메뉴 건너뛰기




Volumn 3876 LNCS, Issue , 2006, Pages 305-328

Efficient multi-party computation with dispute control

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION COMPLEXITY; DISPUTE CONTROLS; MULTI-PARTY COMPUTATION (MPC); PLAYER-ELIMINATION FRAMEWORKS;

EID: 33745570603     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11681878_16     Document Type: Conference Paper
Times cited : (68)

References (19)
  • 1
    • 84933507780 scopus 로고
    • Efficient multiparty protocols using circuit randomization
    • [Bea91a] LNCS 576
    • [Bea91a] D. Beaver. Efficient multiparty protocols using circuit randomization. In CRYPTO '91, LNCS 576, pp. 420-432, 1991.
    • (1991) CRYPTO '91 , pp. 420-432
    • Beaver, D.1
  • 2
    • 33746365751 scopus 로고
    • Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
    • [Bea91b]
    • [Bea91b] D. Beaver. Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. Journal of Cryptology, pp. 75-122, 1991.
    • (1991) Journal of Cryptology , pp. 75-122
    • Beaver, D.1
  • 3
    • 0003661492 scopus 로고
    • Bit optimal distributed consensus
    • [BGP92] Preliminary version in Proc. 21st STOC, 1989.
    • [BGP92] P. Berman, J. A. Garay, and K. J. Perry. Bit optimal distributed consensus. Computer Science Research, pp. 313-322, 1992. Preliminary version in Proc. 21st STOC, 1989.
    • (1992) Computer Science Research , pp. 313-322
    • Berman, P.1    Garay, J.A.2    Perry, K.J.3
  • 4
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computation
    • [BGW88]
    • [BGW88] M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proc. 20th STOC, pp. 1-10, 1988.
    • (1988) Proc. 20th STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 5
    • 84898947315 scopus 로고
    • Multiparty unconditionally secure protocols
    • [CCD88]
    • [CCD88] D. Chaum, C. Crépeau, and I. Damgård. Multiparty unconditionally secure protocols (extended abstract). In Proc. 20th STOC, pp. 11-19, 1988.
    • (1988) Proc. 20th STOC , pp. 11-19
    • Chaum, D.1    Crépeau, C.2    Damgård, I.3
  • 6
    • 84957717648 scopus 로고    scopus 로고
    • Efficient multiparty computations secure against an adaptive adversary
    • +99] LNCS 1592
    • +99] R. Cramer, I. Damgård, S. Dziembowski, M. Hirt, and T. Rabin. Efficient multiparty computations secure against an adaptive adversary. In EUROCRYPT '99, LNCS 1592, pp. 311-326, 1999.
    • (1999) EUROCRYPT '99 , pp. 311-326
    • Cramer, R.1    Damgård, I.2    Dziembowski, S.3    Hirt, M.4    Rabin, T.5
  • 7
    • 84864708144 scopus 로고
    • Multiparty computations ensuring privacy of each party's input and correctness of the result
    • [CDG87] LNCS 293
    • [CDG87] D. Chaum, I. Damgård, and J. van de Graaf. Multiparty computations ensuring privacy of each party's input and correctness of the result. In CRYPTO '87, LNCS 293, pp. 87-119, 1987.
    • (1987) CRYPTO '87 , pp. 87-119
    • Chaum, D.1    Damgård, I.2    Van De Graaf, J.3
  • 8
    • 0018456171 scopus 로고
    • Universal classes of hash functions
    • [CW79] Preliminary version in Proc. 9st STOC, 1977.
    • [CW79] L. Carter and M. N. Wegman. Universal classes of hash functions. Journal of Computer and System Sciences, 18(4):143-154, 1979. Preliminary version in Proc. 9st STOC, 1977.
    • (1979) Journal of Computer and System Sciences , vol.18 , Issue.4 , pp. 143-154
    • Carter, L.1    Wegman, M.N.2
  • 9
    • 0026839969 scopus 로고
    • Modular construction of a Byzantine agreement protocol with optimal message bit complexity
    • [CW92] Preliminary version in Proc. 8th PODC, 1989.
    • [CW92] B. A. Coan and J. L. Welch. Modular construction of a Byzantine agreement protocol with optimal message bit complexity. Information and Computation, 97(1):61-85, 1992. Preliminary version in Proc. 8th PODC, 1989.
    • (1992) Information and Computation , vol.97 , Issue.1 , pp. 61-85
    • Coan, B.A.1    Welch, J.L.2
  • 10
    • 85051365925 scopus 로고
    • Polynomial algorithms for multiple processor agreement
    • [DS82]
    • [DS82] D. Dolev and H. R. Strong. Polynomial algorithms for multiple processor agreement. In Proc. 14th STOC, pp. 401-407, 1982.
    • (1982) Proc. 14th STOC , pp. 401-407
    • Dolev, D.1    Strong, H.R.2
  • 11
    • 84976655650 scopus 로고
    • Cryptographic computation: Secure fault-tolerant protocols and the public-key model
    • [GHY87] LNCS 293
    • [GHY87] Z. Galil, S. Haber, and M. Yung. Cryptographic computation: Secure fault-tolerant protocols and the public-key model. In CRYPTO '87, LNCS 293, pp. 135-155, 1987.
    • (1987) CRYPTO '87 , pp. 135-155
    • Galil, Z.1    Haber, S.2    Yung, M.3
  • 12
    • 0023545076 scopus 로고
    • How to play any mental game - A completeness theorem for protocols with honest majority
    • [GMW87]
    • [GMW87] O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game - a completeness theorem for protocols with honest majority. In Proc. 19th STOC, pp. 218-229, 1987.
    • (1987) Proc. 19th STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 13
    • 84880854377 scopus 로고    scopus 로고
    • Robustness for free in unconditional multi-party computation
    • [HM01] LNCS 2139
    • [HM01] M. Hirt and U. Maurer. Robustness for free in unconditional multi-party computation. In CRYPTO '01, LNCS 2139, pp. 101-118, 2001.
    • (2001) CRYPTO '01 , pp. 101-118
    • Hirt, M.1    Maurer, U.2
  • 14
    • 35248861868 scopus 로고    scopus 로고
    • Efficient secure multi-party computation
    • [HMP00] LNCS 1976
    • [HMP00] M. Hirt, U. Maurer, and B. Przydatek. Efficient secure multi-party computation. In ASIACRYPT '00, LNCS 1976, pp. 143-161, 2000.
    • (2000) ASIACRYPT '00 , pp. 143-161
    • Hirt, M.1    Maurer, U.2    Przydatek, B.3
  • 15
    • 84976810569 scopus 로고
    • Reaching agreement in the presence of faults
    • [PSL80] Apr.
    • [PSL80] M. Pease, R. Shostak, and L. Lamport. Reaching agreement in the presence of faults. Journal of the ACM, 27(2):228-234, Apr. 1980.
    • (1980) Journal of the ACM , vol.27 , Issue.2 , pp. 228-234
    • Pease, M.1    Shostak, R.2    Lamport, L.3
  • 16
    • 85008202321 scopus 로고
    • Unconditional Byzantine agreement for any number of faulty processors
    • [PW92] LNCS 577
    • [PW92] B. Pfitzmann and M. Waidner. Unconditional Byzantine agreement for any number of faulty processors. In Proc. 9th STAGS, LNCS 577, 1992.
    • (1992) Proc. 9th STAGS
    • Pfitzmann, B.1    Waidner, M.2
  • 17
    • 0024859552 scopus 로고
    • Verifiable secret sharing and multiparty protocols with honest majority
    • [RB89]
    • [RB89] T. Rabin and M. Ben-Or. Verifiable secret sharing and multiparty protocols with honest majority. In Proc. 21st STOC, pp. 73-85, 1989.
    • (1989) Proc. 21st STOC , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 18
    • 0018545449 scopus 로고
    • How to share a secret
    • [Sha79]
    • [Sha79] A. Shamir. How to share a secret. Communications of the ACM, 22:612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 19
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • [Yao82]
    • [Yao82] A. C. Yao. Protocols for secure computations. In Proc. 23rd FOCS, pp. 160-164, 1982.
    • (1982) Proc. 23rd FOCS , pp. 160-164
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.