메뉴 건너뛰기




Volumn , Issue , 2003, Pages 404-413

Bounded-concurrent secure two-party computation in a constant number of rounds

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL COMPLEXITY; COMPUTER SIMULATION; CRYPTOGRAPHY; NETWORK PROTOCOLS; POLYNOMIALS; PROBABILITY;

EID: 0344118869     PISSN: 02725428     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (33)

References (35)
  • 1
    • 0035166072 scopus 로고    scopus 로고
    • How to go beyond the black-box simulation barrier
    • B. Barak. How to go Beyond the Black-Box Simulation Barrier. In 42nd FOCS, pages 106-115, 2001.
    • (2001) 42nd FOCS , pp. 106-115
    • Barak, B.1
  • 2
    • 0036949106 scopus 로고    scopus 로고
    • Constant-round coin-Tossing or realizing the shared-random string model
    • B. Barak. Constant-Round Coin-Tossing or Realizing the Shared-Random String Model. In 43rd FOCS, pages 345-355, 2002.
    • (2002) 43rd FOCS , pp. 345-355
    • Barak, B.1
  • 3
    • 0036294828 scopus 로고    scopus 로고
    • Universal arguments and their applications
    • B. Barak and O. Goldreich. Universal Arguments and their Applications. 17th CCC, pages 194-203, 2002.
    • (2002) 17th CCC , pp. 194-203
    • Barak, B.1    Goldreich, O.2
  • 4
    • 0036041101 scopus 로고    scopus 로고
    • Strict polynomial-time in simulation and extraction
    • B. Barak and Y. Lindell. Strict Polynomial-Time in Simulation and Extraction. In 34th STOC, pages 484-493, 2002.
    • (2002) 34th STOC , pp. 484-493
    • Barak, B.1    Lindell, Y.2
  • 5
    • 0002382799 scopus 로고
    • Foundations of secure interactive computing
    • Springer-Verlag (LNCS 576); Repetition Lower the Error
    • D. Beaver. Foundations of Secure Interactive Computing. In CRYPTO'91, Springer-Verlag (LNCS 576), pages 377-391, 1991. Repetition Lower the Error
    • (1991) CRYPTO'91 , pp. 377-391
    • Beaver, D.1
  • 6
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • R. Canetti. Security and Composition of Multiparty Cryptographic Protocols. Journal of Cryptology, 13(1):143-202, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 7
    • 0038721038 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • R. Canetti. Universally Composable Security: A New Paradigm for Cryptographic Protocols. In 34th STOC, pages 494-503, 2002.
    • (2002) 34th STOC , pp. 494-503
    • Canetti, R.1
  • 8
    • 84880897758 scopus 로고    scopus 로고
    • Universally composable commitments
    • Springer LNCS 2139
    • R. Canetti and M. Fischlin. Universally Composable Commitments. In Crypto2001, Springer LNCS 2139, pages 19-40, 2001.
    • (2001) Crypto2001 , pp. 19-40
    • Canetti, R.1    Fischlin, M.2
  • 10
    • 0037605775 scopus 로고    scopus 로고
    • Black-box concurrent zero-knowledge requires (almost) logarithmically many rounds
    • R. Canetti, J. Kilian, E. Petrank and A. Rosen. Black-Box Concurrent Zero-Knowledge Requires (almost) Logarithmically Many Rounds. SIAM Jour. on Computing, Vol. 32(1), pages 1-47, 2002.
    • (2002) SIAM Jour. on Computing , vol.32 , Issue.1 , pp. 1-47
    • Canetti, R.1    Kilian, J.2    Petrank, E.3    Rosen, A.4
  • 11
    • 32844458303 scopus 로고    scopus 로고
    • On the limitations of universally composable two-party computation without set-up assumptions
    • R. Canetti, E. Kushilevitz and Y. Lindell. On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions. To appear in EuroCrypt2003.
    • EuroCrypt2003
    • Canetti, R.1    Kushilevitz, E.2    Lindell, Y.3
  • 12
    • 0036038991 scopus 로고    scopus 로고
    • Universally composable two-party and multi-party computation
    • R. Canetti, Y. Lindell, R. Ostrovsky and A. Sahai. Universally Composable Two-Party and Multi-Party Computation. In 34th STOC, pages 494-503, 2002.
    • (2002) 34th STOC , pp. 494-503
    • Canetti, R.1    Lindell, Y.2    Ostrovsky, R.3    Sahai, A.4
  • 13
    • 84948970500 scopus 로고    scopus 로고
    • Efficient concurrent zero-knowledge in the auxiliary string model
    • LNCS 1807
    • I. Damgard. Efficient Concurrent Zero-Knowledge in the Auxiliary String Model. In EuroCrypt2000, LNCS 1807, 418-430, 2000.
    • (2000) EuroCrypt2000 , pp. 418-430
    • Damgard, I.1
  • 14
  • 15
    • 0031632567 scopus 로고    scopus 로고
    • Concurrent zero-knowledge
    • C. Dwork, M. Naor and A. Sahai. Concurrent Zero-Knowledge. In 30th STOC, pages 409-418, 1998.
    • (1998) 30th STOC , pp. 409-418
    • Dwork, C.1    Naor, M.2    Sahai, A.3
  • 16
    • 84957623615 scopus 로고    scopus 로고
    • Concurrent zero-knowledge: Reducing the need for timing constraints
    • Springer LNCS 1462
    • C. Dwork and A. Sahai. Concurrent Zero-Knowledge: Reducing the Need for Timing Constraints. In Cryto98, Springer LNCS 1462, pages 442-457, 1998.
    • (1998) Cryto98 , pp. 442-457
    • Dwork, C.1    Sahai, A.2
  • 17
    • 0345711989 scopus 로고
    • Ph.D. thesis, Alternative Models for Zero Knowledge Interactive Proofs. Weizmann Institute of Science
    • U. Feige. Ph.D. thesis, Alternative Models for Zero Knowledge Interactive Proofs. Weizmann Institute of Science, 1990.
    • (1990)
    • Feige, U.1
  • 18
    • 0345711987 scopus 로고    scopus 로고
    • Draft of a Chapter on general Protocols
    • O. Goldreich. Draft of a Chapter on general Protocols. Available at: http://www.wisdom.weizmann.ac.il/-oded/PSBookFrag/prot.ps
    • Goldreich, O.1
  • 20
    • 0029767165 scopus 로고    scopus 로고
    • On the composition of zero-knowledge proof systems
    • O. Goldreich and H. Krawczyk. On the Composition of Zero-Knowledge Proof Systems. SIAM Jour. on Computing, Vol. 25(1), pages 169-192, 1996.
    • (1996) SIAM Jour. on Computing , vol.25 , Issue.1 , pp. 169-192
    • Goldreich, O.1    Krawczyk, H.2
  • 21
    • 71149116146 scopus 로고
    • Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
    • O. Goldreich, S. Micali and A. Wigderson. Proofs that Yield Nothing But Their Validity or All Languages in NP Have Zero-Knowledge Proof Systems. JACM, Vol. 38(1), pp. 691-729, 1991.
    • (1991) JACM , vol.38 , Issue.1 , pp. 691-729
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 22
    • 0023545076 scopus 로고
    • How to play any mental game - A completeness theorem for protocols with honest majority
    • O. Goldreich, S. Micali and A. Wigderson. How to Play any Mental Game - A Completeness Theorem for Protocols with Honest Majority. In 19th STOC, pages 218-229, 1987.
    • (1987) 19th STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 23
    • 84955564077 scopus 로고
    • Fair computation of general functions in presence of immoral majority
    • Springer-Verlag (LNCS 537)
    • S. Goldwasser and L. Levin. Fair Computation of General Functions in Presence of Immoral Majority. In CRYPTO'90, Springer-Verlag (LNCS 537), pages 77-93, 1990.
    • (1990) CRYPTO'90 , pp. 77-93
    • Goldwasser, S.1    Levin, L.2
  • 24
    • 0034830278 scopus 로고    scopus 로고
    • Concurrent and resettable zero-knowledge in poly-logarithmic rounds
    • J. Kilian and E. Petrank. Concurrent and Resettable Zero-Knowledge in Poly-logarithmic Rounds. In 33rd STOC, pages 560-569, 2001.
    • (2001) 33rd STOC , pp. 560-569
    • Kilian, J.1    Petrank, E.2
  • 25
    • 0032319637 scopus 로고    scopus 로고
    • Lower bounds for zero-knowledge on the internet
    • J. Kilian, E. Petrank and C. Rackoff. Lower Bounds for Zero-Knowledge on the Internet. In 39th FOCS, pages 484-492, 1998.
    • (1998) 39th FOCS , pp. 484-492
    • Kilian, J.1    Petrank, E.2    Rackoff, C.3
  • 26
    • 0038446804 scopus 로고    scopus 로고
    • Bounded-concurrent secure two-party computation without setup assumptions
    • Y. Lindell. Bounded-Concurrent Secure Two-Party Computation Without Setup Assumptions. To appear in 34th STOC, 2003.
    • (2003) 34th STOC
    • Lindell, Y.1
  • 27
    • 0034854953 scopus 로고    scopus 로고
    • CS proofs
    • S. Micali. CS Proofs. SIAM Jour. on Computing, Vol. 30 (4), pages 1253-1298, 2000.
    • (2000) SIAM Jour. on Computing , vol.30 , Issue.4 , pp. 1253-1298
    • Micali, S.1
  • 28
    • 84974655726 scopus 로고
    • Secure computation
    • Unpublished manuscript; Preliminary version in CRYPTO'91, Springer-Verlag (LNCS 576), pages 392-404, 1991
    • S. Micali and P. Rogaway. Secure computation. Unpublished manuscript, 1992. Preliminary version in CRYPTO'91, Springer-Verlag (LNCS 576), pages 392-404, 1991.
    • (1992)
    • Micali, S.1    Rogaway, P.2
  • 29
    • 0001448484 scopus 로고
    • Bit commitment using pseudorandomness
    • M. Naor. Bit Commitment using Pseudorandomness. Jour. of Cryptology, Vol. 4, pages 151-158, 1991.
    • (1991) Jour. of Cryptology , vol.4 , pp. 151-158
    • Naor, M.1
  • 30
    • 35248833045 scopus 로고    scopus 로고
    • Simulation in quasi-polynomial time and its application to protocol composition
    • Springer LNCS, 2656
    • R. Pass. Simulation in Quasi-polynomial Time and its Application to Protocol Composition. In EuroCrypt2003, Springer LNCS, 2656, pages 160-176, 2003.
    • (2003) EuroCrypt2003 , pp. 160-176
    • Pass, R.1
  • 31
    • 84943423699 scopus 로고    scopus 로고
    • On deniability in the common reference string and random oracle model
    • R. Pass. On Deniability in the Common Reference String and Random Oracle Model. To appear in Crypto2003
    • Crypto2003
    • Pass, R.1
  • 33
    • 84957621865 scopus 로고    scopus 로고
    • On the concurrent composition of zero-knowledge proofs
    • Springer LNCS 1592
    • R. Richardson and J. Kilian. On the Concurrent Composition of Zero-Knowledge Proofs. In EuroCrypt99, Springer LNCS 1592, pages 415-431, 1999.
    • (1999) EuroCrypt99 , pp. 415-431
    • Richardson, R.1    Kilian, J.2
  • 34
    • 84983126760 scopus 로고    scopus 로고
    • A note on the round-complexity of concurrent zero-knowledge
    • Springer LNCS 1880
    • A. Rosen. A note on the round-complexity of Concurrent Zero-Knowledge. In Crypto2000, Springer LNCS 1880, pages 451-468, 2000.
    • (2000) Crypto2000 , pp. 451-468
    • Rosen, A.1
  • 35
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • A. Yao. How to Generate and Exchange Secrets. In 27th FOCS, pages 162-167, 1986.
    • (1986) 27th FOCS , pp. 162-167
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.