메뉴 건너뛰기




Volumn 18, Issue 1, 2005, Pages 37-61

Minimal complete primitives for secure multi-party computation

Author keywords

Complete functions; Multi party computation; Oblivious cast; Secure function evaluation; Unconditional security

Indexed keywords

COMMUNICATION CHANNELS (INFORMATION THEORY); COMPUTATIONAL METHODS; INFORMATION THEORY; MATHEMATICAL OPERATORS; SECURITY OF DATA;

EID: 22044456389     PISSN: 09332790     EISSN: None     Source Type: Journal    
DOI: 10.1007/s00145-004-0150-y     Document Type: Article
Times cited : (21)

References (26)
  • 1
    • 85029542707 scopus 로고
    • Foundations of secure interactive computation
    • [Be] LNCS, Springer-Verlag, Berlin
    • [Be] D. Beaver. Foundations of secure interactive computation. In Advances in Cryptology - CRYPTO '91, LNCS, pp. 377-391. Springer-Verlag, Berlin, 1992.
    • (1992) Advances in Cryptology - CRYPTO '91 , pp. 377-391
    • Beaver, D.1
  • 3
    • 84955606922 scopus 로고    scopus 로고
    • Oblivious key escrow
    • [Bl] R. Anderson, editor, volume 1174 of LNCS, Springer-Verlag, Berlin
    • [Bl] M. Blaze. Oblivious key escrow. In R. Anderson, editor, Proc. First Infohiding, volume 1174 of LNCS, pp. 335-343, Springer-Verlag, Berlin, 1996.
    • (1996) Proc. First Infohiding , pp. 335-343
    • Blaze, M.1
  • 4
    • 84957064831 scopus 로고    scopus 로고
    • The all-or-nothing nature of two-party secure computation
    • [BMM] volume 1666 of LNCS, Springer-Verlag, Berlin
    • [BMM] A. Beimel, T. Malkin, and S. Micali. The all-or-nothing nature of two-party secure computation. In Advances in Cryptology - CRYPTO '99, volume 1666 of LNCS, pp. 80-97. Springer-Verlag, Berlin, 1999.
    • (1999) Advances in Cryptology - CRYPTO '99 , pp. 80-97
    • Beimel, A.1    Malkin, T.2    Micali, S.3
  • 5
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • [Ca]
    • [Ca] R. Canetti. Security and composition of multiparty cryptographic protocols. Journal of Cryptology, 13(1): 143-202, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 7
    • 84957717648 scopus 로고    scopus 로고
    • Efficient multiparty computations secure against an adaptive adversary
    • -] volume 1592 of LNCS, Springer-Verlag, Berlin
    • -] R. Cramer, I. Damgård, S. Dziembowski, M. Hirt, and T. Rabin. Efficient multiparty computations secure against an adaptive adversary. In. Advances in Cryptology - EUROCRYPT '99, volume 1592 of LNCS, pp. 311-326. Springer-Verlag, Berlin, 1999.
    • (1999) Advances in Cryptology - EUROCRYPT '99 , pp. 311-326
    • Cramer, R.1    Damgård, I.2    Dziembowski, S.3    Hirt, M.4    Rabin, T.5
  • 8
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • [Ch]
    • [Ch] D. Chaum. The dining cryptographers problem: unconditional sender and recipient untraceability. Journal of Cryptology, 1(1):65-75, 1988.
    • (1988) Journal of Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 9
    • 0027341860 scopus 로고
    • Perfectly secure message transmission
    • [DDWY] Jan.
    • [DDWY] D. Dolev, C. Dwork, O. Waarts, and M. Yung. Perfectly secure message transmission. Journal of the ACM, 40(1): 17-47, Jan. 1993.
    • (1993) Journal of the ACM , vol.40 , Issue.1 , pp. 17-47
    • Dolev, D.1    Dwork, C.2    Waarts, O.3    Yung, M.4
  • 10
    • 0022562351 scopus 로고
    • Easy impossibility proofs for distributed consensus problems
    • [FLM]
    • [FLM] M. J. Fischer, N. A. Lynch, and M. Merritt. Easy impossibility proofs for distributed consensus problems. Distributed Computing, 1:26-39, 1986.
    • (1986) Distributed Computing , vol.1 , pp. 26-39
    • Fischer, M.J.1    Lynch, N.A.2    Merritt, M.3
  • 12
    • 84955564077 scopus 로고
    • Fair computation of general functions in presence of immoral majority
    • [GL] volume 537 of LNCS, Springer-Verlag, Berlin
    • [GL] S. Goldwasser and L. Levin. Fair computation of general functions in presence of immoral majority. In Advances in Cryptology - CRYPTO '90, volume 537 of LNCS, pp. 77-93. Springer-Verlag, Berlin, 1990.
    • (1990) Advances in Cryptology - CRYPTO '90 , pp. 77-93
    • Goldwasser, S.1    Levin, L.2
  • 18
    • 0033706604 scopus 로고    scopus 로고
    • More general completeness theorems for secure two-party computation
    • [Ki3]
    • [Ki3] J. Kilian. More general completeness theorems for secure two-party computation. In Proc. 32nd Annual ACM Symp. on the Theory of Computing, pp. 316-324, 2000.
    • (2000) Proc. 32nd Annual ACM Symp. on the Theory of Computing , pp. 316-324
    • Kilian, J.1
  • 21
    • 84974655726 scopus 로고
    • Secure computation
    • [MR] volume 576 of LNCS, Springer-Verlag, Berlin
    • [MR] S. Micali and P. Rogaway. Secure computation. In. Advances in Cryptology - CRYPTO '91, volume 576 of LNCS, pp. 392-404, Springer-Verlag, Berlin, 1992.
    • (1992) Advances in Cryptology - CRYPTO '91 , pp. 392-404
    • Micali, S.1    Rogaway, P.2
  • 22
    • 84976810569 scopus 로고
    • Reaching agreement in the presence of faults
    • [PSL] Apr.
    • [PSL] M. Pease, R. Shostak, and L. Lamport. Reaching agreement in the presence of faults. Journal of the ACM, 27(2):228-234, Apr. 1980.
    • (1980) Journal of the ACM , vol.27 , Issue.2 , pp. 228-234
    • Pease, M.1    Shostak, R.2    Lamport, L.3
  • 23
    • 0003462641 scopus 로고
    • How to exchange secrets by oblivious transfer
    • [Ra] Harvard Aiken Computation Laboratory
    • [Ra] M. O. Rabin. How to exchange secrets by oblivious transfer. Technical Report TR-81, Harvard Aiken Computation Laboratory, 1981.
    • (1981) Technical Report , vol.TR-81
    • Rabin, M.O.1
  • 24
    • 0024859552 scopus 로고
    • Verifiable secret sharing and multiparty protocols with honest majority
    • [RB]
    • [RB] T. Rabin and M. Ben-Or. Verifiable secret sharing and multiparty protocols with honest majority. In Proc. 21st ACM Symp. on the Theory of Computing, pp. 73-85, 1989.
    • (1989) Proc. 21st ACM Symp. on the Theory of Computing , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.