메뉴 건너뛰기




Volumn , Issue , 2005, Pages 260-274

Computationally private randomizing polynomials and their applications

Author keywords

[No Author keywords available]

Indexed keywords

GENERAL FUNCTIONS; PSEUDORANDOM GENERATORS (PRO); RANDOMIZED MAPPING; RANDOMIZING POLYNOMIALS;

EID: 27644557351     PISSN: 10930159     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (26)

References (38)
  • 2
    • 0025137207 scopus 로고
    • The round complexity of secure protocols
    • D. Beaver, S. Micali, and P. Rogaway. The round complexity of secure protocols (extended abstract). In Proc. of 22nd STOC, pages 503-513, 1990.
    • (1990) Proc. of 22nd STOC , pp. 503-513
    • Beaver, D.1    Micali, S.2    Rogaway, P.3
  • 3
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computation
    • M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proc. of 20th STOC, pages 1-10, 1988.
    • (1988) Proc. of 20th STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 4
    • 17744380057 scopus 로고
    • Coin flipping by telephone: A protocol for solving impossible problems
    • M. Blum. Coin flipping by telephone: a protocol for solving impossible problems. SIGACT News, 15(1):23-27, 1983.
    • (1983) SIGACT News , vol.15 , Issue.1 , pp. 23-27
    • Blum, M.1
  • 5
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudo-random bits
    • M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. Comput., 13:850-864, 1984.
    • (1984) SIAM J. Comput. , vol.13 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 6
    • 27644435077 scopus 로고    scopus 로고
    • Preliminary version
    • Preliminary version in FOCS 82.
    • FOCS 82
  • 7
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • R. Canetti. Security and composition of multiparty cryptographic protocols. J. Cryptology, 13(1):143-202, 2000.
    • (2000) J. Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 8
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In Proc. 42st FOCS, pages 136-145, 2001.
    • (2001) Proc. 42st FOCS , pp. 136-145
    • Canetti, R.1
  • 9
    • 84898947315 scopus 로고
    • Multiparty unconditionally secure protocols
    • D. Chaum, C. Crépeau, and I. Damgárd. Multiparty unconditionally secure protocols (extended abstract). In Proc. of 20th STOC, pages 11-19, 1988.
    • (1988) Proc. of 20th STOC , pp. 11-19
    • Chaum, D.1    Crépeau, C.2    Damgárd, I.3
  • 14
    • 0024868772 scopus 로고
    • A hard-core predicate for all one-way functions
    • O. Goldreich and L. Levin. A hard-core predicate for all one-way functions. In Proc. 21st STOC, pages 25-32, 1989.
    • (1989) Proc. 21st STOC , pp. 25-32
    • Goldreich, O.1    Levin, L.2
  • 16
    • 0021409284 scopus 로고
    • Probabilistic encryption
    • S. Goldwasser and S. Micali, Probabilistic encryption. JCSS, 28(2):270-299, 1984.
    • (1984) JCSS , vol.28 , Issue.2 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 17
    • 27644435991 scopus 로고    scopus 로고
    • Preliminary version
    • Preliminary version in Proc. STOC 82.
    • Proc. STOC 82
  • 18
    • 0345253860 scopus 로고    scopus 로고
    • A pseudorandom generator from any one-way function
    • J. Håstad, R. Impagliazzo, L. A. Levin, and M. Luby. A pseudorandom generator from any one-way function. SIAM J. Comput., 28(4):1364-1396, 1999.
    • (1999) SIAM J. Comput. , vol.28 , Issue.4 , pp. 1364-1396
    • Håstad, J.1    Impagliazzo, R.2    Levin, L.A.3    Luby, M.4
  • 19
    • 0034507841 scopus 로고    scopus 로고
    • Randomizing polynomials: A new representation with applications to round-efficient secure computation
    • Y. Ishai and E. Kushilevitz. Randomizing polynomials: A new representation with applications to round-efficient secure computation. In Proc. 41st FOCS, pages 294-304, 2000.
    • (2000) Proc. 41st FOCS , pp. 294-304
    • Ishai, Y.1    Kushilevitz, E.2
  • 20
    • 84869164571 scopus 로고    scopus 로고
    • Perfect constant-round secure computation via perfect randomizing polynomials
    • Y. Ishai and E. Kushilevitz. Perfect constant-round secure computation via perfect randomizing polynomials. In Proc. 29th ICALP, pages 244-256, 2002.
    • (2002) Proc. 29th ICALP , pp. 244-256
    • Ishai, Y.1    Kushilevitz, E.2
  • 22
    • 0027627287 scopus 로고
    • Constant depth circuits, fourier transform, and leamability
    • N. Linial, Y. Mansour, and N. Nisan. Constant depth circuits, fourier transform, and leamability. J. ACM, 40(3):607-620, 1993.
    • (1993) J. ACM , vol.40 , Issue.3 , pp. 607-620
    • Linial, N.1    Mansour, Y.2    Nisan, N.3
  • 23
    • 27644593827 scopus 로고
    • Preliminary version
    • Preliminary version in Proc. 30th FOCS, 1989.
    • (1989) Proc. 30th FOCS
  • 24
    • 0001448484 scopus 로고
    • Bit commitment using pseudorandomness
    • M. Naor. Bit commitment using pseudorandomness. J. of Cryptolosy, 4:151-158, 1991.
    • (1991) J. of Cryptolosy , vol.4 , pp. 151-158
    • Naor, M.1
  • 26
    • 0032647187 scopus 로고    scopus 로고
    • Synthesizers and their application to the parallel construction of pseudo-random functions
    • M. Naor and O. Reingold. Synthesizers and their application to the parallel construction of pseudo-random functions. J. of Computer and Systems Sciences, 58(2):336-375, 1999.
    • (1999) J. of Computer and Systems Sciences , vol.582 , pp. 336-375
    • Naor, M.1    Reingold, O.2
  • 27
    • 27644559462 scopus 로고
    • Preliminary version
    • Preliminary version in Proc. 36th FOCS, 1995.
    • (1995) Proc. 36th FOCS
  • 28
    • 4243054954 scopus 로고    scopus 로고
    • Number-theoretic constructions of efficient pseudo-random functions
    • M. Naor and O. Reingold. Number-theoretic constructions of efficient pseudo-random functions. J. ACM. 51(2):231-262, 2004.
    • (2004) J. ACM. , vol.51 , Issue.2 , pp. 231-262
    • Naor, M.1    Reingold, O.2
  • 29
    • 27644549920 scopus 로고    scopus 로고
    • Preliminary version
    • Preliminary version in Proc. 38th FOCS, 1997.
    • (1997) Proc. 38th FOCS
  • 30
    • 35048815001 scopus 로고    scopus 로고
    • Notions of reducibility between cryptographic primitives
    • TCC '04
    • O. Reingold, L. Trevisan, and S. Vadhan. Notions of reducibility between cryptographic primitives. In TCC '04, volume 2951 of LNCS, pages 1-20, 2004.
    • (2004) LNCS , vol.2951 , pp. 1-20
    • Reingold, O.1    Trevisan, L.2    Vadhan, S.3
  • 32
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon. Communication theory of secrecy systems. Bell System Technical Journal, 28-4:656-715, 1949.
    • (1949) Bell System Technical Journal , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1
  • 33
    • 1842599266 scopus 로고    scopus 로고
    • On garbled circuits and constant round secure function evaluation
    • University of North Texas
    • S. R. Tate and K. Xu. On garbled circuits and constant round secure function evaluation. CoPS Lab Technical Report 2003-02, University of North Texas, 2003.
    • (2003) CoPS Lab Technical Report , vol.2003 , Issue.2
    • Tate, S.R.1    Xu, K.2
  • 37
    • 0020301290 scopus 로고
    • Theory and application of trapdoor functions
    • A. C. Yao. Theory and application of trapdoor functions. In Proc. 23rd FOCS, pages 80-91, 1982.
    • (1982) Proc. 23rd FOCS , pp. 80-91
    • Yao, A.C.1
  • 38
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • A. C. Yao. How to generate and exchange secrets. In Proc. 27th FOCS, pages 162-167, 1986.
    • (1986) Proc. 27th FOCS , pp. 162-167
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.