메뉴 건너뛰기




Volumn 33, Issue 5, 2005, Pages 769-773

Efficient solution to Yao's Millionaires' problem

Author keywords

Computational complexity; Millionaires' problem; Oblivious transfer; Secure multi party computation

Indexed keywords

COMPUTATIONAL COMPLEXITY; FUNCTIONS; NETWORK PROTOCOLS; PROBLEM SOLVING; SECURITY OF DATA;

EID: 22844441340     PISSN: 03722112     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (37)

References (13)
  • 4
    • 0003839182 scopus 로고    scopus 로고
    • Secure multi-party computation (working draft)
    • O Goldreich. Secure multi-party computation (working draft)[OL]. http://www.wisdom.weizmann.ac.il/home/oded/public_html/foc.html, 2002.
    • (2002)
    • Goldreich, O.1
  • 6
    • 0242496951 scopus 로고    scopus 로고
    • Secure multi-party computation problems and their applications: A review and open problems
    • Cloudcroft, New Mexico, USA
    • Wenliang Du, Atallah J. Secure multi-party computation problems and their applications: A review and open problems[A]. New Security Paradigms Workshop 2001[C]. Cloudcroft, New Mexico, USA, Sep. 11-13, 2001, 11-20.
    • (2001) New Security Paradigms Workshop 2001 , pp. 11-20
    • Du, W.1    Atallah, J.2
  • 8
    • 33746437508 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Y Lindell, B Pinkas. Privacy preserving data mining[J]. Journal of Cryptology, 2002, 15(3): 177-206.
    • (2002) Journal of Cryptology , vol.15 , Issue.3 , pp. 177-206
    • Lindell, Y.1    Pinkas, B.2
  • 9
    • 0030150177 scopus 로고    scopus 로고
    • Comparing information without leaking it
    • Ronald Fagin, Moni Naor, Peter Einkler. Comparing information without leaking it[J]. Communications of the ACM, 1996, 39(5): 77-85.
    • (1996) Communications of the ACM , vol.39 , Issue.5 , pp. 77-85
    • Fagin, R.1    Naor, M.2    Einkler, P.3
  • 10
    • 0003462641 scopus 로고
    • How to exchange secrets by oblivious transfer
    • Technical Report TR-81, Aiken Computation Laboratory, Harvard Univ
    • M Rabin. How to exchange secrets by oblivious transfer[R]. Technical Report TR-81, Aiken Computation Laboratory, Harvard Univ, 1981.
    • (1981)
    • Rabin, M.1
  • 11
    • 64049119146 scopus 로고    scopus 로고
    • Efficient oblivious transfer protocols
    • New York: ACM Press
    • M Naor, B Pinkas. Efficient oblivious transfer protocols[A]. Proc 12th Ann Symp Discrete Algorithms[C]. New York: ACM Press, 2001. 448-457.
    • (2001) Proc 12th Ann Symp Discrete Algorithms , pp. 448-457
    • Naor, M.1    Pinkas, B.2
  • 12
    • 1342345050 scopus 로고    scopus 로고
    • Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters
    • Wen-Guey Tzeng. Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters[J]. IEEE TRANSACTIONS ON COMPUTERS, 2004, 53(2): 232-240.
    • (2004) IEEE Transactions on Computers , vol.53 , Issue.2 , pp. 232-240
    • Tzeng, W.-G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.