, Authentication, Secret Key
- Part II Internal Adversary: Secure Computation
- 11 Secret Sharing
- 12 Two-party Secure Computation for a Passive Adversary
- 13 Oblivious Transfer from Correlated Randomness
- 14 Bit Commitment from Correlated Randomness
- 15 Active Adversary and Composable Security
- 16 Zero-knowledge Proof
- 17 Two-party Secure Computation for an Active Adversary
- 18 Broadcast, Byzantine Agreement, and Digital Signature
- 19 Multiparty Secure Computation
- Appendix Solutions to Selected Problems
- References
- Symbol Index
- Index
17 - Two-party Secure Computation for an Active Adversary
from Part II - Internal Adversary: Secure Computation
Published online by Cambridge University Press: 23 March 2023
- Frontmatter
- Dedication
- Contents
- Preface
- 1 Introduction
- Part I External Adversary: Encryption, Authentication, Secret Key
- Part II Internal Adversary: Secure Computation
- 11 Secret Sharing
- 12 Two-party Secure Computation for a Passive Adversary
- 13 Oblivious Transfer from Correlated Randomness
- 14 Bit Commitment from Correlated Randomness
- 15 Active Adversary and Composable Security
- 16 Zero-knowledge Proof
- 17 Two-party Secure Computation for an Active Adversary
- 18 Broadcast, Byzantine Agreement, and Digital Signature
- 19 Multiparty Secure Computation
- Appendix Solutions to Selected Problems
- References
- Symbol Index
- Index
Summary
- Type
- Chapter
- Information
- Information-theoretic Cryptography , pp. 374 - 398Publisher: Cambridge University PressPrint publication year: 2023