메뉴 건너뛰기




Volumn 3621 LNCS, Issue , 2006, Pages 361-377

Secure computation without authentication

Author keywords

[No Author keywords available]

Indexed keywords

ADVERSARY; AUTHENTICATED-CHANNEL SETTING; SECURE MULTIPARTY COMPUTATION; STRING MODELS;

EID: 33745126318     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (57)

References (25)
  • 1
    • 0035166072 scopus 로고    scopus 로고
    • How to go beyond the black-box simulation barrier
    • B. Barak. How to Go Beyond the Black-box Simulation Barrier. In 42nd FOCS, pages 106-115, 2001.
    • (2001) 42nd FOCS , pp. 106-115
    • Barak, B.1
  • 2
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computations
    • M. Ben-Or, S. Goldwasser and A. Wigderson. Completeness Theorems for Non-cryptographic Fault-Tolerant Distributed Computations. In 20th STOC, pages 1-10, 1988.
    • (1988) 20th STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 3
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • R. Canetti. Security and Composition of Multiparty Cryptographic Protocols. Journal of Cryptology, 13(1):143-202, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 4
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • Full version
    • R. Canetti. Universally Composable Security: A New Paradigm for Cryptographic Protocols. In 42nd FOCS, pages 136-145, 2001. Full version available at http://eprint.iacr.org/2000/067.
    • (2001) 42nd FOCS , pp. 136-145
    • Canetti, R.1
  • 5
    • 84880897758 scopus 로고    scopus 로고
    • Universally composable commitments
    • Springer-Verlag (LNCS 2139)
    • R. Canetti and M. Fischlin. Universally Composable Commitments. In CRYPTO 2001, Springer-Verlag (LNCS 2139), pages 19-40, 2001.
    • (2001) CRYPTO 2001 , pp. 19-40
    • Canetti, R.1    Fischlin, M.2
  • 6
    • 24944566824 scopus 로고    scopus 로고
    • Universally composable password-based key exchange
    • Springer-Verlag (LNCS 3494)
    • R. Canetti, S. Halevi, J. Katz, Y. Lindell and P. MacKenzie. Universally Composable Password-Based Key Exchange. In EUROCRYPT 2005, Springer-Verlag (LNCS 3494), pages 404-421, 2005.
    • (2005) EUROCRYPT 2005 , pp. 404-421
    • Canetti, R.1    Halevi, S.2    Katz, J.3    Lindell, Y.4    MacKenzie, P.5
  • 7
    • 35248854495 scopus 로고    scopus 로고
    • On the limitations of universally composable two-party computation without set-up assumptions
    • Springer-Verlag (LNCS 2656)
    • R. Canetti, E. Kushilevitz and Y. Lindell. On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions. In EUROCRYPT '03, Springer-Verlag (LNCS 2656), pages 68-86, 2003.
    • (2003) EUROCRYPT '03 , pp. 68-86
    • Canetti, R.1    Kushilevitz, E.2    Lindell, Y.3
  • 8
    • 0036038991 scopus 로고    scopus 로고
    • Universally composable two-party and multi-party secure computation
    • R. Canetti, Y. Lindell, R. Ostrovsky and A. Sahai. Universally Composable Two-Party and Multi-Party Secure Computation. In 34th STOC, pp. 494-503, 2002.
    • (2002) 34th STOC , pp. 494-503
    • Canetti, R.1    Lindell, Y.2    Ostrovsky, R.3    Sahai, A.4
  • 9
    • 35248819315 scopus 로고    scopus 로고
    • Universal composition with joint state
    • Springer-Verlag (LNCS 2729)
    • R. Canetti and T. Rabin. Universal Composition with Joint State. In CRYPTO 2003, Springer-Verlag (LNCS 2729), pages 265-281, 2003.
    • (2003) CRYPTO 2003 , pp. 265-281
    • Canetti, R.1    Rabin, T.2
  • 10
    • 84898947315 scopus 로고
    • Multiparty unconditionally secure protocols
    • D. Chaum, C. Crepeau and I. Damgard. Multiparty Unconditionally Secure Protocols. In 20th STOC, pages 11-19, 1988.
    • (1988) 20th STOC , pp. 11-19
    • Chaum, D.1    Crepeau, C.2    Damgard, I.3
  • 12
    • 0001126172 scopus 로고
    • Pricing via processing or combating junk mail
    • Springer-Verlag (LNCS 740)
    • C. Dwork and M. Naor. Pricing via Processing or Combating Junk Mail. In CRYPTO'92, Springer-Verlag (LNCS 740), pages 139-147, 1992.
    • (1992) CRYPTO'92 , pp. 139-147
    • Dwork, C.1    Naor, M.2
  • 13
    • 0036954542 scopus 로고    scopus 로고
    • Detectable byzantine agreement secure against faulty majorities
    • M. Fitzi, D. Gottesman, M. Hirt, T. Holenstein and A. Smith. Detectable Byzantine Agreement Secure Against Faulty Majorities. 21st PODC, pp. 118-126, 2002.
    • (2002) 21st PODC , pp. 118-126
    • Fitzi, M.1    Gottesman, D.2    Hirt, M.3    Holenstein, T.4    Smith, A.5
  • 14
    • 84880888233 scopus 로고    scopus 로고
    • Session-key generation using human passwords only
    • Springer-Verlag (LNCS 2139)
    • O. Goldreich and Y. Lindell. Session-Key Generation Using Human Passwords Only. In CRYPTO 2001, Springer-Verlag (LNCS 2139), pages 408-432, 2001.
    • (2001) CRYPTO 2001 , pp. 408-432
    • Goldreich, O.1    Lindell, Y.2
  • 15
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • S. Goldwasser, S. Micali and R. Rivest. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM J. on Computing, 17(2):281-308, 1988.
    • (1988) SIAM J. on Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 16
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof-systems
    • S. Goldwasser, S. Micali and C. Rackoff. The Knowledge Complexity of Interactive Proof-Systems. SIAM Journal on Computing, 18(1):186-208, 1989.
    • (1989) SIAM Journal on Computing , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 20
    • 0038446804 scopus 로고    scopus 로고
    • Bounded-concurrent secure two-party computation without setup assumptions
    • Y. Lindell. Bounded-Concurrent Secure Two-Party Computation Without Setup Assumptions. In 35th STOC, pages 683-692, 2003.
    • (2003) 35th STOC , pp. 683-692
    • Lindell, Y.1
  • 21
    • 35048903637 scopus 로고    scopus 로고
    • Lower bounds for concurrent self composition
    • Springer-Verlag (LNCS 2951)
    • Y. Lindell. Lower Bounds for Concurrent Self Composition. In 1st TCC, Springer-Verlag (LNCS 2951), pages 203-222, 2004.
    • (2004) 1st TCC , pp. 203-222
    • Lindell, Y.1
  • 22
    • 35048854655 scopus 로고    scopus 로고
    • Simpler session-key generation from short random passwords
    • Springer-Verlag (LNCS 2951)
    • M. Nguyen and S. Vadhan. Simpler Session-Key Generation from Short Random Passwords. In 1st TCC, Springer-Verlag (LNCS 2951), pages 428-445, 2004.
    • (2004) 1st TCC , pp. 428-445
    • Nguyen, M.1    Vadhan, S.2
  • 23
    • 4544250511 scopus 로고    scopus 로고
    • Bounded-concurrent secure multi-party computation with a dishonest majority
    • R. Pass. Bounded-Concurrent Secure Multi-Party Computation with a Dishonest Majority. In 36th STOC, pages 232-241, 2004.
    • (2004) 36th STOC , pp. 232-241
    • Pass, R.1
  • 24
    • 0344118869 scopus 로고    scopus 로고
    • Bounded-concurrent secure two-party computation in a constant number of rounds
    • R. Pass and A. Rosen Bounded-Concurrent Secure Two-Party Computation in a Constant Number of Rounds. In 44th FOCS, pages 404-413, 2003.
    • (2003) 44th FOCS , pp. 404-413
    • Pass, R.1    Rosen, A.2
  • 25
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • A.C. Yao. How to Generate and Exchange Secrets. 27th FOCS, pp. 162-167, 1986.
    • (1986) 27th FOCS , pp. 162-167
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.