메뉴 건너뛰기




Volumn 13, Issue 1, 2000, Pages 143-202

Security and composition of multiparty cryptographic protocols

Author keywords

Composition of protocols; Multiparty cryptographic protocols; Secure function evaluation; Security of protocols

Indexed keywords


EID: 0000731055     PISSN: 09332790     EISSN: None     Source Type: Journal    
DOI: 10.1007/s001459910006     Document Type: Article
Times cited : (1008)

References (52)
  • 1
    • 33746365751 scopus 로고
    • Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
    • [Bl]
    • [Bl] D. Beaver, Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority, Journal ofCiyptology, vol. 4 (1991), pp. 75-122
    • (1991) Journal OfCiyptology , vol.4 , pp. 75-122
    • Beaver, D.1
  • 2
    • 85029542707 scopus 로고
    • Foundations of secure interactive computing
    • [B2] SpringerVerlag, Berlin
    • [B2] D. Beaver, Foundations of secure interactive computing, Proc. CRYPTO '91, LNCS 576, SpringerVerlag, Berlin, 1991, pp. 377-391.
    • (1991) Proc. CRYPTO '91, LNCS 576 , pp. 377-391
    • Beaver, D.1
  • 4
    • 85048601848 scopus 로고
    • Cryptographic protocols provably secure against dynamic adversaries
    • [BH] LNCS 658, Springer-Verlag, Berlin
    • [BH] D. Beaver and S. Haber, Cryptographic protocols provably secure against dynamic adversaries, Advances in Cryptology -Eurociypt '92, LNCS 658, Springer-Verlag, Berlin,1992, pp. 307-323.
    • (1992) Advances in Cryptology -Eurociypt '92 , pp. 307-323
    • Beaver, D.1    Haber, S.2
  • 5
    • 0031642585 scopus 로고    scopus 로고
    • A modular approach to the design and analysis of authentication and key-exchange protocols
    • [BCK] ACM
    • [BCK] M. Bellare, R. Canetti, and H. Krawczyk, A modular approach to the design and analysis of authentication and key-exchange protocols, Proc. 30th Symp. on Theory of Computing (STOC), ACM, 1998, pp. 419-428.
    • (1998) Proc. 30th Symp. on Theory of Computing (STOC) , pp. 419-428
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 10
    • 84984842401 scopus 로고
    • Maintaining security in the presence of transient faults
    • [CH] Springer-Verlag, Berlin
    • [CH] R. Canetti and A. Herzberg, Maintaining security in the presence of transient faults, Proc. CRYPT '94, LNCS 839, Springer-Verlag, Berlin, 1994, pp. 425-436.
    • (1994) Proc. CRYPT '94, LNCS 839 , pp. 425-436
    • Canetti, R.1    Herzberg, A.2
  • 12
    • 0013001552 scopus 로고    scopus 로고
    • Proactive security: Long-term protection agains break-ins
    • [CGHN]
    • [CGHN] R. Canetti, R. Gennaro, A. Herzberg, and D. Naor, Proactive security: long-term protection agains break-ins, CryptoBytes, vol. 3, no. 1 (1997), 1-8
    • (1997) CryptoBytes , vol.3 , Issue.1 , pp. 1-8
    • Canetti, R.1    Gennaro, R.2    Herzberg, A.3    Naor, D.4
  • 13
    • 0005033406 scopus 로고    scopus 로고
    • A threshold cryptosystem secure against adaptive chosen ciphertext attacks
    • [CG2] Springer-Verlag, Berlin, Fuller version available on-line at http://philby.ucsd.edu
    • [CG2] R. Canetti and S. Goldwasser, A threshold cryptosystem secure against adaptive chosen ciphertext attacks, Proc. Eurociypt 99, Springer-Verlag, Berlin, 1999, pp. 90-103. Fuller version available on-line at http://philby.ucsd.edu
    • (1999) Proc. Eurociypt 99 , pp. 90-103
    • Canetti, R.1    Goldwasser, S.2
  • 16
    • 0032687056 scopus 로고    scopus 로고
    • Secure computation with honest-looking parties: What if nobody i truly honest?
    • [CO]
    • [CO] R. Canetti and R. Ostrovsky, Secure computation with honest-looking parties: what if nobody i truly honest?, Proc. 3laSymp. on Theory of Computing (STOC), ACM, 1999, pp. 255-264.
    • (1999) Proc. 3laSymp. on Theory of Computing (STOC), ACM , pp. 255-264
    • Canetti, R.1    Ostrovsky, R.2
  • 21
    • 85023809951 scopus 로고
    • Threshold cryptosystems, in G. Brassard, editor
    • [DF] Springer-Verlag, Berlin
    • [DF] Y. Desmedt and Y. Frankel, Threshold cryptosystems, in G. Brassard, editor, Advances in Cryptolog - Crypto '89, LNCS No. 435, Springer-Verlag, Berlin, 1989, pp. 307-315.
    • (1989) Advances in Cryptolog - Crypto '89, LNCS , Issue.435 , pp. 307-315
    • Desmedt, Y.1    Frankel, Y.2
  • 25
    • 84976655650 scopus 로고
    • Cryptographic computation: Secure faut-tolerant protocols and th public-key model
    • [GHY] Springer-Verlag, Berlin
    • [GHY] Z. Galil, S. Haber, and M. Yung, Cryptographic computation: secure faut-tolerant protocols and th public-key model, Proc. CRYPTO '87, LNCS 293, Springer-Verlag, Berlin, 1988, pp. 135-155.
    • (1988) Proc. CRYPTO '87, LNCS 293 , pp. 135-155
    • Galil, Z.1    Haber, S.2    Yung, M.3
  • 27
    • 0027306732 scopus 로고
    • A uniform complexity treatment of encryption and zero-knowledge
    • [Gl]
    • [Gl] O. Goldreich, A uniform complexity treatment of encryption and zero-knowledge. Journal of Cryptology, vol. 6, no. 1 (1993), pp. 21-53.
    • (1993) Journal of Cryptology , vol.6 , Issue.1 , pp. 21-53
    • Goldreich, O.1
  • 28
    • 0003868277 scopus 로고
    • [G2] Weizmann Institute of Science Rehovot, Israel, Avaliable at http://philby.ucsd.edu.
    • [G2] O. Goldreich, Foundations of Cryptography (Fragment's of a Book), Weizmann Institute of Science Rehovot, Israel, 1995. (Avaliable at http://philby.ucsd.edu.
    • (1995) Foundations of Cryptography (Fragment's of A Book)
    • Goldreich, O.1
  • 30
    • 0029767165 scopus 로고    scopus 로고
    • On the composition of zero-knowledge proof systems
    • [GK]
    • [GK] O. Goldreich and H. Krawczyk, On the composition of zero-knowledge proof systems, SIAM Journa on Computing, vol. 25, no. 1 (1996)
    • (1996) SIAM Journa on Computing , vol.25 , Issue.1
    • Goldreich, O.1    Krawczyk, H.2
  • 31
    • 71149116146 scopus 로고
    • Proofs that yield nothing but their validity or all language in NP have zero-knowledge proof systems
    • [GMW1]
    • [GMW1] O. Goldreich, S. Micali, and A. Wigderson, Proofs that yield nothing but their validity or all language in NP have zero-knowledge proof systems, Journal of the ACM, vol. 38, no. 1 (1991), pp. 691-729
    • (1991) Journal of the ACM , vol.38 , Issue.1 , pp. 691-729
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 34
    • 0028676264 scopus 로고
    • Definitions and properties of zero-knowledge proof systems
    • [GO]
    • [GO] O. Goldreich and Y. Oren, Definitions and properties of zero-knowledge proof systems, Journal of Cryptology, vol. 7, no. 1 (1994), pp. 1-32.
    • (1994) Journal of Cryptology , vol.7 , Issue.1 , pp. 1-32
    • Goldreich, O.1    Oren, Y.2
  • 36
    • 0012527958 scopus 로고
    • Fair computation of general functions in presence of immoral majority
    • [GL] Springer-Verlag, Berlin
    • [GL] S. Goldwasser and L. Levin, Fair computation of general functions in presence of immoral majority Proc. CRYPTO '90, LNCS 537, Springer-Verlag, Berlin, 1990.
    • (1990) Proc. CRYPTO '90, LNCS 537
    • Goldwasser, S.1    Levin, L.2
  • 38
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • [GMR]
    • [GMR] S. Goldwasser, S. Micali, and C. Rackoff, The knowledge complexity of interactive proof systems SIAM Journal on Computing, vol. 18, no. 1 (1989), pp. 186-208
    • (1989) SIAM Journal on Computing , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 39
    • 0030693496 scopus 로고    scopus 로고
    • Complete characterization of adversaries tolerable in secure multiparty computation, this issue. Preliminary version in
    • [HM]
    • [HM] M. Hirt and U. Maurer, Complete characterization of adversaries tolerable in secure multiparty computation, this issue. Preliminary version in Proc. 16th Symp. on Principles of Distributed Computing (PODC), ACM, 1997, pp. 25-34
    • (1997) Proc. 16th Symp. on Principles of Distributed Computing (PODC), ACM , pp. 25-34
    • Hirt, M.1    Maurer, U.2
  • 43
    • 0002365530 scopus 로고
    • Privacy and communication complexity
    • [K]
    • [K] E. Kushilevitz, Privacy and communication complexity, SIAM Journal on Discrete Mathematics, vol. 5, no. 2 (1992), pp. 273-284.
    • (1992) SIAM Journal on Discrete Mathematics , vol.5 , Issue.2 , pp. 273-284
    • Kushilevitz, E.1
  • 45
    • 0002187139 scopus 로고
    • Secure computation, Unpublished manuscript, 1992. Preliminary versio in
    • [MR] Springer-Verlag, Berlin
    • [MR] S. Micali and P. Rogaway, Secure computation, Unpublished manuscript, 1992. Preliminary versio in Proc. CRYPTO '91, LNCS 576, Springer-Verlag, Berlin, 1991, pp. 392-4104.
    • (1991) Proc. CRYPTO '91, LNCS 576 , pp. 392-4104
    • Micali, S.1    Rogaway, P.2
  • 48
    • 84957689308 scopus 로고    scopus 로고
    • A simplified approach to threshold and proactive RSA
    • [R] LNCS Springer-Verlag, Berlin
    • [R] T. Rabin, A simplified approach to threshold and proactive RSA, Proc. CRYPTO '98, LNCS Springer-Verlag, Berlin, 1998, pp. 89-102
    • (1998) Proc. CRYPTO '98 , pp. 89-102
    • Rabin, T.1
  • 51
    • 0020301290 scopus 로고
    • Theory and applications of trapdoor functions
    • [ Y2] A. Yao, Theory and applications of trapdoor functions, Proc. 23rd Symp. on Foundations of Compute Science (FOCS), IEEE, 1982, pp. 80-91.
    • (1982) Proc. , vol.23 , pp. 80-91
    • Yao, A.1
  • 52
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • [Y3]
    • [Y3] A. Yao, How to generate and exchange secrets, Proc. 21th Symp. on Foundations of Compute Science (FOCS), IEEE, 1986, pp. 162-167.
    • (1986) Proc. , vol.21 , pp. 162-167
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.