Projekta Nr.ISO/IEC 4922-2:2024
Nosaukums<p class="MsoBodyText" style="mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'MS Mincho'; mso-fareast-theme-font: minor-fareast;">This document specifies the processes for secure multiparty computation mechanisms based on the secret sharing techniques which are specified in </span><span class="stdpublisher"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; color: black; mso-color-alt: windowtext;">ISO/IEC</span></span><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'MS Mincho'; mso-fareast-theme-font: minor-fareast;"> <span class="stddocNumber"><span style="color: black; mso-color-alt: windowtext;">19592</span></span>-<span class="stddocPartNumber"><span style="color: black; mso-color-alt: windowtext;">2</span></span>. Secure multiparty computation based on secret sharing can be used for confidential data processing. Examples of possible applications include collaborative data analytics or machine learning where data are kept secret, secure auctions where each bidding price is hidden, and performing cryptographic operations where the secrecy of the private keys is maintained.</span></p> <p class="MsoBodyText" style="mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'MS Mincho'; mso-fareast-theme-font: minor-fareast;">This document specifies the mechanisms including but not limited to addition, subtraction, multiplication by a constant, shared random number generation, and multiplication with their parameters and properties. This document describes how to perform a secure function evaluation using these mechanisms and secret sharing techniques.</span></p>
Reģistrācijas numurs (WIID)80514
Darbības sfēra<p class="MsoBodyText" style="mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'MS Mincho'; mso-fareast-theme-font: minor-fareast;">This document specifies the processes for secure multiparty computation mechanisms based on the secret sharing techniques which are specified in </span><span class="stdpublisher"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; color: black; mso-color-alt: windowtext;">ISO/IEC</span></span><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'MS Mincho'; mso-fareast-theme-font: minor-fareast;"> <span class="stddocNumber"><span style="color: black; mso-color-alt: windowtext;">19592</span></span>-<span class="stddocPartNumber"><span style="color: black; mso-color-alt: windowtext;">2</span></span>. Secure multiparty computation based on secret sharing can be used for confidential data processing. Examples of possible applications include collaborative data analytics or machine learning where data are kept secret, secure auctions where each bidding price is hidden, and performing cryptographic operations where the secrecy of the private keys is maintained.</span></p> <p class="MsoBodyText" style="mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'MS Mincho'; mso-fareast-theme-font: minor-fareast;">This document specifies the mechanisms including but not limited to addition, subtraction, multiplication by a constant, shared random number generation, and multiplication with their parameters and properties. This document describes how to perform a secure function evaluation using these mechanisms and secret sharing techniques.</span></p>
StatussStandarts spēkā
ICS grupa35.030