Description: An Introduction to Secret Sharing by Stephan Krenn, Thomas LorÜnser This book provides an introduction to secret sharing, a key technology for practical applications and higher-level cryptographic protocols. FORMAT Paperback CONDITION Brand New Publisher Description This book provides an introduction to secret sharing, a key technology for practical applications and higher-level cryptographic protocols. This survey analyzes existing work, and systematically presents secret sharing protocols for various adversary models. It provides intuitive as well as formal descriptions of the different types of adversaries, including their computational powers and capabilities. In addition, it then offers guidance and support in selecting the appropriate type of protocol for a given application domain, present representative protocols, and provide useful references for further reading and research. This book aims to support software developers and engineers in realizing highly secure cloud-based applications, and also provides an introduction to the field including some relevant technical background for interested students and computer scientists. Author Biography Stephan Krenn received his PhD in computer science from the University of Fribourg (Switzerland). After postdoc positions at IST Austria and IBM Research - Zurich, he joined AITs cryptography group in 2015, where he is now a senior scientist. His main research interests are in the domain of privacy-enhancing technologies, anonymous authentication, malleable digital signatures, or similar. He is actively participating in cryptographic standardization initiatives, and chair of IFIP WG11.6 on Identity Management.Thomas LorÜnser is a senior scientist and team leader in AITs Center for Digital Safety & Security with a strong background in digitization, IT security and applied cryptography. He holds a degree from Technical University of Vienna and various professional certifications (CISSP, zPM, CDPSE, ..). Additionally, he teaches selected topics in Cloud Computing, Internet of Things and IT Security and also actively contributes to security and cryptography standards in the International Organization for Standardization (ISO, JTC1/SC27). Table of Contents 1 Introduction.- 2. Preliminaries.- 3. Adversary Model for Secret Sharing Schemes.- 4. Basic Secret Sharing.- 5. Beyond Threshold Access Structures.- 6. Robust Secret Sharing.- 7. Verifiable Secret Sharing.- 8. Proactive Secret Sharing.- 9. Advanced Topics.- 10. Conclusion. Details ISBN3031281608 Author Thomas LorÜnser Publisher Springer International Publishing AG Series SpringerBriefs in Information Security and Cryptography Year 2023 ISBN-13 9783031281600 Format Paperback Imprint Springer International Publishing AG Subtitle A Systematic Overview and Guide for Protocol Selection Place of Publication Cham Country of Publication Switzerland Pages 76 Edition 1st Publication Date 2023-03-29 ISBN-10 3031281608 UK Release Date 2023-03-29 Edition Description 1st ed. 2023 DEWEY 005.8 Audience Professional & Vocational Illustrations 6 Illustrations, color; 2 Illustrations, black and white; X, 76 p. 8 illus., 6 illus. in color. We've got this At The Nile, if you're looking for it, we've got it. With fast shipping, low prices, friendly service and well over a million items - you're bound to find what you want, at a price you'll love! TheNile_Item_ID:141819391;
Price: 86.35 AUD
Location: Melbourne
End Time: 2024-12-12T03:08:26.000Z
Shipping Cost: 9.37 AUD
Product Images
Item Specifics
Restocking fee: No
Return shipping will be paid by: Buyer
Returns Accepted: Returns Accepted
Item must be returned within: 30 Days
Format: Paperback
ISBN-13: 9783031281600
Author: Stephan Krenn, Thomas Lornser
Type: Does not apply
Book Title: An Introduction to Secret Sharing
Language: Does not apply