{"id":438932,"date":"2024-10-20T08:06:16","date_gmt":"2024-10-20T08:06:16","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-4922-12023\/"},"modified":"2024-10-26T15:11:06","modified_gmt":"2024-10-26T15:11:06","slug":"bs-iso-iec-4922-12023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-4922-12023\/","title":{"rendered":"BS ISO\/IEC 4922-1:2023"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4 General model and parameters 4.1 Generic model <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 4.2 Parameters of secure multiparty computation 4.2.1 Overview 4.2.2 Input space 4.2.3 Encoded space 4.2.4 Output space 4.2.5 The number of computing parties 4.2.6 Role restriction 4.2.7 Communication model <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 4.2.8 Summary of parameters 5 Properties and analysis of secure multiparty computation 5.1 Fundamental requirements 5.1.1 Overview 5.1.2 Correctness 5.1.3 Input privacy 5.2 Adversary model 5.2.1 Overview <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5.2.2 Adversary behaviour 5.2.3 Number of corruptions 5.2.4 Computational power <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.2.5 Composition and parallel execution 5.2.6 Network access 5.3 Optional properties 5.3.1 Overview 5.3.2 Correctness against active adversary 5.3.3 Input privacy against active adversary <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.3.4 Fairness 5.3.5 Guaranteed output delivery 5.4 Performance properties for the comparison of schemes 5.4.1 Overview 5.4.2 Communication efficiency 5.4.3 Computational efficiency <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | Annex A (informative) Possible use cases for secure multiparty computation <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information security. Secure multiparty computation – General<\/b><\/p>\n |