메뉴 건너뛰기




Volumn , Issue , 2000, Pages 325-334

On the complexity of verifiable secret sharing and multiparty computation

Author keywords

[No Author keywords available]

Indexed keywords

ADAPTIVE ADVERSARY; BLACK-BOX REDUCTIONS; BROADCAST CHANNELS; GENERAL ACCESS STRUCTURE; IMPOSSIBILITY RESULTS; MULTIPARTY COMPUTATION; SECRET SHARING SCHEMES; VERIFIABLE SECRET SHARING; MULTIPARTY COMPUTATION (MPC); VERIFIABLE SECRET SHARING (VSS);

EID: 0033706246     PISSN: 07378017     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/335305.335343     Document Type: Conference Paper
Times cited : (37)

References (17)
  • 2
    • 84898960610 scopus 로고
    • Completeness theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
    • ACM Press
    • M. Ben-Or, S. Goldwasser, A. Wigderson: Completeness theorems for Non-Cryptographic Fault-Tolerant Distributed Computation, Proc. of ACM STOC '88, pp. 1-10, ACM Press, 1988.
    • (1988) Proc. of ACM STOC '88 , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 3
    • 84898947315 scopus 로고
    • Multi-Party Unconditionally Secure Protocols
    • ACM Press
    • D. Chaum, C. Crépeau, I. Damgård: Multi-Party Unconditionally Secure Protocols, Proc. of ACM STOC '88, pp. 11-19, ACM Press, 1988.
    • (1988) Proc. of ACM STOC '88 , pp. 11-19
    • Chaum, D.1    Crépeau, C.2    Damgård, I.3
  • 4
    • 0022199386 scopus 로고
    • Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults
    • B. Chor, S. Goldwasser, S. Micali, B. Awerbuch: Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults, Proc. of IEEE FOCS '85, pp. 383-395, 1985.
    • (1985) Proc. of IEEE FOCS '85 , pp. 383-395
    • Chor, B.1    Goldwasser, S.2    Micali, S.3    Awerbuch, B.4
  • 5
    • 84957717648 scopus 로고    scopus 로고
    • Efficient Multiparty Computations with Dishonest Minority
    • Proc. of EUROCRYPT '99, Springer Verlag
    • R. Cramer, I. Damg̊rd, S. Dziembowski, M. Hirt, T. Rabin: Efficient Multiparty Computations with Dishonest Minority, Proc. of EUROCRYPT '99, Springer Verlag LNCS, vol. 1592, pp. 311-326, 1999.
    • (1999) LNCS , vol.1592 , pp. 311-326
    • Cramer, R.1    Damg̊rd, I.2    Dziembowski, S.3    Hirt, M.4    Rabin, T.5
  • 6
    • 84878906967 scopus 로고    scopus 로고
    • Secure and Efficient General Multiparty Computations from any Linear Secret Sharing Scheme
    • Proc. of EUROCRYPT '00, Springer Verlag
    • R. Cramer, I. Damg̊rd, U. Maurer: Secure and Efficient General Multiparty Computations from any Linear Secret Sharing Scheme, Proc. of EUROCRYPT '00, Springer Verlag LNCS, 2000.
    • (2000) LNCS
    • Cramer, R.1    Damg̊rd, I.2    Maurer, U.3
  • 7
    • 84947907604 scopus 로고    scopus 로고
    • Efficient Byzantine Agreement Secure against General Adversaries
    • Proc. of Distributed Computing (DISC '98), Springer Verlag
    • M. Fitzi, U. Maurer: Efficient Byzantine Agreement Secure against General Adversaries, Proc. of Distributed Computing (DISC '98), Springer Verlag LNCS, vol. 1499, pp. 134-148, 1998.
    • (1998) LNCS , vol.1499 , pp. 134-148
    • Fitzi, M.1    Maurer, U.2
  • 9
    • 0023545076 scopus 로고    scopus 로고
    • How to Play Any Mental Game or a Completeness Theorem for Protocols with Honest Majority
    • O. Goldreich, S. Micali and A. Wigderson: How to Play Any Mental Game or a Completeness Theorem for Protocols with Honest Majority, Proc. of ACM STOC '87, pp. 218-229.
    • Proc. of ACM STOC '87 , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 10
    • 33745999816 scopus 로고    scopus 로고
    • Player Simulation and General Adversary Structures in Perfect Multiparty Computation
    • Extended abstract in Proc. of ACM PODC'97, pp. 25-34, ACM Press, 1997
    • M. Hirt, U. Maurer: Player Simulation and General Adversary Structures in Perfect Multiparty Computation, Journal of Cryptology, 13( 1): 31-61, 2000. Extended abstract in Proc. of ACM PODC'97, pp. 25-34, ACM Press, 1997.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 31-61
    • Hirt, M.1    Maurer, U.2
  • 12
    • 0026963441 scopus 로고
    • A note on Efficient Proofs and Arguments
    • ACM Press
    • J. Kilian: A note on Efficient Proofs and Arguments, Proc. of ACM STOC '92, pp. 723-732, ACM Press, 1992.
    • (1992) Proc. of ACM STOC '92 , pp. 723-732
    • Kilian, J.1
  • 14
    • 0001448484 scopus 로고
    • Bit commitment using pseudorandomness
    • M. Naor: Bit commitment using pseudorandomness, Journal of Cryptology, 4( 2): 151-158, 1991.
    • (1991) Journal of Cryptology , vol.4 , Issue.2 , pp. 151-158
    • Naor, M.1
  • 15
    • 0024859552 scopus 로고
    • Verifiable Secret Sharing and Multiparty Protocols with Honest majority
    • ACM Press
    • T. Rabin, M. Ben-Or: Verifiable Secret Sharing and Multiparty Protocols with Honest majority, Proc. of ACM STOC '89, pp. 73-85, ACM Press, 1989.
    • (1989) Proc. of ACM STOC '89 , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 16
  • 17
    • 0020312165 scopus 로고
    • Protocols for Secure Computation
    • A. Yao: Protocols for Secure Computation, Proc. of IEEE FOCS '82, pp. 160-164, 1982.
    • (1982) Proc. of IEEE FOCS '82 , pp. 160-164
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.