REGISTER

FR
Search
×
FR

Placeholder headline

This is just a placeholder headline

API STD 12R1: Installation, Operation, Maintenance, Inspection, and Repair of Tanks in Production Service

$

285

BUY NOW

Placeholder headline

This is just a placeholder headline

API Technical Report 2583 – Measurement of Produced Water for Custody Transfer

$

174

BUY NOW

Placeholder headline

This is just a placeholder headline

API Bulletin 592 – Elements of a Fixed Equipment Mechanical Integrity (FE MI) Program

$

142

BUY NOW

Placeholder headline

This is just a placeholder headline

API SPEC Q1: Addenda 2

$

0

BUY NOW

Placeholder headline

This is just a placeholder headline

API TR 2583 : Measurement of Produced Water for Custody Transfer

$

174

BUY NOW

Placeholder headline

This is just a placeholder headline

API TR 2581: Wet Gas Sampling

$

189

BUY NOW

Placeholder headline

This is just a placeholder headline

API TR 2581 Wet Gas Sampling : Errata 1

$

0

BUY NOW

Placeholder headline

This is just a placeholder headline

API 510: Pressure Vessel Inspection Code: In-service Inspection, Rating, Repair, and Alteration

$

481

BUY NOW

Placeholder headline

This is just a placeholder headline

API SPEC 6AV1: Validation of Safety and Shutdown Valves for Sandy Service : Edition 4

$

208

BUY NOW

ISO 4922:2024

ISO 4922:2024 Information security – Secure multiparty computation – Part 2: Mechanisms based on secret sharing

CDN $273.00

SKU: b000a7b3e0b9 Categories: ,

Description

This document specifies the processes for secure multiparty computation mechanisms based on the secret sharing techniques which are specified in ISO/IEC 195922. Secure multiparty computation based on secret sharing can be used for confidential data processing. Examples of possible applications include collaborative data analytics or machine learning where data are kept secret, secure auctions where each bidding price is hidden, and performing cryptographic operations where the secrecy of the private keys is maintained.

This document specifies the mechanisms including but not limited to addition, subtraction, multiplication by a constant, shared random number generation, and multiplication with their parameters and properties. This document describes how to perform a secure function evaluation using these mechanisms and secret sharing techniques.

Edition

1

Published Date

2024-03-06

Status

PUBLISHED

Pages

33

Language Detail Icon

English

Format Secure Icon

Secure PDF

Abstract

This document specifies the processes for secure multiparty computation mechanisms based on the secret sharing techniques which are specified in ISO/IEC 19592-2. Secure multiparty computation based on secret sharing can be used for confidential data processing. Examples of possible applications include collaborative data analytics or machine learning where data are kept secret, secure auctions where each bidding price is hidden, and performing cryptographic operations where the secrecy of the private keys is maintained.

This document specifies the mechanisms including but not limited to addition, subtraction, multiplication by a constant, shared random number generation, and multiplication with their parameters and properties. This document describes how to perform a secure function evaluation using these mechanisms and secret sharing techniques.

Previous Editions

Can’t find what you are looking for?

Please contact us at: