Language:
    • Available Formats
    •  
    • Availability
    • Priced From ( in USD )
    • PDF
    • Immediate download
    • $90.00
      Members pay $67.50
    • Add to Cart
    • Printed Edition
    • Ships in 1-2 business days
    • $90.00
      Members pay $67.50
    • Add to Cart

Customers Who Bought This Also Bought

 

About This Item

 

Full Description

This document specifies the processes for secure multiparty computation mechanisms based on the secret sharing techniques which are specified in ISO/IEC 19592-2. Secure multiparty computation based on secret sharing can be used for confidential data processing. Examples of possible applications include collaborative data analytics or machine learning where data are kept secret, secure auctions where each bidding price is hidden, and performing cryptographic operations where the secrecy of the private keys is maintained. This document specifies the mechanisms including but not limited to addition, subtraction, multiplication by a constant, shared random number generation, and multiplication with their parameters and properties. This document describes how to perform a secure function evaluation using these mechanisms and secret sharing techniques.

 

Document History

  1. DANSK DSF/ISO/IEC FDIS 4922-2


    Information security – Secure multiparty computation – Part 2: Mechanisms based on secret sharing

    • Historical Version
  2. DANSK DS/ISO/IEC 4922-2

    👀 currently
    viewing


    Information security – Secure multiparty computation – Part 2: Mechanisms based on secret sharing

    • Most Recent