Skip to main content

Multiparty Computations

  • Chapter
  • First Online:
Book cover Moderne Verfahren der Kryptographie

Zusammenfassung

In diesem Kapitel stellen wir Protokolle vor, mit deren Hilfe zwei oder mehr Personen auf korrekte Art und Weise zusammenarbeiten können.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 29.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Literatur

  1. Abadi, M., Feigenbaum, J.: Secure Circuit Evaluation. J. Cryptology 2, 1–12 (1990)

    Article  MathSciNet  MATH  Google Scholar 

  2. Abadi, M., Feigenbaum, J., Kilian, J.: On Hiding Information from an Oracle. JCSS 39, 21–50 (1989)

    MathSciNet  MATH  Google Scholar 

  3. Beutelspacher, A., Rosenbaum, U.: Projektive Geometrie, 2. Aufl. Verlag Vieweg (2004)

    Book  MATH  Google Scholar 

  4. Crepeau, C.: A zero-knowledge Poker protocol that achieves confidentiality of the players’ strategy or How to achieve an electronic Poker face. Proc. CRYPTO ’86, A. M. Odlyzko (ed.), Springer LNCS 263, 239–247

    Google Scholar 

  5. Kersten, A.G.: Shared Secret Schemes aus Geometrischer Sicht. Mitt. aus dem Math. Sem. Gießen (208) (1992)

    Google Scholar 

  6. Salomaa, A.: Public-Key Cryptography. Springer Verlag, Berlin Heidelberg (1990)

    Book  MATH  Google Scholar 

  7. Shamir, A.: How to Share a Secret. Comm. ACM 24(11), 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  8. Shamir, A., Rivest, R.L., Adleman, L.M.: Mental Poker. Technical report MIT/LCS/TM-125, 1979

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Klaus-Dieter Wolfenstetter .

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Fachmedien Wiesbaden

About this chapter

Cite this chapter

Beutelspacher, A., Schwenk, J., Wolfenstetter, KD. (2015). Multiparty Computations. In: Moderne Verfahren der Kryptographie. Springer Spektrum, Wiesbaden. https://doi.org/10.1007/978-3-8348-2322-9_5

Download citation

Publish with us

Policies and ethics