메뉴 건너뛰기




Volumn 3935 LNCS, Issue , 2006, Pages 32-47

Efficient cryptographic protocol design based on distributed El gamal encryption

Author keywords

[No Author keywords available]

Indexed keywords

BOOLEAN ALGEBRA; COMPUTATION THEORY; COMPUTATIONAL COMPLEXITY; ERRORS; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 33745824910     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11734727_5     Document Type: Conference Paper
Times cited : (40)

References (42)
  • 1
    • 84937431456 scopus 로고    scopus 로고
    • Efficient computation modulo a shared secret with application to the generation of shared safe-prime products
    • [ACS02]. Proc. of 22th CRYPTO Conference, Springer
    • [ACS02] J. Algesheimer, J. Camenisch, and V. Shoup. Efficient computation modulo a shared secret with application to the generation of shared safe-prime products. In Proc. of 22th CRYPTO Conference, volume 2442 of LNCS, pages 417-432. Springer, 2002.
    • (2002) LNCS , vol.2442 , pp. 417-432
    • Algesheimer, J.1    Camenisch, J.2    Shoup, V.3
  • 2
    • 35048875418 scopus 로고    scopus 로고
    • Secure computation of the kth-ranked element
    • [AMP04]. Proc. of 21st Eurocrypt Conference, Springer
    • [AMP04] G. Aggarwal, N. Mishra, and B. Pinkas. Secure computation of the kth-ranked element. In Proc. of 21st Eurocrypt Conference, volume 3027 of LNCS, pages 40-55. Springer, 2004.
    • (2004) LNCS , vol.3027 , pp. 40-55
    • Aggarwal, G.1    Mishra, N.2    Pinkas, B.3
  • 3
    • 84958639277 scopus 로고    scopus 로고
    • Efficient generation of shared RSA keys
    • [BF97]. In Proc. of 17th CRYPTO Conference, Springer
    • [BF97] D. Boneh and M. Franklin. Efficient generation of shared RSA keys. In Proc. of 17th CRYPTO Conference, volume 1294 of LNCS, pages 425-439. Springer, 1997.
    • (1997) LNCS , vol.1294 , pp. 425-439
    • Boneh, D.1    Franklin, M.2
  • 5
    • 24144433396 scopus 로고    scopus 로고
    • Evaluating 2-DNF formulas on cipher-texts
    • [BGN05]. Proc. of 2nd Theory of Cryptography Conference (TCC), Springer
    • [BGN05] D. Boneh, E. Goh, and K. Nissim. Evaluating 2-DNF formulas on cipher-texts. In Proc. of 2nd Theory of Cryptography Conference (TCC), volume 3378 of LNCS, pages 325-341. Springer, 2005.
    • (2005) LNCS , vol.3378 , pp. 325-341
    • Boneh, D.1    Goh, E.2    Nissim, K.3
  • 6
    • 0025137207 scopus 로고
    • The round complexity of secure protocols
    • [BMR90]. ACM Press
    • [BMR90] D. Beaver, S. Micali, and P. Rogaway. The round complexity of secure protocols. In Proc. of 22nd STOC, pages 503-513. ACM Press, 1990.
    • (1990) Proc. of 22nd STOC , pp. 503-513
    • Beaver, D.1    Micali, S.2    Rogaway, P.3
  • 7
    • 0035879575 scopus 로고    scopus 로고
    • A fair and efficient solution to the socialist millionaires' problem
    • [BST01]
    • [BST01] F. Boudot, B. Schoenmakers, and J. Traoré. A fair and efficient solution to the socialist millionaires' problem. Discrete Applied Mathematics, 111(1-2):23-36, 2001.
    • (2001) Discrete Applied Mathematics , vol.111 , Issue.1-2 , pp. 23-36
    • Boudot, F.1    Schoenmakers, B.2    Traoré, J.3
  • 8
    • 84969520105 scopus 로고    scopus 로고
    • Optimistic fair secure computation
    • [CC00]. Proc. of 20th CRYPTO Conference, Springer
    • [CC00] C. Cachin and J. Camenisch. Optimistic fair secure computation. In Proc. of 20th CRYPTO Conference, volume 1880 of LNCS, pages 93-111. Springer, 2000.
    • (2000) LNCS , vol.1880 , pp. 93-111
    • Cachin, C.1    Camenisch, J.2
  • 9
    • 84945124606 scopus 로고    scopus 로고
    • Multiparty computation from threshold homomorphic encryption
    • [CDN01]. Proc. of 18th Eurocrypt Conference, Springer
    • [CDN01] R. Cramer, I. Damgård, and J. B. Nielsen. Multiparty computation from threshold homomorphic encryption. In Proc. of 18th Eurocrypt Conference, volume 2045 of LNCS, pages 280-300. Springer, 2001.
    • (2001) LNCS , vol.2045 , pp. 280-300
    • Cramer, R.1    Damgård, I.2    Nielsen, J.B.3
  • 10
    • 85016672373 scopus 로고
    • Proofs of partial knowledge and simplified design of witness hiding protocols
    • [CDS94]. Proc. of 14th CRYPTO Conference, Springer
    • [CDS94] R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. In Proc. of 14th CRYPTO Conference, volume 893 of LNCS, pages 174-187. Springer, 1994.
    • (1994) LNCS , vol.893 , pp. 174-187
    • Cramer, R.1    Damgård, I.2    Schoenmakers, B.3
  • 11
    • 84957375076 scopus 로고    scopus 로고
    • A secure and optimally efficient multi-authority election scheme
    • [CGS97]. Proc. of 14th Eurocrypt Conference, Springer
    • [CGS97] R. Cramer, R. Gennaro, and B. Schoenmakers. A secure and optimally efficient multi-authority election scheme. In Proc. of 14th Eurocrypt Conference, volume 1233 of LNCS, pages 103-118. Springer, 1997.
    • (1997) LNCS , vol.1233 , pp. 103-118
    • Cramer, R.1    Gennaro, R.2    Schoenmakers, B.3
  • 12
    • 0002187137 scopus 로고
    • Wallet databases with observers
    • [CP92]. Proc. of 12th CRYPTO Conference, Springer
    • [CP92] D. Chaum and T. P. Pedersen. Wallet databases with observers. In Proc. of 12th CRYPTO Conference, volume 740 of LNCS, pages 3.1-3.6. Springer, 1992.
    • (1992) LNCS , vol.740
    • Chaum, D.1    Pedersen, T.P.2
  • 13
    • 84864794192 scopus 로고    scopus 로고
    • On ∑-protocols
    • [Dam02], University of Aarhus, Department for Computer Science
    • [Dam02] I. Damgård. On ∑-protocols. Lecture Notes, University of Aarhus, Department for Computer Science, 2002.
    • (2002) Lecture Notes
    • Damgård, I.1
  • 14
    • 84880875026 scopus 로고    scopus 로고
    • Robust non-interactive zero knowledge
    • [DDO+01]. Proc. of 21th CRYPTO Conference, Springer
    • [DDO+01] A. De Santis, G. Di Crescenzo, R. Ostrovsky, G. Persiano, and A. Sahai. Robust non-interactive zero knowledge. In Proc. of 21th CRYPTO Conference, volume 2139 of LNCS, pages 566-598. Springer, 2001.
    • (2001) LNCS , vol.2139 , pp. 566-598
    • De Santis, A.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4    Sahai, A.5
  • 15
    • 84945127249 scopus 로고    scopus 로고
    • Practical threshold RSA signatures without a trusted dealer
    • [DK01]. Proc. of 18th Eurocrypt Conference, Springer
    • [DK01] I. Damgård and M. Koprowski. Practical threshold RSA signatures without a trusted dealer. In Proc. of 18th Eurocrypt Conference, volume 2045 of LNCS, pages 152-165. Springer, 2001.
    • (2001) LNCS , vol.2045 , pp. 152-165
    • Damgård, I.1    Koprowski, M.2
  • 16
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • [El 85]
    • [El 85] T. El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31:469-472, 1985.
    • (1985) IEEE Transactions on Information Theory , vol.31 , pp. 469-472
    • El Gamal, T.1
  • 17
    • 84937542853 scopus 로고    scopus 로고
    • A cost-effective pay-per-multiplication comparison method for millionaires
    • [Fis01]. Proceedings of the Cryptographers' Track at the 10th RSA Conference
    • [Fis01] M. Fischlin. A cost-effective pay-per-multiplication comparison method for millionaires. In Proceedings of the Cryptographers' Track at the 10th RSA Conference, volume 2020 of LNCS, pages 457-472, 2001.
    • (2001) LNCS , vol.2020 , pp. 457-472
    • Fischlin, M.1
  • 18
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • [FS87]. LNCS, Springer
    • [FS87] A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Proc. of 12th CRYPTO Conference, LNCS, pages 186-194. Springer, 1987.
    • (1987) Proc. of 12th CRYPTO Conference , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 19
    • 84957104180 scopus 로고    scopus 로고
    • Two party RSA key generation
    • [Gil99]. Proc. of 19th CRYPTO Conference, Springer
    • [Gil99] N. Gilboa. Two party RSA key generation. In Proc. of 19th CRYPTO Conference, volume 1666 of LNCS, pages 116-129. Springer, 1999.
    • (1999) LNCS , vol.1666 , pp. 116-129
    • Gilboa, N.1
  • 20
    • 49049089688 scopus 로고    scopus 로고
    • Secure distributed key generation for discrete-log based cryptosystems
    • [GJKR99]. Proc. of 16th Eurocrypt Conference, Springer
    • [GJKR99] R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Secure distributed key generation for discrete-log based cryptosystems. In Proc. of 16th Eurocrypt Conference, volume 1592 of LNCS, pages 295-310. Springer, 1999.
    • (1999) LNCS , vol.1592 , pp. 295-310
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 21
    • 23944448377 scopus 로고    scopus 로고
    • Applications of Pedersen's distributed key generation protocol
    • [GJKR03]. Proc. of Cryptographers' Track at the 12th RSA Conference, Springer
    • [GJKR03] R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Applications of Pedersen's distributed key generation protocol. In Proc. of Cryptographers' Track at the 12th RSA Conference, volume 2612 of LNCS, pages 373-390. Springer, 2003.
    • (2003) LNCS , vol.2612 , pp. 373-390
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 22
    • 0023545076 scopus 로고
    • How to play any mental game or a completeness theorem for protocols with honest majority
    • [GMW87]. ACM Press
    • [GMW87] O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game or a completeness theorem for protocols with honest majority. In Proc. of 19th STOC, pages 218-229. ACM Press, 1987.
    • (1987) Proc. of 19th STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 24
    • 35248822599 scopus 로고    scopus 로고
    • A verifiable secret shuffle of homomorphic encryptions
    • [Gro03]. Proc. of 6th PKC Conference
    • [Gro03] J. Groth. A verifiable secret shuffle of homomorphic encryptions. In Proc. of 6th PKC Conference, volume 2567 of LNCS, pages 145-160, 2003.
    • (2003) LNCS , vol.2567 , pp. 145-160
    • Groth, J.1
  • 26
    • 0034507841 scopus 로고    scopus 로고
    • Randomizing polynomials: A new representation with applications to round-efficient secure computation
    • [IK00]. IEEE Press
    • [IK00] Y. Ishai and E. Kushilevitz. Randomizing polynomials: A new representation with applications to round-efficient secure computation. In Proc. of 41st FOCS Symposium, pages 294-304. IEEE Press, 2000.
    • (2000) Proc. of 41st FOCS Symposium , pp. 294-304
    • Ishai, Y.1    Kushilevitz, E.2
  • 27
    • 84937417083 scopus 로고    scopus 로고
    • Mix and match: Secure function evaluation via ciphertexts
    • [JJ00]. Proc. of 6th Asiacrypt Conference, Springer
    • [JJ00] M. Jakobsson and A. Juels. Mix and match: Secure function evaluation via ciphertexts. In Proc. of 6th Asiacrypt Conference, volume 1976 of LNCS, pages 162-177. Springer, 2000.
    • (2000) LNCS , vol.1976 , pp. 162-177
    • Jakobsson, M.1    Juels, A.2
  • 28
    • 84898989941 scopus 로고
    • Founding cryptography on oblivious transfer
    • [Kil88]. ACM Press
    • [Kil88] J. Kilian. Founding cryptography on oblivious transfer. In Proc. of 20th ACM STOC, pages 20-31. ACM Press, 1988.
    • (1988) Proc. of 20th ACM STOC , pp. 20-31
    • Kilian, J.1
  • 29
    • 84957041593 scopus 로고    scopus 로고
    • Bit-slice auction circuit
    • [KO02]. Proc. of 7th European Symposium on Research in Computer Security (ESORICS), Springer
    • [KO02] K. Kurosawa and W. Ogata. Bit-slice auction circuit. In Proc. of 7th European Symposium on Research in Computer Security (ESORICS), volume 2502 of LNCS, pages 24-38. Springer, 2002.
    • (2002) LNCS , vol.2502 , pp. 24-38
    • Kurosawa, K.1    Ogata, W.2
  • 30
    • 35048833033 scopus 로고    scopus 로고
    • Parallel coin-tossing and constant-round secure two-party computation
    • [Lin01]. Proc. of 21st CRYPTO Conference, Springer
    • [Lin01] Y. Lindell. Parallel coin-tossing and constant-round secure two-party computation. In Proc. of 21st CRYPTO Conference, volume 2139 of LNCS, pages 171-189. Springer, 2001.
    • (2001) LNCS , vol.2139 , pp. 171-189
    • Lindell, Y.1
  • 31
    • 26444581774 scopus 로고    scopus 로고
    • An efficient solution to the millionaires' problem based on homomorphic encryption
    • [LT05]. Proc. of 3rd International Conference on Applied Cryptography and Network Security (ACNS)
    • [LT05] H.-Y. Lin and W.-G. Tzeng. An efficient solution to the Millionaires' Problem based on homomorphic encryption. In Proc. of 3rd International Conference on Applied Cryptography and Network Security (ACNS), volume 3531 of LNCS, pages 456-466, 2005.
    • (2005) LNCS , vol.3531 , pp. 456-466
    • Lin, H.-Y.1    Tzeng, W.-G.2
  • 32
    • 0034819509 scopus 로고    scopus 로고
    • Communication preserving protocols for secure function evaluation
    • [NN01]. ACM Press
    • [NN01] M. Naor and K. Nissim. Communication preserving protocols for secure function evaluation. In Proc. of 33rd STOC, pages 590-599. ACM Press, 2001.
    • (2001) Proc. of 33rd STOC , pp. 590-599
    • Naor, M.1    Nissim, K.2
  • 34
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • [Pai99]. Proc. of 16th Eurocrypt Conference, Springer
    • [Pai99] P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Proc. of 16th Eurocrypt Conference, volume 1592 of LNCS, pages 223-238. Springer, 1999.
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 35
    • 24944554813 scopus 로고    scopus 로고
    • An efficient and verifiable solution to the millionaire problem
    • [PBDL04]. Proc. of 7th International Conference on Information Security and Cryptology (ICISC), Springer
    • [PBDL04] K. Peng, C. Boyd, E. Dawson, and B. Lee. An efficient and verifiable solution to the millionaire problem. In Proc. of 7th International Conference on Information Security and Cryptology (ICISC), volume 3506 of LNCS, pages 51-66. Springer, 2004.
    • (2004) LNCS , vol.3506 , pp. 51-66
    • Peng, K.1    Boyd, C.2    Dawson, E.3    Lee, B.4
  • 36
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • [Ped91]. J. Feigenbaum, editor, Proc. of 11th CRYPTO Conference, Springer
    • [Ped91] T. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In J. Feigenbaum, editor, Proc. of 11th CRYPTO Conference, volume 576 of LNCS, pages 129-140. Springer, 1991.
    • (1991) LNCS , vol.576 , pp. 129-140
    • Pedersen, T.1
  • 37
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • [Sch91]
    • [Sch91] C. P. Schnorr. Efficient signature generation by smart cards. Journal of Cryptology, 4(3):161-174, 1991.
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.P.1
  • 38
    • 0003855464 scopus 로고    scopus 로고
    • [Sch96] John Wiley and Sons, Inc., 2nd edition
    • [Sch96] B. Schneier. Applied Cryptography. John Wiley and Sons, Inc., 2nd edition, 1996.
    • (1996) Applied Cryptography
    • Schneier, B.1
  • 39
    • 35048828873 scopus 로고    scopus 로고
    • Practical two-party computation based on the conditional gate
    • [ST04] LNCS, Springer
    • [ST04] B. Schoenmakers and P. Tuyls. Practical two-party computation based on the conditional gate. In Proc. of 10th Asiacrypt Conference, number 3329 in LNCS, pages 119-136. Springer, 2004.
    • (2004) Proc. of 10th Asiacrypt Conference , vol.3329 , pp. 119-136
    • Schoenmakers, B.1    Tuyls, P.2
  • 40
    • 84958979582 scopus 로고    scopus 로고
    • On the security of ElGamal-based encryption
    • [TY98]. In Proc. of 1st International Workshop on Practice and Theory in Public Key Cryptography (PKC), Springer
    • [TY98] Y. Tsiounis and M. Yung. On the security of ElGamal-based encryption. In Proc. of 1st International Workshop on Practice and Theory in Public Key Cryptography (PKC), volume 1431 of LNCS, pages 117-134. Springer, 1998.
    • (1998) LNCS , vol.1431 , pp. 117-134
    • Tsiounis, Y.1    Yung, M.2
  • 41
    • 0020312165 scopus 로고
    • Protocols for secure computation
    • [Yao82]. IEEE Computer Society Press
    • [Yao82] A. C. Yao. Protocols for secure computation. In Proc. of 23th FOCS Symposium, pages 160-164. IEEE Computer Society Press, 1982.
    • (1982) Proc. of 23th FOCS Symposium , pp. 160-164
    • Yao, A.C.1
  • 42
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • [Yao86]. IEEE Computer Society Press
    • [Yao86] A. C. Yao. How to generate and exchange secrets. In Proc. of 27th FOCS Symposium, pages 162-167. IEEE Computer Society Press, 1986.
    • (1986) Proc. of 27th FOCS Symposium , pp. 162-167
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.