메뉴 건너뛰기




Volumn 3494, Issue , 2005, Pages 322-340

Cryptographic asynchronous multi-party computation with optimal resilience

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION CHANNELS (INFORMATION THEORY); COMPUTATIONAL COMPLEXITY; COMPUTATIONAL METHODS; MATHEMATICAL MODELS; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 24944494113     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11426639_19     Document Type: Conference Paper
Times cited : (25)

References (23)
  • 2
    • 0003327509 scopus 로고
    • [Bec54]. New York: Grove Press
    • [Bec54] Samuel Beckett. Waiting for Godot. New York: Grove Press, 1954.
    • (1954) Waiting for Godot
    • Beckett, S.1
  • 3
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computation
    • [BGW88]
    • [BGW88] Michael Ben-Or, Shafi Goldwasser, and Avi Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proc. 20th ACM STOC, pages 1-10, 1988.
    • (1988) Proc. 20th ACM STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 4
    • 85008184918 scopus 로고
    • Asynchronous secure computations with optimal resilience
    • [BKR94]
    • [BKR94] Michael Ben-Or, Boaz Kelmer, and Tal Rabin. Asynchronous secure computations with optimal resilience. In Proc. 13th ACM PODC, pages 183-192, 1994.
    • (1994) Proc. 13th ACM PODC , pp. 183-192
    • Ben-Or, M.1    Kelmer, B.2    Rabin, T.3
  • 6
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • [Can01]
    • [Can01] Ran Canetti. Universally composable security: A new paradigm for cryptographic protocols. In Proc. 42nd IEEE FOCS, pages 136-145, 2001.
    • (2001) Proc. 42nd IEEE FOCS , pp. 136-145
    • Canetti, R.1
  • 7
    • 84898947315 scopus 로고
    • Multiparty unconditionally secure protocols
    • [CCD88]
    • [CCD88] David Chaum, Claude Crépeau, and Ivan Damgård. Multiparty unconditionally secure protocols (extended abstract). In Proc. 20th ACM STOC, pages 11-19, 1988.
    • (1988) Proc. 20th ACM STOC , pp. 11-19
    • Chaum, D.1    Crépeau, C.2    Damgård, I.3
  • 8
    • 84945124606 scopus 로고    scopus 로고
    • Multiparty computation from threshold homomorphic encryption
    • [CDN01]
    • [CDN01] Ronald Cramer, Ivan Damgård, and Jesper B. Nielsen. Multiparty computation from threshold homomorphic encryption. In Proc. EUROCRYPT '01, pages 280-300, 2001.
    • (2001) Proc. EUROCRYPT '01 , pp. 280-300
    • Cramer, R.1    Damgård, I.2    Nielsen, J.B.3
  • 9
    • 0034500567 scopus 로고    scopus 로고
    • Random oracles in Constantinopole: Practical asynchronous Byzantine agreement using cryptography
    • [CKS00]
    • [CKS00] Christian Cachin, Klaus Kursawe, and Victor Shoup. Random oracles in Constantinopole: Practical asynchronous Byzantine agreement using cryptography. In Proc. 19th ACM PODC, pages 123-132, 2000.
    • (2000) Proc. 19th ACM PODC , pp. 123-132
    • Cachin, C.1    Kursawe, K.2    Shoup, V.3
  • 10
    • 0002908662 scopus 로고    scopus 로고
    • A generalisation, a simplification and some applications of Paillier's probabilistic public-key system
    • [DJ01]
    • [DJ01] Ivan Damgård and Mads Jurik. A generalisation, a simplification and some applications of Paillier's probabilistic public-key system. In Proc. 4th PKC, pages 110-136, 2001.
    • (2001) Proc. 4th PKC , pp. 110-136
    • Damgård, I.1    Jurik, M.2
  • 11
    • 0002992068 scopus 로고    scopus 로고
    • Joint encryption and message-efficient secure computation
    • [FH96]
    • [FH96] Matt Franklin and Stuart Haber. Joint encryption and message-efficient secure computation. Journal of Cryptology, 9(4):217-232, 1996.
    • (1996) Journal of Cryptology , vol.9 , Issue.4 , pp. 217-232
    • Franklin, M.1    Haber, S.2
  • 13
    • 84947284060 scopus 로고    scopus 로고
    • Secure computation without agreement
    • [GL02]
    • [GL02] S. Goldwasser and Y. Lindell. Secure computation without agreement. In DISC '02, pages 17-32, 2002.
    • (2002) DISC '02 , pp. 17-32
    • Goldwasser, S.1    Lindell, Y.2
  • 14
    • 0023545076 scopus 로고
    • How to play any mental game - A completeness theorem for protocols with honest majority
    • [GMW87]
    • [GMW87] Oded Goldreich, Silvio Micali, and Avi Wigderson. How to play any mental game - a completeness theorem for protocols with honest majority. In Proc. 19th ACM STOC, pages 218-229, 1987.
    • (1987) Proc. 19th ACM STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 15
    • 24944564422 scopus 로고    scopus 로고
    • Cryptographic asynchronous multi-party computation with optimal resilience, 2004
    • [HNP04], eprint.iacr.org, report no. 2004/368
    • [HNP04] Martin Hirt, Jesper Buus Nielsen, and Bartosz Przydatek. Cryptographic asynchronous multi-party computation with optimal resilience, 2004. Cryptology ePrint Archive, eprint.iacr.org, report no. 2004/368.
    • Cryptology ePrint Archive
    • Hirt, M.1    Nielsen, J.B.2    Przydatek, B.3
  • 16
    • 84937429269 scopus 로고    scopus 로고
    • A threshold pseudorandom function construction and its applications
    • [Nie02]
    • [Nie02] Jesper B. Nielsen. A threshold pseudorandom function construction and its applications. In Proc. CRYPTO '02, pages 401-416, 2002.
    • (2002) Proc. CRYPTO '02 , pp. 401-416
    • Nielsen, J.B.1
  • 17
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • [Pai99]
    • [Pai99] Pascal Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Proc. EUROCRYPT '99, pages 223-238, 1999.
    • (1999) Proc. EUROCRYPT '99 , pp. 223-238
    • Paillier, P.1
  • 18
    • 84974727234 scopus 로고    scopus 로고
    • Asynchronous unconditionally secure computation: An efficiency improvement
    • [PSR02]
    • [PSR02] B. Prabhu, K. Srinathan, and C. Pandu Rangan. Asynchronous unconditionally secure computation: An efficiency improvement. In Proc. Indocrypt 2002, pages 93-107, 2002.
    • (2002) Proc. Indocrypt 2002 , pp. 93-107
    • Prabhu, B.1    Srinathan, K.2    Rangan, C.P.3
  • 19
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • [RSA78]
    • [RSA78] Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 21(2):120-126, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 20
    • 84948954277 scopus 로고    scopus 로고
    • Practical threshold signatures
    • [Sho00]
    • [Sho00] Victor Shoup. Practical threshold signatures. In Proc. EUROCRYPT '00, pages 207-220, 2000.
    • (2000) Proc. EUROCRYPT '00 , pp. 207-220
    • Shoup, V.1
  • 21
    • 84947784853 scopus 로고    scopus 로고
    • Efficient asynchronous secure multiparty distributed computation
    • [SR00]
    • [SR00] K. Srinathan and C. Pandu Rangan. Efficient asynchronous secure multiparty distributed computation. In Proc. Indocrypt 2000, pages 117-129, 2000.
    • (2000) Proc. Indocrypt 2000 , pp. 117-129
    • Srinathan, K.1    Rangan, C.P.2
  • 22
    • 35048828873 scopus 로고    scopus 로고
    • Practical two-party computation based on the conditional gate
    • [ST04]
    • [ST04] Berry Schoenmakers and Pim Tuyls. Practical two-party computation based on the conditional gate. In Proc. ASIACRYPT '04, pages 119-136, 2004.
    • (2004) Proc. ASIACRYPT '04 , pp. 119-136
    • Schoenmakers, B.1    Tuyls, P.2
  • 23
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • [Yao82]
    • [Yao82] Andrew C. Yao. Protocols for secure computations. In Proc. 23rd IEEE FOCS, pages 160-164, 1982.
    • (1982) Proc. 23rd IEEE FOCS , pp. 160-164
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.