메뉴 건너뛰기




Volumn , Issue , 2005, Pages 543-552

Collusion-free protocols

Author keywords

Secure Function Evaluation; Steganography

Indexed keywords

COLLUSION-FREE PROTOCOLS; COMPUTATIONAL ASSUMPTIONS; SECURE FUNCTION EVALUATION; STEGANOGRAPHY;

EID: 33748680791     PISSN: 07378017     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1060590.1060671     Document Type: Conference Paper
Times cited : (69)

References (17)
  • 1
    • 30744459451 scopus 로고    scopus 로고
    • Public-key steganography with active attacks
    • M. Backes and C. Cachin. Public-key steganography with active attacks. In TCC '05, 2005.
    • (2005) TCC '05
    • Backes, M.1    Cachin, C.2
  • 2
    • 84898960610 scopus 로고
    • Completeness theorems for fault-tolerant distributed computing
    • M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for fault-tolerant distributed computing. In Proc. of STOC '88, pages 1-10, 1988.
    • (1988) Proc. of STOC '88 , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 4
    • 84957868624 scopus 로고    scopus 로고
    • An information-theoretic model for steganography
    • C. Cachin. An information-theoretic model for steganography. In Proc. of Information Hiding '98, pages 306-318, 1998.
    • (1998) Proc. of Information Hiding '98 , pp. 306-318
    • Cachin, C.1
  • 5
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In Proc. 42nd FOCS, pages 136-145, 2001.
    • (2001) Proc. 42nd FOCS , pp. 136-145
    • Canetti, R.1
  • 7
    • 84898947315 scopus 로고
    • Multi-party unconditionally secure protocols
    • D. Chaum, C. Crépeau, and I. Damgård. Multi-party unconditionally secure protocols. In STOC '88, 1988.
    • (1988) STOC '88
    • Chaum, D.1    Crépeau, C.2    Damgård, I.3
  • 8
    • 84945299487 scopus 로고
    • A secure poker protocol that minimizes the effects of player coalitions
    • Crypto '85, Springer
    • C. Crépeau. A secure poker protocol that minimizes the effects of player coalitions. In Crypto '85, volume 218 of LNCS, pages 73-86. Springer, 1986.
    • (1986) LNCS , vol.218 , pp. 73-86
    • Crépeau, C.1
  • 9
    • 84974597111 scopus 로고    scopus 로고
    • Parallel reducibility for information-theoretically secure computation
    • Y. Dodis and S. Micali. Parallel reducibility for information-theoretically secure computation. In CRYPTO '00, pages 74-92, 2000.
    • (2000) CRYPTO '00 , pp. 74-92
    • Dodis, Y.1    Micali, S.2
  • 10
    • 0003979335 scopus 로고    scopus 로고
    • chapter 7 (General Cryptographic Protocols). Cambridge University Press
    • O. Goldreich. Foundations of Cryptography, volume 2, chapter 7 (General Cryptographic Protocols). Cambridge University Press, 2004.
    • (2004) Foundations of Cryptography , vol.2
    • Goldreich, O.1
  • 13
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • Apr.
    • S. Goldwasser, S. Micali, and R. L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Computing, 17(2):281-308, Apr. 1988.
    • (1988) SIAM J. Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.