{"id":453527,"date":"2024-10-20T09:30:44","date_gmt":"2024-10-20T09:30:44","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-4922-22024\/"},"modified":"2024-10-26T17:38:38","modified_gmt":"2024-10-26T17:38:38","slug":"bs-iso-iec-4922-22024","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-4922-22024\/","title":{"rendered":"BS ISO\/IEC 4922-2:2024"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4 Symbols and abbreviated terms 5 Secure multiparty computation based on secret sharing 5.1 General <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5.2 Secret sharing 5.3 Secure multiparty computation based on secret sharing <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 6 Addition, subtraction, and multiplication by a constant 6.1 General 6.2 Addition 6.2.1 Addition for the Shamir secret sharing scheme <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 6.2.2 Addition of a constant for the Shamir secret sharing scheme 6.2.3 Addition for the replicated additive secret sharing scheme 6.2.4 Addition of a constant for the replicated additive secret sharing scheme <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 6.3 Subtraction 6.3.1 Subtraction for the Shamir secret sharing scheme 6.3.2 Subtraction of a constant for the Shamir secret sharing scheme <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 6.3.3 Subtraction for the replicated additive secret sharing scheme 6.3.4 Subtraction of a constant for the replicated additive secret sharing scheme <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6.4 Multiplication by a constant 6.4.1 Multiplication by a constant for the Shamir secret sharing scheme 6.4.2 Multiplication by a constant for the replicated additive secret sharing scheme <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 7 Shared random number generation 7.1 General 7.2 Information-theoretically secure shared random number generation 7.2.1 General-purpose shared random number generation scheme <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 7.2.2 Shared random number generation for the replicated additive secret sharing scheme 7.2.3 Shared random number generation for the Shamir secret sharing scheme <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 7.3 Computationally secure shared random number generation 7.3.1 General <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 7.3.2 Seed sharing phase 7.3.3 Shared random number generation phase for the replicated additive secret sharing scheme <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 7.3.4 Shared random number generation phase for the Shamir secret sharing scheme <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 8 Multiplication 8.1 General 8.2 GRR-multiplication for the Shamir secret sharing scheme 8.2.1 General 8.2.2 Parameters 8.2.3 Multiplication protocol <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 8.2.4 Dot product protocol 8.2.5 Properties 8.3 DN-multiplication for the Shamir secret sharing scheme 8.3.1 General <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 8.3.2 Parameters 8.3.3 Multiplication protocol 8.3.4 Dot product protocol <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 8.3.5 Properties 8.4 CHIKP-multiplication for the replicated additive secret sharing scheme 8.4.1 General 8.4.2 Parameters 8.4.3 Multiplication protocol 8.4.4 Properties <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 8.5 Beaver-multiplication 8.5.1 General 8.5.2 Parameters 8.5.3 Multiplication protocol 8.5.4 Properties <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 9 Secure function evaluation <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | Annex A (normative) Object identifiers <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | Annex B (informative) Numerical examples <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | Annex C (informative) Security considerations <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information security. Secure multiparty computation – Mechanisms based on secret sharing<\/b><\/p>\n |