ISO/IEC-4922-2 › Information security - Secure multiparty computation - Part 2: Mechanisms based on secret sharing
The following bibliographic material is provided to assist you with your purchasing decision:
This document specifies the processes for secure multiparty computation mechanisms based on the secret sharing techniques which are specified in ISO/IEC 19592-2. Secure multiparty computation based on secret sharing can be used for confidential data processing. Examples of possible applications include collaborative data analytics or machine learning where data are kept secret, secure auctions where each bidding price is hidden, and performing cryptographic operations where the secrecy of the private keys is maintained.
This document specifies the mechanisms including but not limited to addition, subtraction, multiplication by a constant, shared random number generation, and multiplication with their parameters and properties. This document describes how to perform a secure function evaluation using these mechanisms and secret sharing techniques.
To find similar documents by classification:
35.030 (IT Security Including encryption)
This document comes with our free Notification Service, good for the life of the document.
This document is available in either Paper or PDF format.
Document Number
ISO/IEC 4922-2:2024
Revision Level
1ST EDITION
Status
Current
Publication Date
March 1, 2024
Committee Number
ISO/IEC JTC 1/SC 27