Informējam, ka Sistēma pielāgota darbam ar interneta pārlūkprogrammu Internet Explorer (8. un jaunākām versijām) un Mozilla Firefox (3.6 un jaunākām versijām).
Izmantojot citu interneta pārlūkprogrammu, brīdinām, ka Sistēmas funkcionalitāte var tikt traucēta.
<p class="MsoBodyText" style="mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'MS Mincho'; mso-fareast-theme-font: minor-fareast;">This document specifies the processes for secure multiparty computation mechanisms based on the secret sharing techniques which are specified in </span><span class="stdpublisher"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; color: black; mso-color-alt: windowtext;">ISO/IEC</span></span><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'MS Mincho'; mso-fareast-theme-font: minor-fareast;"> <span class="stddocNumber"><span style="color: black; mso-color-alt: windowtext;">19592</span></span>-<span class="stddocPartNumber"><span style="color: black; mso-color-alt: windowtext;">2</span></span>. Secure multiparty computation based on secret sharing can be used for confidential data processing. Examples of possible applications include collaborative data analytics or machine learning where data are kept secret, secure auctions where each bidding price is hidden, and performing cryptographic operations where the secrecy of the private keys is maintained.</span></p>
<p class="MsoBodyText" style="mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'MS Mincho'; mso-fareast-theme-font: minor-fareast;">This document specifies the mechanisms including but not limited to addition, subtraction, multiplication by a constant, shared random number generation, and multiplication with their parameters and properties. This document describes how to perform a secure function evaluation using these mechanisms and secret sharing techniques.</span></p>
Reģistrācijas numurs (WIID)
80514
Darbības sfēra
<p class="MsoBodyText" style="mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'MS Mincho'; mso-fareast-theme-font: minor-fareast;">This document specifies the processes for secure multiparty computation mechanisms based on the secret sharing techniques which are specified in </span><span class="stdpublisher"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; color: black; mso-color-alt: windowtext;">ISO/IEC</span></span><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'MS Mincho'; mso-fareast-theme-font: minor-fareast;"> <span class="stddocNumber"><span style="color: black; mso-color-alt: windowtext;">19592</span></span>-<span class="stddocPartNumber"><span style="color: black; mso-color-alt: windowtext;">2</span></span>. Secure multiparty computation based on secret sharing can be used for confidential data processing. Examples of possible applications include collaborative data analytics or machine learning where data are kept secret, secure auctions where each bidding price is hidden, and performing cryptographic operations where the secrecy of the private keys is maintained.</span></p>
<p class="MsoBodyText" style="mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'MS Mincho'; mso-fareast-theme-font: minor-fareast;">This document specifies the mechanisms including but not limited to addition, subtraction, multiplication by a constant, shared random number generation, and multiplication with their parameters and properties. This document describes how to perform a secure function evaluation using these mechanisms and secret sharing techniques.</span></p>