Your cart is currently empty!

ISO 4922:2024
ISO 4922:2024 Information security – Secure multiparty computation – Part 2: Mechanisms based on secret sharing
CDN $273.00
Description
This document specifies the processes for secure multiparty computation mechanisms based on the secret sharing techniques which are specified in ISO/IEC 19592–2. Secure multiparty computation based on secret sharing can be used for confidential data processing. Examples of possible applications include collaborative data analytics or machine learning where data are kept secret, secure auctions where each bidding price is hidden, and performing cryptographic operations where the secrecy of the private keys is maintained.
This document specifies the mechanisms including but not limited to addition, subtraction, multiplication by a constant, shared random number generation, and multiplication with their parameters and properties. This document describes how to perform a secure function evaluation using these mechanisms and secret sharing techniques.
Edition
1
Published Date
2024-03-06
Status
PUBLISHED
Pages
33
Format 
Secure PDF
Secure – PDF details
- Save your file locally or view it via a web viewer
- Viewing permissions are restricted exclusively to the purchaser
- Device limits - 3
- Printing – Enabled only to print (1) copy
See more about our Environmental Commitment

Abstract
This document specifies the processes for secure multiparty computation mechanisms based on the secret sharing techniques which are specified in ISO/IEC 19592-2. Secure multiparty computation based on secret sharing can be used for confidential data processing. Examples of possible applications include collaborative data analytics or machine learning where data are kept secret, secure auctions where each bidding price is hidden, and performing cryptographic operations where the secrecy of the private keys is maintained.
This document specifies the mechanisms including but not limited to addition, subtraction, multiplication by a constant, shared random number generation, and multiplication with their parameters and properties. This document describes how to perform a secure function evaluation using these mechanisms and secret sharing techniques.
Previous Editions
Can’t find what you are looking for?
Please contact us at:
Related Documents
-
ISO 80004:2011 Nanotechnologies – Vocabulary – Part 7: Diagnostics and therapeutics for healthcare
CDN $115.00 Add to cart -
ISO 15424:2025 Information technology – Automatic identification and data capture techniques – Data carrier identifiers (including symbology identifiers)
CDN $233.00 Add to cart -
ISO 16520:2025 Tourism and related services – Restaurants and catering – Vocabulary
CDN $173.00 Add to cart -
ISO 5053:2019 Industrial trucks – Vocabulary – Part 2: Fork arms and attachments
CDN $351.00 Add to cart