메뉴 건너뛰기




Volumn Part F129722, Issue , 1992, Pages 699-710

Communication complexity of secure computation

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; DISTRIBUTED COMPUTER SYSTEMS; ERROR CORRECTION; ERROR DETECTION; ERRORS; FAULT TOLERANCE; COMPUTATIONAL COMPLEXITY; COMPUTER SYSTEM RECOVERY; FAULT TOLERANT COMPUTER SYSTEMS; MATHEMATICAL MODELS; NETWORK PROTOCOLS; PROGRAM COMPILERS; SECURITY OF DATA;

EID: 0026985378     PISSN: 07378017     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/129712.129780     Document Type: Conference Paper
Times cited : (205)

References (19)
  • 1
    • 0024940038 scopus 로고
    • Non-cryptographic fault-tolerant computing in a constant number of rounds of interaction
    • J. Bar-Han and D. Beaver, "Non-cryptographic fault-tolerant computing in a constant number of rounds of interaction," ACM PODC 1989, pp. 201-209.
    • (1989) ACM PODC , pp. 201-209
    • Bar-Han, J.1    Beaver, D.2
  • 3
    • 85032862464 scopus 로고
    • Multiparty protocols tolerating half faulty processors
    • D. Beaver, "Multiparty protocols tolerating half faulty processors," Crypto 1989, pp. 560-572.
    • (1989) Crypto , pp. 560-572
    • Beaver, D.1
  • 4
    • 0002382799 scopus 로고
    • Foundations of secure interactive computing
    • D.Beaver, "Foundations of secure interactive computing," Crypto 1991.
    • (1991) Crypto
    • Beaver, D.1
  • 6
    • 84898960610 scopus 로고
    • Completeness theorems for noncrypto-graphic fault tolerant distributed computation
    • M. Ben-Or, S. Goldwasser, and A. Wigder-son, "Completeness theorems for noncrypto-graphic fault tolerant distributed computation," ACM STOC 1988, pp. 1-9.
    • (1988) ACM STOC , pp. 1-9
    • Ben-Or, M.1    Goldwasser, S.2    Wigder-Son, A.3
  • 7
    • 84898947315 scopus 로고
    • Multiparty unconditionally secure protocols
    • D. Chaurn, C. Crépeau, and I. Damgárd, "Multiparty unconditionally secure protocols," ACM STOC 1988, pp. 11-19.
    • (1988) ACM STOC , pp. 11-19
    • Chaurn, D.1    Crépeau, C.2    Damgárd, I.3
  • 10
    • 0026376346 scopus 로고
    • Amortized communication complexity
    • T. Feder, E. Kushilevitz, and M. Naor, "Amortized communication complexity," IEEE FOCS 1991, pp. 239-248.
    • (1991) IEEE FOCS , pp. 239-248
    • Feder, T.1    Kushilevitz, E.2    Naor, M.3
  • 12
    • 0024768184 scopus 로고
    • Privacy and communication complexity
    • E. Kushilevitz, "Privacy and communication complexity," IEEE FOCS 1989, pp. 416-421.
    • (1989) IEEE FOCS , pp. 416-421
    • Kushilevitz, E.1
  • 15
    • 0013317517 scopus 로고
    • Communication with secrecy constraints
    • A. Orlitsky and A. El Gamal, "Communication with secrecy constraints," ACM STOC 1984, pp. 217-224.
    • (1984) ACM STOC , pp. 217-224
    • Orlitsky, A.1    El Gamal, A.2
  • 16
    • 0024859552 scopus 로고
    • Verifiable secret sharing and multiparty protocols with honest majority
    • T. Rabin and M. Ben-Or, "Verifiable secret sharing and multiparty protocols with honest majority," STOC 1989, pp. 73-85.
    • (1989) STOC , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 17
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to Share a Secret," CACM 22 (1979), 612-613.
    • (1979) CACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 19
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • A. Yao, "How to generate and exchange secrets," IEEE FOCS 1986, pp. 162-167.
    • (1986) IEEE FOCS , pp. 162-167
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.