{"id":438932,"date":"2024-10-20T08:06:16","date_gmt":"2024-10-20T08:06:16","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-4922-12023\/"},"modified":"2024-10-26T15:11:06","modified_gmt":"2024-10-26T15:11:06","slug":"bs-iso-iec-4922-12023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-4922-12023\/","title":{"rendered":"BS ISO\/IEC 4922-1:2023"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
6<\/td>\nForeword <\/td>\n<\/tr>\n
7<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Normative references
3 Terms and definitions <\/td>\n<\/tr>\n
10<\/td>\n4 General model and parameters
4.1 Generic model <\/td>\n<\/tr>\n
12<\/td>\n4.2 Parameters of secure multiparty computation
4.2.1 Overview
4.2.2 Input space
4.2.3 Encoded space
4.2.4 Output space
4.2.5 The number of computing parties
4.2.6 Role restriction
4.2.7 Communication model <\/td>\n<\/tr>\n
13<\/td>\n4.2.8 Summary of parameters
5 Properties and analysis of secure multiparty computation
5.1 Fundamental requirements
5.1.1 Overview
5.1.2 Correctness
5.1.3 Input privacy
5.2 Adversary model
5.2.1 Overview <\/td>\n<\/tr>\n
14<\/td>\n5.2.2 Adversary behaviour
5.2.3 Number of corruptions
5.2.4 Computational power <\/td>\n<\/tr>\n
15<\/td>\n5.2.5 Composition and parallel execution
5.2.6 Network access
5.3 Optional properties
5.3.1 Overview
5.3.2 Correctness against active adversary
5.3.3 Input privacy against active adversary <\/td>\n<\/tr>\n
16<\/td>\n5.3.4 Fairness
5.3.5 Guaranteed output delivery
5.4 Performance properties for the comparison of schemes
5.4.1 Overview
5.4.2 Communication efficiency
5.4.3 Computational efficiency <\/td>\n<\/tr>\n
17<\/td>\nAnnex A (informative) Possible use cases for secure multiparty computation <\/td>\n<\/tr>\n
18<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Information security. Secure multiparty computation – General<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2023<\/td>\n20<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":438942,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-438932","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/438932","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/438942"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=438932"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=438932"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=438932"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}