메뉴 건너뛰기




Volumn 18, Issue 3, 2005, Pages 247-287

Secure multi-party computation without agreement

Author keywords

Broadcast; Protocol composition; Secure multi party computation

Indexed keywords

BROADCASTING; COMMUNICATION CHANNELS (INFORMATION THEORY); ERROR CORRECTION; NETWORK PROTOCOLS; PARALLEL PROCESSING SYSTEMS; SECURITY OF DATA;

EID: 22344432877     PISSN: 09332790     EISSN: None     Source Type: Journal    
DOI: 10.1007/s00145-005-0319-z     Document Type: Article
Times cited : (81)

References (38)
  • 1
    • 0002382799 scopus 로고
    • Foundations of secure interactive computing
    • (LNCS 576), Springer-Verlag, Berlin
    • D. Beaver. Foundations of Secure Interactive Computing. In CRYPTO '91 (LNCS 576), pages 377-391, Springer-Verlag, Berlin, 1991.
    • (1991) CRYPTO '91 , pp. 377-391
    • Beaver, D.1
  • 2
    • 0024769014 scopus 로고
    • Multiparty computation with faulty majority
    • D. Beaver and S. Goldwasser. Multiparty Computation with Faulty Majority. In Proc. 30th FOCS, pages 468-473, 1989.
    • (1989) Proc. 30th FOCS , pp. 468-473
    • Beaver, D.1    Goldwasser, S.2
  • 3
    • 0000917097 scopus 로고
    • Cryptographic protocols provably secure against dynamic adversaries
    • (LNCS 658), Springer-Verlag, Berlin
    • D. Beaver and S. Haber. Cryptographic Protocols Provably Secure Against Dynamic Adversaries. In EUROCRYPT '92 (LNCS 658), pages 307-323, Springer-Verlag, Berlin, 1992.
    • (1992) EUROCRYPT '92 , pp. 307-323
    • Beaver, D.1    Haber, S.2
  • 4
    • 0025137207 scopus 로고
    • The Round Complexity of Secure Protocols
    • D. Beaver, S. Micali and P. Rogaway. The Round Complexity of Secure Protocols. In Proc. 22nd STOC, pages 503-513, 1990.
    • (1990) Proc. 22nd STOC , pp. 503-513
    • Beaver, D.1    Micali, S.2    Rogaway, P.3
  • 5
    • 0346342609 scopus 로고    scopus 로고
    • Optimally-resilient interactive consistency in constant time
    • M. Ben-Or and R. El-Yaniv. Optimally-Resilient Interactive Consistency in Constant Time. Distributed Computing, 16(4):249-262, 2003.
    • (2003) Distributed Computing , vol.16 , Issue.4 , pp. 249-262
    • Ben-Or, M.1    El-Yaniv, R.2
  • 6
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computation
    • M. Ben-Or, S. Goldwasser and A. Wigderson. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation. In Proc. 20th STOC, pages 1-10, 1988.
    • (1988) Proc. 20th STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 8
    • 0011797655 scopus 로고
    • An asynchronous [(n - 1)/3]-resilient consensus protocol
    • G. Bracha. An Asynchronous [(n - 1)/3]-Resilient Consensus Protocol. In Proc. 3rd PODC, pages 154-162, 1984.
    • (1984) Proc. 3rd PODC , pp. 154-162
    • Bracha, G.1
  • 9
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multi-party cryptographic protocols
    • R. Canetti. Security and Composition of Multi-Party Cryptographic Protocols. Journal of Cryptology, 13(1): 143-202, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 10
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • R. Canetti. Universally Composable Security: A New Paradigm for Cryptographic Protocols. In Proc. 42nd FOCS, pages 136-145, 2001.
    • (2001) Proc. 42nd FOCS , pp. 136-145
    • Canetti, R.1
  • 12
    • 84880897758 scopus 로고    scopus 로고
    • Universally composable commitments
    • (LNCS 2139), Springer-Verlag, Berlin
    • R. Canetti and M. Fischlin. Universally Composable Commitments. In CRYPTO 2001 (LNCS 2139), pages 19-40, Springer-Verlag, Berlin, 2001.
    • (2001) CRYPTO 2001 , pp. 19-40
    • Canetti, R.1    Fischlin, M.2
  • 13
    • 84947232363 scopus 로고    scopus 로고
    • Universally composable notions of key-exchange and secure channels
    • (LNCS 2332), Springer-Verlag, Berlin
    • R. Canetti and H. Krawczyk. Universally Composable Notions of Key-Exchange and Secure Channels. In EUROCRYPT 2002 (LNCS 2332), pages 337-351, Springer-Verlag, Berlin, 2002.
    • (2002) EUROCRYPT 2002 , pp. 337-351
    • Canetti, R.1    Krawczyk, H.2
  • 14
    • 0036038991 scopus 로고    scopus 로고
    • Universally composable two-party and multi-party secure computation
    • R. Canetti, Y. Lindell, R. Ostrovsky and A. Sahai. Universally Composable Two-Party and Multi-Party Secure Computation. In Proc. 34th STOC, pages 494-503, 2002.
    • (2002) Proc. 34th STOC , pp. 494-503
    • Canetti, R.1    Lindell, Y.2    Ostrovsky, R.3    Sahai, A.4
  • 15
    • 0027313816 scopus 로고
    • Fast asynchronous Byzantine agreement with optimal resilience
    • R. Canetti and T. Rabin. Fast Asynchronous Byzantine Agreement with Optimal Resilience. In. Proc. 25th STOC, pages 42-51, 1993.
    • (1993) Proc. 25th STOC , pp. 42-51
    • Canetti, R.1    Rabin, T.2
  • 16
    • 84898947315 scopus 로고
    • Multi-party unconditionally secure protocols
    • D. Chaum, C. Crepeau and I. Damgard. Multi-Party Unconditionally Secure Protocols. In Proc. 20th STOC, pages 11-19, 1988.
    • (1988) Proc. 20th STOC , pp. 11-19
    • Chaum, D.1    Crepeau, C.2    Damgard, I.3
  • 17
    • 0009768331 scopus 로고
    • The Byzantine generals strike again
    • D. Dolev. The Byzantine Generals Strike Again. Journal of Algorithms, 3(1):14-30, 1982.
    • (1982) Journal of Algorithms , vol.3 , Issue.1 , pp. 14-30
    • Dolev, D.1
  • 18
    • 84976826800 scopus 로고
    • Zero-knowledge proofs of knowledge in two rounds
    • (LNCS 435), Springer-Verlag, Berlin
    • U. Feige and A. Shamir. Zero-Knowledge Proofs of Knowledge in Two Rounds. In CRYPTO '89 (LNCS 435), pages 526-544, Springer-Verlag, Berlin, 1989.
    • (1989) CRYPTO '89 , pp. 526-544
    • Feige, U.1    Shamir, A.2
  • 19
    • 0031210863 scopus 로고    scopus 로고
    • An optimal algorithm for synchronous Byzantine agreement
    • P. Feldman and S. Micali. An Optimal Algorithm for Synchronous Byzantine agreement. SIAM Journal of Computing, 26(2):873-933, 1997.
    • (1997) SIAM Journal of Computing , vol.26 , Issue.2 , pp. 873-933
    • Feldman, P.1    Micali, S.2
  • 20
    • 84947209216 scopus 로고    scopus 로고
    • Unconditional Byzantine agreement and multi-party computation secure against dishonest minorities from scratch
    • (LNCS 2332), Springer-Verlag, Berlin
    • M. Fitzi, N. Gisin, U. Maurer and O. Von Rotz. Unconditional Byzantine Agreement and Multi-Party Computation Secure Against Dishonest Minorities from Scratch. In EUROCRYPT 2002 (LNCS 2332), pages 482-501, Springer-Verlag, Berlin, 2002.
    • (2002) EUROCRYPT 2002 , pp. 482-501
    • Fitzi, M.1    Gisin, N.2    Maurer, U.3    Von Rotz, O.4
  • 21
  • 22
    • 84976655650 scopus 로고
    • Cryptographic computation: Secure fault tolerant protocols and the public key model
    • (LNCS 293), Springer-Verlag, Berlin
    • Z. Galil, S. Haber and M. Yung. Cryptographic Computation: Secure Fault Tolerant Protocols and the Public Key Model. In CRYPTO '87 (LNCS 293), pages 135-155, Springer-Verlag, Berlin, 1987.
    • (1987) CRYPTO '87 , pp. 135-155
    • Galil, Z.1    Haber, S.2    Yung, M.3
  • 23
    • 0003839182 scopus 로고    scopus 로고
    • Manuscript, version 1.4
    • O. Goldreich. Secure Multi-Party Computation. Manuscript, version 1.4, 2002. Available from http://www.wisdom.weizmann.ac.il/~oded/pp.html.
    • (2002) Secure Multi-party Computation
    • Goldreich, O.1
  • 24
    • 0036038989 scopus 로고    scopus 로고
    • Concurrent zero-knowledge with timing revisited
    • O. Goldreich. Concurrent Zero-Knowledge with Timing Revisited. In Proc. 34th STOC, pages 332-340, 2002.
    • (2002) Proc. 34th STOC , pp. 332-340
    • Goldreich, O.1
  • 25
    • 0023545076 scopus 로고
    • How to play any mental game-A completeness theorem for protocols with honest majority
    • For details see [23]
    • O. Goldreich, S. Micali and A. Wigderson. How to Play Any Mental Game-A Completeness Theorem for Protocols with Honest Majority. In Proc. 19th STOC, pages 218-229, 1987. For details see [23].
    • (1987) Proc. 19th STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 26
    • 71149116146 scopus 로고
    • Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
    • O. Goldreich, S. Micali and A. Wigderson. Proofs that Yield Nothing but Their Validity or All Languages in NP Have Zero-Knowledge Proof Systems. Journal of the ACM, 38(1):691-729, 1991.
    • (1991) Journal of the ACM , vol.38 , Issue.1 , pp. 691-729
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 27
    • 84955564077 scopus 로고
    • Fair computation of general functions in presence of immoral majority
    • (LNCS 537), Spring-Verlag, Berlin
    • S. Goldwasser and L. Levin. Fair Computation of General Functions in Presence of Immoral Majority. In CRYPTO '90 (LNCS 537), pages 77-93, Spring-Verlag, Berlin, 1990.
    • (1990) CRYPTO '90 , pp. 77-93
    • Goldwasser, S.1    Levin, L.2
  • 28
    • 84898989941 scopus 로고
    • Founding cryptography on oblivious transfer
    • J.Kilian, Founding Cryptography on Oblivious Transfer. In Proc. 20th STOC, pages 20-31, 1988.
    • (1988) Proc. 20th STOC , pp. 20-31
    • Kilian, J.1
  • 29
    • 4544353942 scopus 로고
    • A general completeness theorem for two-party games
    • J. Kilian, A General Completeness Theorem for Two-Party Games. In Proc. 23rd STOC, pages 553-560, 1991.
    • (1991) Proc. 23rd STOC , pp. 553-560
    • Kilian, J.1
  • 30
    • 0020780905 scopus 로고
    • The weak Byzantine generals problem
    • L. Lamport. The Weak Byzantine Generals Problem. Journal of the ACM, 30(3):668-676, 1983.
    • (1983) Journal of the ACM , vol.30 , Issue.3 , pp. 668-676
    • Lamport, L.1
  • 32
    • 0036038649 scopus 로고    scopus 로고
    • On the composition of authenticated Byzantine agreement
    • Y. Lindell, A. Lysyanskaya and T. Rabin. On the Composition of Authenticated Byzantine Agreement. In Proc. 34th STOC, pages 514-523, 2002.
    • (2002) Proc. 34th STOC , pp. 514-523
    • Lindell, Y.1    Lysyanskaya, A.2    Rabin, T.3
  • 33
    • 35048903637 scopus 로고    scopus 로고
    • Lower bounds for concurrent self composition
    • (LNCS 2951), Springer-Verlag, Berlin
    • Y. Lindell. Lower Bounds for Concurrent Self Composition. In Proceedings of the 1st Theory of Cryptography Conference (TCC) (LNCS 2951), pages 203-222, Springer-Verlag, Berlin, 2004.
    • (2004) Proceedings of the 1st Theory of Cryptography Conference (TCC) , pp. 203-222
    • Lindell, Y.1
  • 34
    • 84974655726 scopus 로고
    • Secure computation
    • Unpublished manuscript, 1992. Preliminary version (LNCS 576), Springer-Verlag, Berlin
    • S. Micali and P. Rogaway. Secure Computation. Unpublished manuscript, 1992. Preliminary version in CRYPTO '91 (LNCS 576), pages 392-404, Springer-Verlag, Berlin, 1991.
    • (1991) CRYPTO '91 , pp. 392-404
    • Micali, S.1    Rogaway, P.2
  • 35
    • 84976810569 scopus 로고
    • Reaching Agreement in the Presence of Faults
    • M. Pease, R. Shostak and L. Lamport. Reaching Agreement in the Presence of Faults. Journal of the ACM, 27(2):228-234, 1980.
    • (1980) Journal of the ACM , vol.27 , Issue.2 , pp. 228-234
    • Pease, M.1    Shostak, R.2    Lamport, L.3
  • 36
    • 0003445668 scopus 로고    scopus 로고
    • Information-theoretic pseudosignatures and Byzantine agreement for t >= n/3
    • (#90830), IBM Research
    • B. Pfitzmann and M. Waidner. Information-Theoretic Pseudosignatures and Byzantine Agreement for t >= n/3. Technical Report RZ 2882 (#90830), IBM Research, 1996.
    • (1996) Technical Report , vol.RZ 2882
    • Pfitzmann, B.1    Waidner, M.2
  • 37
    • 0024859552 scopus 로고
    • Verifiable secret sharing and multiparty protocols with honest majority
    • T. Rabin and M. Ben-Or. Verifiable Secret Sharing and Multiparty Protocols with Honest Majority. In Proc. 21st STOC, pages 73-85, 1989.
    • (1989) Proc. 21st STOC , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 38
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • A. Yao. How to Generate and Exchange Secrets. In Proc. 27th FOCS, pages 162-167, 1986.
    • (1986) Proc. 27th FOCS , pp. 162-167
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.