메뉴 건너뛰기




Volumn 13, Issue 1, 2000, Pages 31-60

Player simulation and general adversary structures in perfect multiparty computation

Author keywords

Adversary structures; General adversaries; Information theoretic security; Multiparty computation; Player simulation

Indexed keywords


EID: 33745999816     PISSN: 09332790     EISSN: None     Source Type: Journal    
DOI: 10.1007/S001459910003     Document Type: Article
Times cited : (177)

References (52)
  • 1
    • 78149360960 scopus 로고
    • Logical design with three-input majority gates
    • [AR] Mar.
    • [AR] S. Akers and T. Robbins. Logical design with three-input majority gates. Computer Design, pp. 1227, Mar. 1963.
    • (1963) Computer Design , pp. 1227
    • Akers, S.1    Robbins, T.2
  • 3
    • 38249015281 scopus 로고
    • Shifting gears: Changing algorithms on the fly to expedite Byzantine agreement
    • [BDDS] Apr.
    • [BDDS] A. Bar-Noy, D. Dolev, C. Dwork, and H. R. Strong. Shifting gears: changing algorithms on the fly to expedite Byzantine agreement. Information and Computation, 97(2):205-233, Apr. 1992.
    • (1992) Information and Computation , vol.97 , Issue.2 , pp. 205-233
    • Bar-Noy, A.1    Dolev, D.2    Dwork, C.3    Strong, H.R.4
  • 6
    • 33746365751 scopus 로고
    • Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
    • [Be3]
    • [Be3] D. Beaver. Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. Journal of Cryplology, 4(2): 75-122, 1991
    • (1991) Journal of Cryplology , vol.4 , Issue.2 , pp. 75-122
    • Beaver, D.1
  • 7
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic faulttolerant distributed computation
    • [BGW]
    • [BGW] M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic faulttolerant distributed computation. In Proc. 20th ACM Symposium on the Tlieory of Computing (STOQ.pp. 1-10, 1988.
    • (1988) Proc. , vol.20 , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 11
    • 33746018019 scopus 로고    scopus 로고
    • [Can2] Personal communications
    • [Can2] R. Canetti. Personal communications, 1998.
    • (1998)
    • Canetti, R.1
  • 12
    • 33745999488 scopus 로고    scopus 로고
    • [Can3] Manuscript, June 1998. Former (more general) version: Modular composition of multi-party cryptographic protocols, Nov.
    • [Can3] R. Canetti. Security and composition of multi-party cryptographic protocols. Manuscript, June 1998. Former (more general) version: Modular composition of multi-party cryptographic protocols, Nov. 1997.
    • (1997) Security and Composition of Multi-party Cryptographic Protocols.
    • Canetti, R.1
  • 23
    • 0024860209 scopus 로고
    • A zero-one law for Boolean privacy. in
    • [CK]
    • [CK] B. Chor and E. Kushilevitz. A zero-one law for Boolean privacy. In Proc. 2lst ACM Symposium on the Theory of Computing (STOQ, pp. 62-72, 1989.
    • (1989) Proc. , vol.2 , pp. 62-72
    • Chor, B.1    Kushilevitz, E.2
  • 26
    • 44449153600 scopus 로고    scopus 로고
    • Trading correctness for privacy in unconditional multi-party computation
    • [FHM1] Springer-Verlag, Berlin, Corrected version available on-line.
    • [FHM1] M. Fitzi, M. Hirt, and U. Maurer. Trading correctness for privacy in unconditional multi-party computation. In Advances in Cryptology-CRYPTO '98, volume 1462 of Lecture Notes in Computer Science, pp. 121-136. Springer-Verlag, Berlin, 1998. Corrected version available on-line.
    • (1998) Advances in Cryptology-CRYPTO '98, Volume 1462 of Lecture Notes in Computer Science , vol.1462 , pp. 121-136
    • Fitzi, M.1    Hirt, M.2    Maurer, U.3
  • 31
    • 0031210863 scopus 로고    scopus 로고
    • An optimal probabilistic protocol for synchronous Byzantine agreement
    • [FM2] Aug.
    • [FM2] P. Feldman and S. Micali. An optimal probabilistic protocol for synchronous Byzantine agreement. SIAM Journal on Computing, 26(4):873-933, Aug. 1997.
    • (1997) SIAM Journal on Computing , vol.26 , Issue.4 , pp. 873-933
    • Feldman, P.1    Micali, S.2
  • 33
    • 0001710760 scopus 로고    scopus 로고
    • The design and implementation of a secure auction service
    • [FR] May
    • [FR] M. K. Franklin and M. K. Reiter. The design and implementation of a secure auction service. IEEE Transactions on Sofm-are Engineering, 22(5):302-312, May 1996.
    • (1996) IEEE Transactions on Sofm-are Engineering , vol.22 , Issue.5 , pp. 302-312
    • Franklin, M.K.1    Reiter, M.K.2
  • 35
  • 42
    • 0023543848 scopus 로고
    • Secret sharing scheme realizing general access structure. i
    • [ISN] IEEE, New York
    • [ISN] M. Ito, A. Saito, and T. Nishizeki. Secret sharing scheme realizing general access structure. I Proceedings IEEE Globecom '81, pp. 99-102. IEEE, New York, 1987.
    • (1987) Proceedings IEEE Globecom '81 , pp. 99-102
    • Ito, M.1    Saito, A.2    Nishizeki, T.3
  • 48
    • 84976810569 scopus 로고
    • Reaching agreement in the presence of faults
    • [PSL] Apr.
    • [PSL] M. Pease, R. Shostak, and L. Lamport. Reaching agreement in the presence of faults. Journal of th ACM, 27(2):228-234, Apr. 1980.
    • (1980) Journal of Th ACM , vol.27 , Issue.2 , pp. 228-234
    • Pease, M.1    Shostak, R.2    Lamport, L.3
  • 49
    • 0028542745 scopus 로고
    • Robust sharing of secrets when the dealer is honest or cheating
    • [Rab] Nov.
    • [Rab] T. Rabin. Robust sharing of secrets when the dealer is honest or cheating. Journal of the ACM 41(6):1089-1109, Nov. 1994.
    • (1994) Journal of the ACM , vol.41 , Issue.6 , pp. 1089-1109
    • Rabin, T.1
  • 52
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • [Yao] IEEE, New York
    • [Yao] A. C. Yao. Protocols for secure computations. In Proc. 23rd IEEE Symposium on the Foundation of Computer Science (FOCS), pp. 160-164. IEEE, New York, 1982.
    • (1982) Proc. , vol.23 , pp. 160-164
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.