메뉴 건너뛰기




Volumn 3027, Issue , 2004, Pages 439-455

On the hardness of information-theoretic multiparty computation

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL COMPLEXITY; CRYPTOGRAPHY; DECODING; INFORMATION RETRIEVAL;

EID: 33748114725     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24676-3_26     Document Type: Article
Times cited : (35)

References (29)
  • 1
    • 84951063457 scopus 로고    scopus 로고
    • Upper bound on the communication complexity of private information retrieval
    • A. Ambainis. Upper bound on the communication complexity of private information retrieval. In Proc. of 24th ICALP, pages 401-407, 1997.
    • (1997) Proc. of 24th ICALP , pp. 401-407
    • Ambainis, A.1
  • 2
    • 0024940038 scopus 로고
    • Non-cryptographic fault-tolerant computing in a constant number of rounds
    • J. Bar-Ilan and D. Beaver. Non-cryptographic fault-tolerant computing in a constant number of rounds. In Proc. of 8th PODC, pages 201-209, 1989.
    • (1989) Proc. of 8th PODC , pp. 201-209
    • Bar-Ilan, J.1    Beaver, D.2
  • 3
    • 33745511846 scopus 로고
    • Hiding instances in multioracle queries
    • D. Beaver and J. Feigenbaum. Hiding instances in multioracle queries. In Proc. of 6th STACS, pages 37-48, 1990.
    • (1990) Proc. of 6th STACS , pp. 37-48
    • Beaver, D.1    Feigenbaum, J.2
  • 5
    • 0025137207 scopus 로고
    • The round complexity of secure protocols (extended abstract)
    • D. Beaver, S. Micali, and P. Rogaway. The round complexity of secure protocols (extended abstract). In Proc. of 22nd STOC, pages 503-513, 1990.
    • (1990) Proc. of 22nd STOC , pp. 503-513
    • Beaver, D.1    Micali, S.2    Rogaway, P.3
  • 7
    • 84898960610 scopus 로고
    • Completeness theorems for noncryptographic fault-tolerant distributed computation
    • M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for noncryptographic fault-tolerant distributed computation. In Proc. of 20th STOC, pages 1-10, 1988.
    • (1988) Proc. of 20th STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 8
    • 0030645563 scopus 로고    scopus 로고
    • Computationally private information retrieval
    • B. Chor and N. Gilboa. Computationally private information retrieval. In Proc. of the 29th STOC, pages 304-313, 1997.
    • (1997) Proc. of the 29th STOC , pp. 304-313
    • Chor, B.1    Gilboa, N.2
  • 9
    • 1642602228 scopus 로고    scopus 로고
    • Computationally private information retrieval with polylogarithmic communication
    • C. Cachin, S. Micali, and M. Stadier. Computationally private information retrieval with polylogarithmic communication. In Proc. of EUROCRYPT '99, pages 402-414, 1999.
    • (1999) Proc. of EUROCRYPT '99 , pp. 402-414
    • Cachin, C.1    Micali, S.2    Stadier, M.3
  • 10
    • 84898947315 scopus 로고
    • Multiparty unconditionally secure protocols (extended abstract)
    • D. Chaum, C. Crépeau, and I. Damgard. Multiparty unconditionally secure protocols (extended abstract). In Proc. of 20th STOC, pages 11-19, 1988.
    • (1988) Proc. of 20th STOC , pp. 11-19
    • Chaum, D.1    Crépeau, C.2    Damgard, I.3
  • 13
    • 84948975649 scopus 로고    scopus 로고
    • General secure multi-party computation from any linear secret-sharing scheme
    • R. Cramer, I. Damgard, and U. Maurer. General secure multi-party computation from any linear secret-sharing scheme. In Proc. of EUROCRYPT 2000, pages 316-334, 2000.
    • (2000) Proc. of EUROCRYPT 2000 , pp. 316-334
    • Cramer, R.1    Damgard, I.2    Maurer, U.3
  • 15
    • 80051636706 scopus 로고    scopus 로고
    • Single-database private information retrieval implies oblivious transfer
    • G. Di-Crescenzo, T. Malkin, and R. Ostrovsky. Single-database private information retrieval implies oblivious transfer. In Proc. of EUROCRYPT 2000, pages 122-138, 2000.
    • (2000) Proc. of EUROCRYPT 2000 , pp. 122-138
    • Di-Crescenzo, G.1    Malkin, T.2    Ostrovsky, R.3
  • 16
    • 0031624875 scopus 로고    scopus 로고
    • Protecting data privacy in private information retrieval schemes
    • Y. Gertner, Y. Ishai, E. Kushilevitz, and T. Malkin. Protecting data privacy in private information retrieval schemes. In Proc. of 30th STOC, pages 151-160, 1998.
    • (1998) Proc. of 30th STOC , pp. 151-160
    • Gertner, Y.1    Ishai, Y.2    Kushilevitz, E.3    Malkin, T.4
  • 20
    • 33745999816 scopus 로고    scopus 로고
    • Player Simulation and General Adversary Structures in Perfect Multiparty Computation
    • M. Hirt and U. Maurer. Player Simulation and General Adversary Structures in Perfect Multiparty Computation. In Journal of cryptology, 13(1), pages 31-60, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 31-60
    • Hirt, M.1    Maurer, U.2
  • 21
    • 0034507841 scopus 로고    scopus 로고
    • Randomizing Polynomials: A New Representation with Applications to Round-Efficient Secure Computation
    • Y. Ishai and E. Kushilevitz. Randomizing Polynomials: A New Representation with Applications to Round-Efficient Secure Computation. In Proc. of 41st FOCS, pages 294-304, 2000.
    • (2000) Proc. of 41st FOCS , pp. 294-304
    • Ishai, Y.1    Kushilevitz, E.2
  • 22
    • 0033720713 scopus 로고    scopus 로고
    • On the efficiency of local decoding procedures for errorcorrecting codes
    • J. Katz and L. Trevisan. On the efficiency of local decoding procedures for errorcorrecting codes. In Proc. of 32nd STOC, pages 80-86, 2000.
    • (2000) Proc. of 32nd STOC , pp. 80-86
    • Katz, J.1    Trevisan, L.2
  • 23
    • 0038107747 scopus 로고    scopus 로고
    • Exponential lower bound for 2-query locally decodable codes via a quantum argument
    • I. Kerenidis and R. de Wolf. Exponential lower bound for 2-query locally decodable codes via a quantum argument. In Proc. of 35th STOC, pages 106-115, 2003.
    • (2003) Proc. of 35th STOC , pp. 106-115
    • Kerenidis, I.1    De Wolf, R.2
  • 24
    • 0001959541 scopus 로고    scopus 로고
    • Replication is not needed: Single database, computationally-private information retrieval
    • E. Kushilevitz and R. Ostrovsky. Replication is not needed: Single database, computationally-private information retrieval. In Proc. of 38th FOCS, pages 364373, 1997.
    • (1997) Proc. of 38th FOCS , pp. 364373
    • Kushilevitz, E.1    Ostrovsky, R.2
  • 25
    • 0003625461 scopus 로고    scopus 로고
    • Master's thesis, Technion Israel Institute of Technology, Haifa
    • E. Mann. Private access to distributed information. Master's thesis, Technion Israel Institute of Technology, Haifa, 1998.
    • (1998) Private Access to Distributed Information.
    • Mann, E.1
  • 26
    • 0034819509 scopus 로고    scopus 로고
    • Communication Preserving Protocols for Secure Function Evaluation
    • M. Naor and K. Nissim. Communication Preserving Protocols for Secure Function Evaluation. In Proc. of 33rd STOC, pages 590-599, 2001.
    • (2001) Proc. of 33rd STOC , pp. 590-599
    • Naor, M.1    Nissim, K.2
  • 27
    • 0032669864 scopus 로고    scopus 로고
    • Oblivious transfer and polynomial evaluation
    • M. Naor and B. Pinkas. Oblivious transfer and polynomial evaluation. Proc. 31st STOC, pages 245-254, 1999.
    • (1999) Proc. 31st STOC , pp. 245-254
    • Naor, M.1    Pinkas, B.2
  • 28
  • 29
    • 84959056761 scopus 로고    scopus 로고
    • Optimal Lower Bounds for 2-Query Locally Decodable Linear Codes
    • K. Obata. Optimal Lower Bounds for 2-Query Locally Decodable Linear Codes. In Proc. of 6th RANDOM, pages 39-50, 2002.
    • (2002) Proc. of 6th RANDOM , pp. 39-50
    • Obata, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.