메뉴 건너뛰기




Volumn , Issue , 2001, Pages 13-22

Secure multi-party computation problems and their applications: A review and open problems

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY; DATA MINING; DATA PRIVACY; DATABASE SYSTEMS; INTERNET;

EID: 0242496951     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (390)

References (64)
  • 3
    • 0003669971 scopus 로고    scopus 로고
    • A. Apostolico and Z. Galil, editors; Oxford University Press
    • A. Apostolico and Z. Galil, editors. Pattern Matching Algorithms. Oxford University Press, 1997.
    • (1997) Pattern Matching Algorithms
  • 5
    • 84944184545 scopus 로고    scopus 로고
    • Transaction-based pseudonyms in audit data for privacy respecting intrusion detection
    • J. Biskup and U. Flegel. Transaction-based pseudonyms in audit data for privacy respecting intrusion detection. In Recent Advances in Intrusion Detection, pages 28-48, 2000.
    • (2000) Recent Advances in Intrusion Detection , pp. 28-48
    • Biskup, J.1    Flegel, U.2
  • 10
    • 84947931331 scopus 로고    scopus 로고
    • Some recent research aspects of threshold cryptography
    • Springer-Verlag
    • Y. Desmedt. Some recent research aspects of threshold cryptography. In Lecture Notes in Computer Science 1396, pages 158-173, Springer-Verlag, 1997.
    • (1997) Lecture Notes in Computer Science 1396 , pp. 158-173
    • Desmedt, Y.1
  • 15
    • 0011000478 scopus 로고    scopus 로고
    • An introduction to threshold cryptography
    • RSA Laboratories
    • P. Gemmell. An introduction to threshold cryptography. In CryptoBytes, volume 2. RSA Laboratories, 1997.
    • (1997) CryptoBytes , vol.2
    • Gemmell, P.1
  • 16
    • 0242690422 scopus 로고    scopus 로고
    • Secure multi-party computation (working draft)
    • O. Goldreich, Secure multi-party computation (working draft). Available from http://www.wisdom.weizmann.ac.il/home/oded/public_html/foc.html, 1998.
    • (1998)
    • Goldreich, O.1
  • 32
    • 0032669864 scopus 로고    scopus 로고
    • Oblivious transfer and polynomial evaluation (extended abstract)
    • Atlanta, GA, USA, May 1-4
    • M. Naor and B. Pinkas. Oblivious transfer and polynomial evaluation (extended abstract). In Proceedings of the 31th ACM Symposium on Theory of Computing, pages 245-254, Atlanta, GA, USA, May 1-4 1999.
    • (1999) Proceedings of the 31th ACM Symposium on Theory of Computing , pp. 245-254
    • Naor, M.1    Pinkas, B.2
  • 33
    • 0242606412 scopus 로고
    • A comparison of three randomized response models for quantitative data
    • December
    • K. H. Pollock and Y. Bek. A comparison of three randomized response models for quantitative data. Journal of the American Statistical Association, 71(356):994-886, December 1976.
    • (1976) Journal of the American Statistical Association , vol.71 , Issue.356 , pp. 994-886
    • Pollock, K.H.1    Bek, Y.2
  • 34
    • 0003462641 scopus 로고
    • How to exchange secrets by oblivious transfer
    • Technical Report Tech. Memo TR-81, Aiken Computation Laboratory
    • M. Rabin. How to exchange secrets by oblivious transfer. Technical Report Tech. Memo TR-81, Aiken Computation Laboratory, 1981.
    • (1981)
    • Rabin, M.1
  • 36
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Communication of the ACM, 22(11):612-613, 1979.
    • (1979) Communication of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 37
    • 0013776710 scopus 로고
    • Randomized response: A surey technique for eliminating evasive answer bias
    • March
    • S. L. Warner. Randomized response: A surey technique for eliminating evasive answer bias. Journal of the American Statistical Association, 60(309):63-69, March 1965.
    • (1965) Journal of the American Statistical Association , vol.60 , Issue.309 , pp. 63-69
    • Warner, S.L.1
  • 38
    • 0000760605 scopus 로고
    • Randomized response: A surey technique for eliminating evasive answer bias
    • December
    • S. L. Warner. Randomized response: A surey technique for eliminating evasive answer bias. Journal of the American Statistical Association, 66(336):884-888, December 1971.
    • (1971) Journal of the American Statistical Association , vol.66 , Issue.336 , pp. 884-888
    • Warner, S.L.1
  • 40
    • 0011000478 scopus 로고    scopus 로고
    • An introduction to threshold cryptography
    • RSA Laboratories
    • P. Gemmell. An introduction to threshold cryptography. In CryptoBytes, volume 2. RSA Laboratories, 1997.
    • (1997) CryptoBytes , vol.2
    • Gemmell, P.1
  • 41
    • 0242690420 scopus 로고    scopus 로고
    • Secure multi-party computation (working draft)
    • O. Goldreich, Secure multi-party computation (working draft). Available from http://www.wisdom.weizmann.ac.il/home/oded/public_html/foc.html, 1998.
    • (1998)
    • Goldreich, O.1
  • 57
    • 0032669864 scopus 로고    scopus 로고
    • Oblivious transfer and polynomial evaluation (extended abstract)
    • Atlanta, GA, USA, May 1-4
    • M. Naor and B. Pinkas. Oblivious transfer and polynomial evaluation (extended abstract). In Proceedings of the 31th ACM Symposium on Theory of Computing, pages 245-254, Atlanta, GA, USA, May 1-4 1999.
    • (1999) Proceedings of the 31th ACM Symposium on Theory of Computing , pp. 245-254
    • Naor, M.1    Pinkas, B.2
  • 58
    • 0242606412 scopus 로고
    • A comparison of three randomized response models for quantitative data
    • December
    • K. H. Pollock and Y. Bek. A comparison of three randomized response models for quantitative data. Journal of the American Statistical Association, 71(356):994-886, December 1976.
    • (1976) Journal of the American Statistical Association , vol.71 , Issue.356 , pp. 994-886
    • Pollock, K.H.1    Bek, Y.2
  • 59
    • 0003462641 scopus 로고
    • How to exchange secrets by oblivious transfer
    • Technical Report Tech. Memo TR-81, Aiken Computation Laboratory
    • M. Rabin. How to exchange secrets by oblivious transfer. Technical Report Tech. Memo TR-81, Aiken Computation Laboratory, 1981.
    • (1981)
    • Rabin, M.1
  • 61
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Communication of the ACM, 22(11):612-613, 1979.
    • (1979) Communication of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 62
    • 0013776710 scopus 로고
    • Randomized response: A surey technique for eliminating evasive answer bias
    • March
    • S. L. Warner. Randomized response: A surey technique for eliminating evasive answer bias. Journal of the American Statistical Association, 60(309):63-69, March 1965.
    • (1965) Journal of the American Statistical Association , vol.60 , Issue.309 , pp. 63-69
    • Warner, S.L.1
  • 63
    • 0000760605 scopus 로고
    • Randomized response: A surey technique for eliminating evasive answer bias
    • December
    • S. L. Warner. Randomized response: A surey technique for eliminating evasive answer bias. Journal of the American Statistical Association, 66(336):884-888, December 1971.
    • (1971) Journal of the American Statistical Association , vol.66 , Issue.336 , pp. 884-888
    • Warner, S.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.