An Introduction to Secret Sharing: A Systematic Overview and Guide for Protocol Selection
This book provides an introduction to secret sharing, a key technology for practical applications and higher-level cryptographic prools.

This survey analyzes existing work, and systematically presents secret sharing prools for various adversary models. It provides intuitive as well as formal descriptions of the different types of adversaries, including their computational powers and capabilities. In addition, it then offers guidance and support in selecting the appropriate type of prool for a given application domain, present representative prools, and provide useful references for further reading and research.

This book aims to support software developers and engineers in realizing highly secure cloud-based applications, and also provides an introduction to the field including some relevant technical background for interested students and computer scientists.
1143037489
An Introduction to Secret Sharing: A Systematic Overview and Guide for Protocol Selection
This book provides an introduction to secret sharing, a key technology for practical applications and higher-level cryptographic prools.

This survey analyzes existing work, and systematically presents secret sharing prools for various adversary models. It provides intuitive as well as formal descriptions of the different types of adversaries, including their computational powers and capabilities. In addition, it then offers guidance and support in selecting the appropriate type of prool for a given application domain, present representative prools, and provide useful references for further reading and research.

This book aims to support software developers and engineers in realizing highly secure cloud-based applications, and also provides an introduction to the field including some relevant technical background for interested students and computer scientists.
49.99 Out Of Stock
An Introduction to Secret Sharing: A Systematic Overview and Guide for Protocol Selection

An Introduction to Secret Sharing: A Systematic Overview and Guide for Protocol Selection

An Introduction to Secret Sharing: A Systematic Overview and Guide for Protocol Selection

An Introduction to Secret Sharing: A Systematic Overview and Guide for Protocol Selection

Paperback(1st ed. 2023)

$49.99 
  • SHIP THIS ITEM
    Temporarily Out of Stock Online
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

This book provides an introduction to secret sharing, a key technology for practical applications and higher-level cryptographic prools.

This survey analyzes existing work, and systematically presents secret sharing prools for various adversary models. It provides intuitive as well as formal descriptions of the different types of adversaries, including their computational powers and capabilities. In addition, it then offers guidance and support in selecting the appropriate type of prool for a given application domain, present representative prools, and provide useful references for further reading and research.

This book aims to support software developers and engineers in realizing highly secure cloud-based applications, and also provides an introduction to the field including some relevant technical background for interested students and computer scientists.

Product Details

ISBN-13: 9783031281600
Publisher: Springer International Publishing
Publication date: 03/29/2023
Series: SpringerBriefs in Information Security and Cryptography
Edition description: 1st ed. 2023
Pages: 76
Product dimensions: 6.10(w) x 9.25(h) x (d)

About the Author

Stephan Krenn received his PhD in computer science from the University of Fribourg (Switzerland). After postdoc positions at IST Austria and IBM Research - Zurich, he joined AIT's cryptography group in 2015, where he is now a senior scientist. His main research interests are in the domain of privacy-enhancing technologies, anonymous authentication, malleable digital signatures, or similar. He is actively participating in cryptographic standardization initiatives, and chair of IFIP WG11.6 on Identity Management.

Thomas Lorünser is a senior scientist and team leader in AIT’s Center for Digital Safety & Security with a strong background in digitization, IT security and applied cryptography. He holds a degree from Technical University of Vienna and various professional certifications (CISSP, zPM, CDPSE, ..). Additionally, he teaches selected topics in Cloud Computing, Internet of Things and IT Security and also actively contributes to security and cryptography standards in the International Organization for Standardization (ISO, JTC1/SC27).

Table of Contents

1 Introduction.- 2. Preliminaries.- 3. Adversary Model for Secret Sharing Schemes.- 4. Basic Secret Sharing.- 5. Beyond Threshold Access Structures.- 6. Robust Secret Sharing.- 7. Verifiable Secret Sharing.- 8. Proactive Secret Sharing.- 9. Advanced Topics.- 10. Conclusion.
From the B&N Reads Blog

Customer Reviews