Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
Secure computation allows any number of mutually distrustful parties to jointly run anarbitrary computation on their combined inputs without compromising their privacy. Securecomputation offers a theoretical solution to a vast array of problems where one wishes tosimultaneously maintain a fine-grained control over the users' privacy and have flexibilityin how their data is used in a protocol. Over the past decade, secure computation haslargely emerged from the depth of theoretical research to enter the realm of practically-usabletechnologies, and secure protocols are now routinely implemented and deployed. This isthe result of a widespread and ongoing research effort from the cryptography community,which has produced a diverse ecosystem of protocols and paradigms optimized for a varietyof concrete applications. This book covers one such recent paradigm, the area of silentsecure computation, which strikes a careful balance between communication and computationoverheads. This paradigm has recently emerged as a promising path towards fast securecomputation in bandwidth-restricted settings, and has had a significant influence on thelandscape of practical secure computation. The goal of the book is to provide an accessibleintroduction to silent secure computation. It is aimed at Ph.D. students and researchersin cryptography and has a strong focus on explaining the intuitions and giving the readera sense of scale, in the hope of conveying insights about the practicality of silent securecomputation in various contexts and to give a clear overview of some of the core challengesin the field.
The author is a CNRS research scientist at IRIF, Université Paris Cité. He received his PhD from École Normale supérieure (ENS) in November 2017, under the supervision of David Pointcheval and Hoeteck Wee. In 2017-2019, he was a postdoctoral researcher at Karlsruhe Institute of Technology (KIT), in the team of Dennis Hofheinz. His main research interests are secure computation and zero-knowledge proofs (both foundational and pratical aspects), as well as the theoretical foundations of cryptography. Over the past decade, some of his main lines of work include the development of methods to generate correlated pseudorandomness, the design of secure protocols with communication sublinear in the circuit size, the study of minimal assumptions for non-interactive zero-knowledge, and some explorations in the realm of fine-grained cryptography.
1. Introduction.- 2. Secure Computation: a Primer.- 3. Silent Secure Computation.- 4. Advanced Topics in Silent Secure Computation.- 5. Bibliography.