메뉴 건너뛰기




Volumn 3958 LNCS, Issue , 2006, Pages 458-473

Efficiency tradeoffs for malicious two-party computation

Author keywords

Malicious adversary; Secure function evaluation; Secure two party computation; Yao's garbled circuit

Indexed keywords

INFORMATION THEORY; LOGIC DESIGN; MATHEMATICAL MODELS; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY;

EID: 33745843587     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11745853_30     Document Type: Conference Paper
Times cited : (101)

References (18)
  • 2
    • 0038451639 scopus 로고    scopus 로고
    • Priced oblivious transfer: How to sell digital goods
    • [AIR01]
    • [AIR01] W. Aiello, Y. Ishai, and O. Reingold. Priced oblivious transfer: How to sell digital goods. Eurocrypt, 2001.
    • (2001) Eurocrypt
    • Aiello, W.1    Ishai, Y.2    Reingold, O.3
  • 4
    • 85032862578 scopus 로고
    • Controlled gradual disclosure schemes for random bits and their applications
    • [Cle89] Springer-Verlag
    • [Cle89] R. Cleve. Controlled gradual disclosure schemes for random bits and their applications. In CRYPTO '89: Proceedings on Advances in cryptology, pages 573-588. Springer-Verlag, 1989.
    • (1989) CRYPTO '89: Proceedings on Advances in Cryptology , pp. 573-588
    • Cleve, R.1
  • 5
    • 0030150177 scopus 로고    scopus 로고
    • Comparing information without leaking it
    • [FNW96]
    • [FNW96] R. Fagin, M. Naor, and P. Winkler. Comparing information without leaking it. Commun. ACM, 39(5):77-85, 1996.
    • (1996) Commun. ACM , vol.39 , Issue.5 , pp. 77-85
    • Fagin, R.1    Naor, M.2    Winkler, P.3
  • 6
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • [GMR89]
    • [GMR89] S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. SIAM J. Comput., 18(1):186-208, 1989.
    • (1989) SIAM J. Comput. , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 7
    • 0022914590 scopus 로고
    • Proofs that yield nothing but their validity or all languages in np have zero-knowledge proofs
    • [GMW86]
    • [GMW86] O. Goldreich, S. Micali, and A. Wigderson. Proofs that yield nothing but their validity or all languages in np have zero-knowledge proofs. Proceedings of of the 27th FOCS, pages 174-187, 1986.
    • (1986) Proceedings of of the 27th FOCS , pp. 174-187
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 11
    • 0020889143 scopus 로고
    • How to simultaneously exchange a secret bit by flipping a symmetrically-biased coin
    • [lMR83]
    • [lMR83] M. luby, S. Micali, and C. Rackoff. How to simultaneously exchange a secret bit by flipping a symmetrically-biased coin. FOCS, 1983.
    • (1983) FOCS
    • Luby, M.1    Micali, S.2    Rackoff, C.3
  • 12
    • 24744472288 scopus 로고    scopus 로고
    • A proof of yao's protocol for secure two-party computation
    • [LP04]
    • [LP04] Y. Lindell and B. Pinkas. A proof of yao's protocol for secure two-party computation, eprint archive, 2004.
    • (2004) Eprint Archive
    • Lindell, Y.1    Pinkas, B.2
  • 15
  • 17
    • 84941160574 scopus 로고    scopus 로고
    • [Woo06] D. Woodruff, unpublished manuscript, 2006
    • [Woo06] D. Woodruff, unpublished manuscript, 2006.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.