메뉴 건너뛰기




Volumn 1716, Issue , 1999, Pages 232-246

General adversaries in unconditional multi-party computation

Author keywords

General adversaries; Mixed model; Multi party computation; Unconditional security

Indexed keywords

POLYNOMIALS; SECURITY OF DATA;

EID: 33746018016     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-48000-6_19     Document Type: Conference Paper
Times cited : (35)

References (21)
  • 1
    • 33746365751 scopus 로고
    • Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
    • D. Beaver. Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. Journal of Cryptology, pp. 75–122, 1991.
    • (1991) Journal of Cryptology , pp. 75-122
    • Beaver, D.1
  • 2
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computation
    • M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proc. 20th ACM Symposium on the Theory of Computing (STOC), pp. 1–10, 1988.
    • (1988) , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 3
    • 85027202957 scopus 로고
    • Generalized secret sharing and monotone functions. In Advances in Cryptology — CRYPTO’88
    • J. C. Benaloh and J. Leichter. Generalized secret sharing and monotone functions. In Advances in Cryptology — CRYPTO’88, volume 403 of Lecture Notes in Computer Science. Springer-Verlag, 1988.
    • (1988) Lecture Notes in Computer Science , vol.403
    • Benaloh, J.C.1    Leichter, J.2
  • 7
    • 84956857740 scopus 로고    scopus 로고
    • General secure multi-party computation from any linear secret sharing scheme
    • R. Cramer, I. Damgárd, and U. Maurer. General secure multi-party computation from any linear secret sharing scheme. Manuscript, 1999.
    • (1999) Manuscript
    • Cramer, R.1    Damgárd, I.2    Maurer, U.3
  • 8
    • 85032861451 scopus 로고
    • The spymasters double-agent problem. In Advances in Cryp-tology — CRYPTO’89
    • D. Chaum. The spymasters double-agent problem. In Advances in Cryp-tology — CRYPTO’89, volume 435 of Lecture Notes in Computer Science, pp. 591–602. Springer-Verlag, 1989.
    • (1989) Lecture Notes in Computer Science , vol.435 , pp. 591-602
    • Chaum, D.1
  • 11
    • 44449153600 scopus 로고    scopus 로고
    • Trading correctness for privacy in unconditional multi-party computation. In Advances in Cryptology — CRYPTO’98, volume 1462 of
    • M. Fitzi, M. Hirt, and U. Maurer. Trading correctness for privacy in unconditional multi-party computation. In Advances in Cryptology — CRYPTO’98, volume 1462 of Lecture Notes in Computer Science, 1998.
    • (1998) Lecture Notes in Computer Science
    • Fitzi, M.1    Hirt, M.2    Maurer, U.3
  • 12
    • 84947907604 scopus 로고    scopus 로고
    • Efficient Byzantine agreement secure against general adversaries. In Distributed Computing — DISC’98, volume 1499 of
    • M. Fitzi and U. Maurer. Efficient Byzantine agreement secure against general adversaries. In Distributed Computing — DISC’98, volume 1499 of Lecture Notes in Computer Science, Sept. 1998.
    • (1998) Lecture Notes in Computer Science
    • Fitzi, M.1    Maurer, U.2
  • 13
    • 84976655650 scopus 로고
    • Secure fault-tolerant protocols and the public-key model. In Advances in Cryptology — CRYPTO’87
    • Z. Galil, S. Haber, and M. Yung. Cryptographic computation: Secure fault-tolerant protocols and the public-key model. In Advances in Cryptology — CRYPTO’87, volume 293 of Lecture Notes in Computer Science, pp. 135– 155. Springer-Verlag, 1987.
    • (1987) Lecture Notes in Computer Science , vol.293
    • Galil, Z.1    Haber, S.2    Yung, M.3
  • 14
    • 0023545076 scopus 로고
    • How to play any mental game — a completeness theorem for protocols with honest majority
    • O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game — a completeness theorem for protocols with honest majority. In Proc. 19th ACM Symposium on the Theory of Computing (STOC), pp. 218–229, 1987.
    • (1987) Proc. 19th acm symposium on the theory , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 15
    • 0030693496 scopus 로고    scopus 로고
    • Complete characterization of adversaries tolerable in secure multi-party computation
    • M. Hirt and U. Maurer. Complete characterization of adversaries tolerable in secure multi-party computation. In Proc. 16th ACM Symposium on Principles of Distributed Computing (PODC), pp. 25–34, Aug. 1997.
    • (1997) Proc. 16th acm symposium on principles , pp. 25-34
    • Hirt, M.1    Maurer, U.2
  • 16
    • 0023543848 scopus 로고
    • Secret sharing scheme realizing general access structure
    • M. Ito, A. Saito, and T. Nishizeki. Secret sharing scheme realizing general access structure. In Proceedings IEEE Globecom’87, pp. 99–102. IEEE, 1987.
    • (1987) Proceedings IEEE Globecom’87 , pp. 99-102
    • Ito, M.1    Saito, A.2    Nishizeki, T.3
  • 18
    • 84956856888 scopus 로고
    • The information theoretic case. Manuscript, 1998. Former version: Secure computation, In Advances in Cryptology — CRYPTO’91, volume 576 of Lecture Note in Computer Science, pp. 392–404
    • S. Micali and P. Rogaway. Secure computation: The information theoretic case. Manuscript, 1998. Former version: Secure computation, In Advances in Cryptology — CRYPTO’91, volume 576 of Lecture Note in Computer Science, pp. 392–404, Springer-Verlag, 1991. 237, 238
    • (1991) Springer-Verlag , vol.237 , pp. 238
    • Micali, S.1    Rogaway, P.2
  • 20
    • 85086950736 scopus 로고    scopus 로고
    • Multiparty computation unconditionally secure against Q
    • 2 adversary structures. Manuscript, July 1998. 235, 244
    • (1998) Manuscript , vol.235 , pp. 244
    • Smith, A.1    Stiglic, A.2
  • 21
    • 0020312165 scopus 로고
    • Protocols for secure computations. In Proc. 23rd IEEE Sympo-sium on the Foundations of Computer Science (FOCS), pp. 160–164
    • A. C. Yao. Protocols for secure computations. In Proc. 23rd IEEE Sympo- sium on the Foundations of Computer Science (FOCS), pp. 160–164. IEEE, 1982. 233
    • (1982) IEEE , pp. 233
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.