메뉴 건너뛰기




Volumn , Issue , 2000, Pages 294-304

Randomizing polynomials: A new representation with applications to round-efficient secure computation

Author keywords

[No Author keywords available]

Indexed keywords

RANDOMIZING POLYNOMIALS; ROUND-EFFICIENT SECURE COMPUTATIONS;

EID: 0034507841     PISSN: 02725428     EISSN: None     Source Type: Journal    
DOI: 10.1109/SFCS.2000.892118     Document Type: Article
Times cited : (212)

References (36)
  • 1
    • 85177141026 scopus 로고    scopus 로고
    • The complexity of matrix rank and feasible systems of linear equations
    • E. Allender R. Beals M. Ogihara The complexity of matrix rank and feasible systems of linear equations Proc. of 28nd STOC 503 513 Proc. of 28nd STOC 1996
    • (1996) , pp. 503-513
    • Allender, E.1    Beals, R.2    Ogihara, M.3
  • 2
    • 0024940038 scopus 로고
    • Non-cryptographic fault-tolerant computing in a constant number of rounds
    • J. Bar-Ilan D. Beaver Non-cryptographic fault-tolerant computing in a constant number of rounds Proc. of 8th PODC 201 209 Proc. of 8th PODC 1989
    • (1989) , pp. 201-209
    • Bar-Ilan, J.1    Beaver, D.2
  • 3
    • 0026991171 scopus 로고
    • Representing Boolean functions as polynomials modulo composite numbers
    • D. Barrington R. Beigel S. Rudich Representing Boolean functions as polynomials modulo composite numbers Proc. of 24th STOC 455 461 Proc. of 24th STOC 1992
    • (1992) , pp. 455-461
    • Barrington, D.1    Beigel, R.2    Rudich, S.3
  • 4
    • 84948952992 scopus 로고    scopus 로고
    • Minimal-latency secure function evaluation
    • D. Beaver Minimal-latency secure function evaluation Proc. EUROCRYPT 2000 335 350 Proc. EUROCRYPT 2000
    • Beaver, D.1
  • 5
    • 0002840876 scopus 로고    scopus 로고
    • Security with low communication overhead
    • D. Beaver J. Feigenbaum J. Kilian P. Rogaway Security with low communication overhead Proc. of CRYPTO '90 62 76 Proc. of CRYPTO '90
    • Beaver, D.1    Feigenbaum, J.2    Kilian, J.3    Rogaway, P.4
  • 6
    • 0025137207 scopus 로고
    • The round complexity of secure protocols (extended abstract)
    • D. Beaver S. Micali P. Rogaway The round complexity of secure protocols (extended abstract) Proc. of 22nd STOC 503 513 Proc. of 22nd STOC 1990
    • (1990) , pp. 503-513
    • Beaver, D.1    Micali, S.2    Rogaway, P.3
  • 7
    • 0027204515 scopus 로고
    • The polynomial method in circuit complexity
    • R. Beigel The polynomial method in circuit complexity Proc. of structure in complexity theory 82 95 Proc. of structure in complexity theory 1993
    • (1993) , pp. 82-95
    • Beigel, R.1
  • 8
    • 85031632064 scopus 로고    scopus 로고
    • On arithmetic branching programs
    • A. Beimel A. Gal On arithmetic branching programs Proc. of the 13th Annu. IEEE Conf. on Computational Complexity 68 80 Proc. of the 13th Annu. IEEE Conf. on Computational Complexity 1998
    • (1998) , pp. 68-80
    • Beimel, A.1    Gal, A.2
  • 9
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computation
    • M. Ben-Or S. Goldwasser A. Wigderson Completeness theorems for non-cryptographic fault-tolerant distributed computation Proc. of 20th STOC 1 10 Proc. of 20th STOC 1988
    • (1988) , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 10
    • 84904333112 scopus 로고    scopus 로고
    • One-round secure computation and secure autonomous mobile agents
    • C. Cachin J. Camenisch J. Kilian J. Muller One-round secure computation and secure autonomous mobile agents ICALP 2000 ICALP 2000
    • Cachin, C.1    Camenisch, J.2    Kilian, J.3    Muller, J.4
  • 11
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multi-party cryptographic protocols
    • R. Canetti Security and composition of multi-party cryptographic protocols J. Cryptology 13 1 143 202 2000
    • (2000) J. Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 12
    • 84898947315 scopus 로고
    • Multiparty unconditionally secure protocols (extended abstract)
    • D. Chaum C. Crépeau I. Damgård Multiparty unconditionally secure protocols (extended abstract) Proc. of 20th STOC 11 19 Proc. of 20th STOC 1988
    • (1988) , pp. 11-19
    • Chaum, D.1    Crépeau, C.2    Damgård, I.3
  • 13
    • 0022198802 scopus 로고
    • The bit extraction problem of t-resilient functions (preliminary version)
    • B. Chor O. Goldreich J. Hastad J. Friedman S. Rudich R. Smolensky The bit extraction problem of t-resilient functions (preliminary version) Proc. of 26th FOCS 396 407 Proc. of 26th FOCS 1985
    • (1985) , pp. 396-407
    • Chor, B.1    Goldreich, O.2    Hastad, J.3    Friedman, J.4    Rudich, S.5    Smolensky, R.6
  • 14
    • 85177132065 scopus 로고    scopus 로고
  • 15
    • 84957717648 scopus 로고    scopus 로고
    • Efficient multiparty computations secure against an adaptive adversary
    • R. Cramer I. Damgård S. Dziembowski M. Hirt T. Rabin Efficient multiparty computations secure against an adaptive adversary Proc. EUROCRYPT '99 311 326 Proc. EUROCRYPT '99
    • Cramer, R.1    Damgård, I.2    Dziembowski, S.3    Hirt, M.4    Rabin, T.5
  • 16
    • 84948975649 scopus 로고    scopus 로고
    • General secure multiparty computation from any linear secret-sharing scheme
    • R. Cramer I. Damgård U. Maurer General secure multiparty computation from any linear secret-sharing scheme Proc. of EUROCRYPT 2000 316 334 Proc. of EUROCRYPT 2000
    • Cramer, R.1    Damgård, I.2    Maurer, U.3
  • 17
    • 0027986369 scopus 로고
    • A minimal model for secure computation (extended abstract)
    • U. Feige J. Kilian M. Naor A minimal model for secure computation (extended abstract) Proc. of 26th STOC 554 563 Proc. of 26th STOC 1994
    • (1994) , pp. 554-563
    • Feige, U.1    Kilian, J.2    Naor, M.3
  • 18
    • 0031628398 scopus 로고    scopus 로고
    • Fact-track multiparty computations with applications to threshold cryptography
    • R. Gennaro M. O. Rabin T. Rabin Fact-track multiparty computations with applications to threshold cryptography Proc. of 17th PODC 101 111 Proc. of 17th PODC 1998
    • (1998) , pp. 101-111
    • Gennaro, R.1    Rabin, M.O.2    Rabin, T.3
  • 19
    • 85177105240 scopus 로고    scopus 로고
    • Probabilstic Methods and Pseudo-Randomness
    • Modern Cryptography Springer-Verlag
    • O. Goldreich Probabilstic Methods and Pseudo-Randomness 1999 Springer-Verlag Modern Cryptography
    • (1999)
    • Goldreich, O.1
  • 20
    • 85177110279 scopus 로고    scopus 로고
  • 21
    • 0002337124 scopus 로고
    • How to play any mental game (extended abstract)
    • O. Goldreich S. Micali A. Wigderson How to play any mental game (extended abstract) Proc. of 19th STOC 218 229 Proc. of 19th STOC 1987
    • (1987) , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 22
    • 0030718794 scopus 로고    scopus 로고
    • Private simultaneous messages protocols with applications
    • Y. Ishai E. Kushilevitz Private simultaneous messages protocols with applications Proc. of 5th ISTCS 174 183 Proc. of 5th ISTCS 1997
    • (1997) , pp. 174-183
    • Ishai, Y.1    Kushilevitz, E.2
  • 23
    • 84898989941 scopus 로고
    • Founding cryptography on oblivious transfer
    • J. Kilian Founding cryptography on oblivious transfer Proc. of 20th STOC 20 31 Proc. of 20th STOC 1988
    • (1988) , pp. 20-31
    • Kilian, J.1
  • 24
    • 0003013846 scopus 로고
    • New directions in testing
    • R. Lipton New directions in testing Proc. of DIMACS workshop on distributed computing and cryptography Proc. of DIMACS workshop on distributed computing and cryptography 1989
    • (1989)
    • Lipton, R.1
  • 25
    • 0002187139 scopus 로고    scopus 로고
    • Secure computation
    • S. Micali P. Rogaway Secure computation Proc. of CRYPTO '91 392 404 Proc. of CRYPTO '91
    • Micali, S.1    Rogaway, P.2
  • 26
    • 0000607672 scopus 로고
    • On the degree of Boolean functions as real polynomials
    • N. Nisan M. Szegedy On the degree of Boolean functions as real polynomials Computational Complexity 4 301 313 1994
    • (1994) Computational Complexity , vol.4 , pp. 301-313
    • Nisan, N.1    Szegedy, M.2
  • 27
    • 0024859552 scopus 로고
    • Verifiable secret sharing and multiparty protocols with honest majority
    • T. Rabin M. Ben-Or Verifiable secret sharing and multiparty protocols with honest majority Proc. of 21st STOC 73 85 Proc. of 21st STOC 1989
    • (1989) , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 28
    • 26944478724 scopus 로고
    • Lower bounds for the size of circuits of bounded depth with basis {\\^,♁}
    • A. A. Razborov Lower bounds for the size of circuits of bounded depth with basis {\\^,♁} Math. notes of the Academy of Science of the USSR 41 4 333 338 1987
    • (1987) Math. notes of the Academy of Science of the USSR , vol.41 , Issue.4 , pp. 333-338
    • Razborov, A.A.1
  • 29
    • 0033309271 scopus 로고    scopus 로고
    • Non-interactive cryptocomputing for NC1
    • T. Sandler A. Young M. Yung Non-interactive cryptocomputing for NC1 Proc. of 40th FOCS 554 566 Proc. of 40th FOCS 1999
    • (1999) , pp. 554-566
    • Sandler, T.1    Young, A.2    Yung, M.3
  • 30
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir How to share a secret Commun. ACM 22 6 612 613 June 1979
    • (1979) Commun. ACM , vol.22 , Issue.6 , pp. 612-613
    • Shamir, A.1
  • 31
    • 0023570259 scopus 로고
    • Algebraic methods in the theory of lower bounds for Boolean circuit complexity
    • R. Smolensky Algebraic methods in the theory of lower bounds for Boolean circuit complexity Proc. of 19th STOC 77 82 Proc. of 19th STOC 1987
    • (1987) , pp. 77-82
    • Smolensky, R.1
  • 32
    • 84936047855 scopus 로고
    • Randomized polynomials, threshold circuits, and the polynomial hierarchy
    • J. Tarui Randomized polynomials, threshold circuits, and the polynomial hierarchy Proc. of 8th Symp. on Theoretical Aspects of Computer Science 238 250 Proc. of 8th Symp. on Theoretical Aspects of Computer Science 1991
    • (1991) , pp. 238-250
    • Tarui, J.1
  • 33
    • 0027309991 scopus 로고
    • Lower bounds on representing Boolean functions as polynomials in Zm
    • S. Tsai Lower bounds on representing Boolean functions as polynomials in Zm Proceedings of the 8th Annual Structure in Complexity Theory 96 101 Proceedings of the 8th Annual Structure in Complexity Theory 1993
    • (1993) , pp. 96-101
    • Tsai, S.1
  • 34
    • 0028554636 scopus 로고
    • NL/poly ⊆ ♁L/poly
    • A. Wigderson NL/poly ⊆ ♁L/poly Proc. of the 9th Annual Structure in Complexity Theory 59 62 Proc. of the 9th Annual Structure in Complexity Theory 1994
    • (1994) , pp. 59-62
    • Wigderson, A.1
  • 35
    • 0020312165 scopus 로고
    • Protocols for secure computations (extended abstract)
    • A. C. Yao Protocols for secure computations (extended abstract) Proc. of 23rd FOCS 160 164 Proc. of 23rd FOCS 1982
    • (1982) , pp. 160-164
    • Yao, A.C.1
  • 36
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • A. C. Yao How to generate and exchange secrets Proc. of 27th FOCS 162 167 Proc. of 27th FOCS 1986
    • (1986) , pp. 162-167
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.