메뉴 건너뛰기




Volumn Part F129452, Issue , 1996, Pages 479-488

Correlated pseudorandomness and the complexity of private computations

Author keywords

[No Author keywords available]

Indexed keywords

BOOLEAN FUNCTIONS; INFORMATION THEORY; RANDOM PROCESSES; COMPUTATIONAL COMPLEXITY; CORRELATION METHODS; FUNCTIONS; POLYNOMIALS; PROBABILITY DENSITY FUNCTION; RANDOM NUMBER GENERATION; SECURITY OF DATA;

EID: 0029702967     PISSN: 07378017     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/237814.237996     Document Type: Conference Paper
Times cited : (175)

References (31)
  • 2
  • 4
    • 0024769014 scopus 로고
    • Multiparty computation with faulty majority
    • IEEE
    • th FOCS, IEEE, 1989, 1989, 468-473.
    • (1989) th FOCS , vol.1989 , pp. 468-473
    • Beaver, D.1    Goldwasser, S.2
  • 5
    • 33750715323 scopus 로고
    • Global, unpredictable bit generation without broadcast
    • Springer-Verlag LNCS 765
    • D. Beaver, N. So. "Global, Unpredictable Bit Generation Without Broadcast." Advances in Cryptology - Eurocrypt'93 Proceedings, Springer-Verlag LNCS 765, 1994, 424-434.
    • (1994) Advances in Cryptology - Eurocrypt'93 Proceedings , pp. 424-434
    • Beaver, D.1    So, N.2
  • 6
    • 85032877753 scopus 로고
    • Non-interactive oblivious transfer and applications
    • Springer-Verlag LNCS 435
    • M. Bellare, S. Micali. "Non-Interactive Oblivious Transfer and Applications." Advances in Cryptology - Crypto'89 Proceedings, Springer-Verlag LNCS 435, 1990, 547-557.
    • (1990) Advances in Cryptology - Crypto'89 Proceedings , pp. 547-557
    • Bellare, M.1    Micali, S.2
  • 7
    • 85028745601 scopus 로고
    • Another advantage of free choice
    • ACM
    • nd PODC, ACM, 1983.
    • (1983) nd PODC
    • Ben-Or, M.1
  • 8
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of Pseudo-random bits
    • M. Blum, S. Micali. "How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits." SIAM J. on Computing 13, 1984, 850-864.
    • (1984) SIAM J. on Computing , vol.13 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 11
    • 0022864717 scopus 로고
    • Information theoretic reductions among disclosure problems
    • IEEE
    • G. Brassard, C. Crépeau, J. Robert. "Information Theoretic Reductions Among Disclosure Problems." Proceedings of the 21th FOCS, IEEE, 1986, 1986, 168-173.
    • (1986) Proceedings of the 21th FOCS , vol.1986 , pp. 168-173
    • Brassard, G.1    Crépeau, C.2    Robert, J.3
  • 12
    • 0002738457 scopus 로고
    • A zero-one law for boolean privacy
    • February
    • B. Chor, E. Kushilevitz. "A Zero-One Law for Boolean Privacy." SIAM J. Disc. Math. 4:1, February 1991, 36-47.
    • (1991) SIAM J. Disc. Math , vol.4 , Issue.1 , pp. 36-47
    • Chor, B.1    Kushilevitz, E.2
  • 13
    • 85030121757 scopus 로고
    • Equivalence between two flavours of oblivious transfers
    • Springer-Verlag LNCS
    • C. Crepeau. "Equivalence Between Two Flavours of Oblivious Transfers." Advances in Cryptology - Crypto'81 Proceedings, Springer-Verlag LNCS 293, 1988, 350-354.
    • (1988) Advances in Cryptology - Crypto'81 Proceedings , vol.293 , pp. 350-354
    • Crepeau, C.1
  • 15
    • 0020878801 scopus 로고
    • A randomized protocol for signing contracts
    • Springer-Verlag
    • S. Even, O. Goldreich, A. Lempel. "A Randomized Protocol for Signing Contracts." Proceedings of Crypto 1982, Springer-Verlag, 1983, 205-210.
    • (1983) Proceedings of Crypto 1982 , pp. 205-210
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 16
    • 84976655650 scopus 로고
    • Cryptographic computation: Secure fault-tolerant protocols and the public-key model
    • Springer-Verlag LNCS
    • Z. Galil, S. Haber, M. Yung. "Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public-Key Model." Advances in Cryptology - Crypto'87 Proceedings, Springer-Verlag LNCS 293, 1988, 1988, 135-155.
    • (1988) Advances in Cryptology - Crypto'87 Proceedings , vol.293 , pp. 135-155
    • Galil, Z.1    Haber, S.2    Yung, M.3
  • 17
    • 0022914590 scopus 로고
    • Proofs that yield nothing but their validity and a methodology of cryptographic protocol design
    • IEEE
    • th FOCS, IEEE, 1986, 1986, 174-187.
    • (1986) th FOCS , vol.1986 , pp. 174-187
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 19
    • 85032194875 scopus 로고
    • How to solve any protocol problem - An efficiency improvement
    • Springer-Verlag
    • O. Goldreich, R. Vainish. "How to Solve any Protocol Problem - An Efficiency Improvement." Proceedings of Crypto 1987, Springer-Verlag, 1988, 73-86.
    • (1988) Proceedings of Crypto 1987 , pp. 73-86
    • Goldreich, O.1    Vainish, R.2
  • 20
    • 33747194089 scopus 로고
    • Fair computation of general functions in presence of immoral majority
    • S. Goldwasser, L. Levin. "Fair Computation of General Functions in Presence of Immoral Majority." Proceedings of Crypto 1990.
    • (1990) Proceedings of Crypto
    • Goldwasser, S.1    Levin, L.2
  • 21
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • S. Goldwasser, S. Micali, C. Rackoff. "The Knowledge Complexity of Interactive Proof Systems." SIAM J. on Computing 18:1, 1989, 186-208.
    • (1989) SIAM J. on Computing , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 23
    • 0024866742 scopus 로고
    • Limits on the provable consequences of one-way permutations
    • ACM
    • st STOC, ACM, 1989, 1989, 44-62.
    • (1989) st STOC , vol.1989 , pp. 44-62
    • Impagliazzo, R.1    Rudich, S.2
  • 24
    • 84898989941 scopus 로고
    • Founding cryptography on oblivious transfer
    • ACM
    • th STOC, ACM, 1988, 1988, 20-29.
    • (1988) th STOC , vol.1988 , pp. 20-29
    • Kilian, J.1
  • 25
    • 4544353942 scopus 로고
    • A general completeness theorem for two-party games
    • ACM
    • rd STOC, ACM, 1991, 553-560.
    • (1991) rd STOC , pp. 553-560
    • Kilian, J.1
  • 27
    • 0002365530 scopus 로고
    • Privacy and communication complexity
    • May
    • E. Kushilevitz. "Privacy and Communication Complexity", SIAM J. Disc. Math. 5:2, May 1992, 273-284.
    • (1992) SIAM J. Disc. Math , vol.5 , Issue.2 , pp. 273-284
    • Kushilevitz, E.1
  • 31
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • IEEE
    • th FOCS, IEEE, 1986, 1986, 162-167.
    • (1986) th FOCS , vol.1986 , pp. 162-167
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.