메뉴 건너뛰기




Volumn 15, Issue 3, 2004, Pages 421-427

Protocol of comparing information without leaking

Author keywords

universal hash function; hiding assumption; Computationally indistinguishable; Homomorphic encryption; Public key cryptosystem; Secure multi party computation

Indexed keywords

COMPUTER NETWORKS; FORMAL LOGIC; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; THEOREM PROVING;

EID: 2942748384     PISSN: 10009825     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (41)

References (12)
  • 1
    • 0003839182 scopus 로고    scopus 로고
    • Secure multi-party computation, manuscript version 1.3
    • Goldreich O. Secure multi-party computation, manuscript version 1.3. 2002. http://theory.lcs.mit.edu/-oded
    • (2002)
    • Goldreich, O.1
  • 4
    • 0033280866 scopus 로고    scopus 로고
    • Efficient private bidding and auctions with an oblivious third party
    • ACM Conf. on Computer and Communications Security, (ed.), Assn for Computing Machinery
    • Cachin C. Efficient private bidding and auctions with an oblivious third party. In: ACM Conf. on Computer and Communications Security, ed. Proc. of the 6th ACM Conf. on Computer and Communications Security. Assn for Computing Machinery, 1999. 120-127.
    • (1999) Proc. of the 6th ACM Conf. on Computer and Communications Security , pp. 120-127
    • Cachin, C.1
  • 6
    • 0003851399 scopus 로고    scopus 로고
    • Applied cryptography: Protocols, algorithms, and source code in C
    • 2nd ed., John Wiley and Sons, Inc.
    • Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code in C. 2nd ed., John Wiley and Sons, Inc., 1996.
    • (1996)
    • Schneier, B.1
  • 7
    • 1642602228 scopus 로고    scopus 로고
    • Computationally private information retrieval with polylogarithmic communication
    • Slern J. (ed.), Lecture Notes in Computer Science, Springer-Verlag
    • Cachin C, Micali S, Stadler M. Computationally private information retrieval with polylogarithmic communication. In: Slern J, ed. Proc. of the Advances in Cryptology-Eurocrypt'99. Lecture Notes in Computer Science, Vol.1592, Springer-Verlag, 1999. 402-414.
    • (1999) Proc. of the Advances in Cryptology-Eurocrypt'99 , vol.1592 , pp. 402-414
    • Cachin, C.1    Micali, S.2    Stadler, M.3
  • 8
    • 0032218237 scopus 로고    scopus 로고
    • A new public-key cryptosystem based on higher residues
    • Association for Computing Machinery, (ed.), San Francisco: ACM
    • Naccache D, Stern J. A new public-key cryptosystem based on higher residues. In: Association for Computing Machinery, ed. Proc. of the 5th ACM Conf. on Computer and Communications Security. San Francisco: ACM, 1998. 59-66.
    • (1998) Proc. of the 5th ACM Conf. on Computer and Communications Security , pp. 59-66
    • Naccache, D.1    Stern, J.2
  • 9
    • 84956852274 scopus 로고    scopus 로고
    • A new public key cryptosystem as secure as factoring
    • Nyberg K. (ed.), Lecture Notes in Computer Science, Springer-Verlag
    • Okamoto T, Uchiyama S. A new public key cryptosystem as secure as factoring. In: Nyberg K, ed. Proc. of the Advances in Cryptology-Eurocrypt'98. Lecture Notes in Computer Science, Vol 1403, Springer-Verlag, 1998. 308-318.
    • (1998) Proc. of the Advances in Cryptology-Eurocrypt'98 , vol.1403 , pp. 308-318
    • Okamoto, T.1    Uchiyama, S.2
  • 10
    • 84942550998 scopus 로고    scopus 로고
    • Public-Key cryptosystem based on composite degree residuosity classes
    • Lecture Notes in Computer Science, Springer-Verlag
    • Paillier P. Public-Key cryptosystem based on composite degree residuosity classes. In: Proc. of the Advances in Cryptology-Euroctypt'99. Lecture Notes in Computer Science, Vol 1592, Springer-Verlag, 1999. 223-238.
    • (1999) Proc. of the Advances in Cryptology-Euroctypt'99 , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 11
    • 0024867751 scopus 로고
    • Universal one-way hash functions and their cryptographic applications
    • Association for Computing Machinery, (ed.), Seattle: ACM
    • Naor M, Yung M. Universal one-way hash functions and their cryptographic applications. In: Association for Computing Machinery, ed. Proc. of the 21st Annual ACM Symp. on Theory of Computing (STOC). Seattle: ACM, 1989. 33-43.
    • (1989) Proc. of the 21st Annual ACM Symp. on Theory of Computing (STOC) , pp. 33-43
    • Naor, M.1    Yung, M.2
  • 12
    • 2942747407 scopus 로고    scopus 로고
    • A note on negligible functions
    • Bellare M. A note on negligible functions. Journal of Cryptology, 2002, 15(4): 271-284.
    • (2002) Journal of Cryptology , vol.15 , Issue.4 , pp. 271-284
    • Bellare, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.