메뉴 건너뛰기




Volumn 2, Issue 3, 2006, Pages 435-472

Secure multiparty computation of approximations

Author keywords

Distributed data processing; Privacy; Sublinear communication

Indexed keywords

DISTRIBUTED DATA PROCESSING; HAMMING DISTANCE; MULTIPARTY COMPUTATION; SUBLINEAR COMMUNICATION;

EID: 33748996753     PISSN: 15496325     EISSN: 15496333     Source Type: Journal    
DOI: 10.1145/1159892.1159900     Document Type: Article
Times cited : (73)

References (55)
  • 3
    • 0033077324 scopus 로고    scopus 로고
    • The space complexity of approximating the frequency moments
    • ALON, N., MATIAS, Y., AND SZEGEDY, M. 1999. The space complexity of approximating the frequency moments. J. Comput. Syst. Science 58, 1, 137-147.
    • (1999) J. Comput. Syst. Science , vol.58 , Issue.1 , pp. 137-147
    • Alon, N.1    Matias, Y.2    Szegedy, M.3
  • 4
    • 0003430191 scopus 로고
    • John Wiley. BAR-YOSSEF, Z. 2004. Personal Communication
    • ALON, N. AND SPENCER, J. 1992. The Probabilistic Method. John Wiley. BAR-YOSSEF, Z. 2004. Personal Communication.
    • (1992) The Probabilistic Method
    • Alon, N.1    Spencer, J.2
  • 5
    • 85029542707 scopus 로고
    • Foundations of secure interactive computing
    • Lecture Notes in Computer Science. Springer-Verlag
    • BEAVER, D. 1991. Foundations of secure interactive computing. In Advances in Cryptology (CRYPTO'91) Lecture Notes in Computer Science, vol. 576. Springer-Verlag, 377-391.
    • (1991) Advances in Cryptology (CRYPTO'91) , vol.576 , pp. 377-391
    • Beaver, D.1
  • 9
    • 33749019254 scopus 로고    scopus 로고
    • BRODER, A. 1986. How hard is it to marry at random? In Proceedings of the 18th Annual ACM Symposium on the Theory of Computing 50-58. (Erratum in 20th STOC, p. 551.)
    • BRODER, A. 1986. How hard is it to marry at random? In Proceedings of the 18th Annual ACM Symposium on the Theory of Computing. 50-58. (Erratum in 20th STOC, p. 551.)
  • 10
    • 1642602228 scopus 로고    scopus 로고
    • Computationally private information retrieval with polylogarithmic communication
    • Lecture Notes in Computer Science. Springer-Verlag
    • CACHIN, C., MICALI, S., AND STADLER, M. 1999. Computationally private information retrieval with polylogarithmic communication. In Advances in Cryptology (EUROCRYPT'99). Lecture Notes in Computer Science, vol. 1592. Springer-Verlag, 404-414.
    • (1999) Advances in Cryptology (EUROCRYPT'99) , vol.1592 , pp. 404-414
    • Cachin, C.1    Micali, S.2    Stadler, M.3
  • 11
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • CANETTI, R. 2000. Security and composition of multiparty cryptographic protocols. J. Cryptology 13, 1, 143-202.
    • (2000) J. Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 18
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Lecture Notes in Computer Science. Springer-Verlag
    • DODIS, Y., REYZIN, L., AND SMITH, A. 2004. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Advances in Cryptology (EUROCRYPT'04) Lecture Notes in Computer Science, vol. 3027. Springer-Verlag, 523-540.
    • (2004) Advances in Cryptology (EUROCRYPT'04) , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 19
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • EVEN, S., GOLDREICH, O., AND LEMPEL, A. 1985. A randomized protocol for signing contracts. Comm. ACM 28, 637-647.
    • (1985) Comm. ACM , vol.28 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 22
    • 0037943836 scopus 로고    scopus 로고
    • An approximate Lidifference algorithm for massive data streams
    • FEIGENBAUM, J., KANNAN, S., STRAUSS, M., AND VISWANATHAN, M. 2002. An approximate Lidifference algorithm for massive data streams. SIAM J. Comput. 32, 1, 131-151.
    • (2002) SIAM J. Comput. , vol.32 , Issue.1 , pp. 131-151
    • Feigenbaum, J.1    Kannan, S.2    Strauss, M.3    Viswanathan, M.4
  • 23
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • Lecture Notes in Computer Science, Springer-Verlag
    • FREEDMAN, M., NISSIM, K., AND PINKAS, B. 2004. Efficient private matching and set intersection. In Advances in Cryptology (EUROCRYPT'04) Lecture Notes in Computer Science, vol. 3027. Springer-Verlag, 1-19.
    • (2004) Advances in Cryptology (EUROCRYPT'04) , vol.3027 , pp. 1-19
    • Freedman, M.1    Nissim, K.2    Pinkas, B.3
  • 26
    • 0034205020 scopus 로고    scopus 로고
    • Protecting data privacy in private information retrieval schemes
    • GERTNER, Y., ISHAI, Y., KUSHILEVITZ, E., AND MALKIN, T. 2000. Protecting data privacy in private information retrieval schemes. J. Comput. Syst. Sciences 60, 3, 592-692.
    • (2000) J. Comput. Syst. Sciences , vol.60 , Issue.3 , pp. 592-692
    • Gertner, Y.1    Ishai, Y.2    Kushilevitz, E.3    Malkin, T.4
  • 34
    • 0024904712 scopus 로고
    • Approximating the permanent
    • JERRUM, M. AND SINCLAIR, A. 1989. Approximating the permanent. SIAM J. Comput. 18, 6, 1149-1178.
    • (1989) SIAM J. Comput. , vol.18 , Issue.6 , pp. 1149-1178
    • Jerrum, M.1    Sinclair, A.2
  • 35
    • 4243139497 scopus 로고    scopus 로고
    • A polynomial-time approximation algorithm for the permanent of a matrix with nonnegative entries
    • JERRUM, M., SINCLAIR, A., AND VIGODA, E. 2004. A polynomial-time approximation algorithm for the permanent of a matrix with nonnegative entries. J. ACM 51, 4, 671-697.
    • (2004) J. ACM , vol.51 , Issue.4 , pp. 671-697
    • Jerrum, M.1    Sinclair, A.2    Vigoda, E.3
  • 36
    • 38249043088 scopus 로고
    • Random generation of combinatorial structures from a uniform distribution
    • JERRUM, M., VALIANT, L., AND VAZIRANI, V. 1986. Random generation of combinatorial structures from a uniform distribution. Theoret. Comput. Science 43, 169-188.
    • (1986) Theoret. Comput. Science , vol.43 , pp. 169-188
    • Jerrum, M.1    Valiant, L.2    Vazirani, V.3
  • 38
    • 33749018100 scopus 로고    scopus 로고
    • Round efficiency of multi-party computation with a dishonest majority
    • Lecture Notes in Computer Science. Springer-Verlag, 578-595.
    • KATZ, J., OSTROVSKY, R., AND SMITH, A. 2003. Round efficiency of multi-party computation with a dishonest majority. In Advances in Cryptology (EUROCRYPT'03) Lecture Notes in Computer Science, vol. 2656. Springer-Verlag, 578-595.
    • (2003) Advances in Cryptology (EUROCRYPT'03) , vol.2656
    • Katz, J.1    Ostrovsky, R.2    Smith, A.3
  • 41
    • 0037492265 scopus 로고    scopus 로고
    • Efficient search for approximate nearest neighbor in high dimensional spaces
    • KUSHILEVITZ, E., OSTROVSKY, R., AND RABANI, Y. 2000. Efficient search for approximate nearest neighbor in high dimensional spaces. SIAM J. Comput. 30, 2, 457-474.
    • (2000) SIAM J. Comput. , vol.30 , Issue.2 , pp. 457-474
    • Kushilevitz, E.1    Ostrovsky, R.2    Rabani, Y.3
  • 42
    • 4544235438 scopus 로고    scopus 로고
    • Parallel coin-tossing and constant-round secure two-party computation
    • LINDELL, Y. 2003. Parallel coin-tossing and constant-round secure two-party computation. J. Cryptol. 16, 3, 143-184.
    • (2003) J. Cryptol. , vol.16 , Issue.3 , pp. 143-184
    • Lindell, Y.1
  • 43
    • 33746437508 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • LINDELL, Y. AND PINKAS, B. 2002. Privacy preserving data mining. J. Cryptol. 15, 3, 177-206.
    • (2002) J. Cryptol. , vol.15 , Issue.3 , pp. 177-206
    • Lindell, Y.1    Pinkas, B.2
  • 44
    • 33645970169 scopus 로고    scopus 로고
    • An oblivious transfer protocol with log-squared communication
    • J. Zhou and J. Lopez, Eds. Lecture Notes in Computer Science. Springer-Verlag
    • LIPMAA, H. 2005. An oblivious transfer protocol with log-squared communication. In Proceedings of the 8th Information Security Conference (ISC'05). J. Zhou and J. Lopez, Eds. Lecture Notes in Computer Science, vol. 3650. Springer-Verlag, 314-328.
    • (2005) Proceedings of the 8th Information Security Conference (ISC'05) , vol.3650 , pp. 314-328
    • Lipmaa, H.1
  • 45
    • 0003625461 scopus 로고    scopus 로고
    • M.S. thesis, Technion (Israel Institute of Technology), Haifa, Israel
    • MANN, E. 1998. Private access to distributed information. M.S. thesis, Technion (Israel Institute of Technology), Haifa, Israel.
    • (1998) Private Access to Distributed Information
    • Mann, E.1
  • 46
    • 84974655726 scopus 로고
    • Secure computation
    • Lecture Notes in Computer Science. Springer-Verlag
    • MICALI, S. AND ROGAWAY, P. 1991. Secure computation. In Advances in Cryptology (CRYPTO'91) Lecture Notes in Computer Science, vol. 576. Springer-Verlag, 392-404.
    • (1991) Advances in Cryptology (CRYPTO'91) , vol.576 , pp. 392-404
    • Micali, S.1    Rogaway, P.2
  • 48
    • 0027641832 scopus 로고
    • Small-bias probability spaces: Efficient constructions and applications
    • NAOR, J. AND NAOR, M. 1993. Small-bias probability spaces: efficient constructions and applications. SIAM J. Comput. 22, 4, 838-856.
    • (1993) SIAM J. Comput. , vol.22 , Issue.4 , pp. 838-856
    • Naor, J.1    Naor, M.2
  • 50
    • 22044454088 scopus 로고    scopus 로고
    • Computationally secure oblivious transfer
    • NAOR, M. AND PINKAS, B. 2005. Computationally secure oblivious transfer. J. Cryptol. 18, 1, 1-35.
    • (2005) J. Cryptol. , vol.18 , Issue.1 , pp. 1-35
    • Naor, M.1    Pinkas, B.2
  • 52
    • 0003462641 scopus 로고
    • How to exchange secrets by oblivious transfer
    • Aiken Computation Laboratory, Harvard University, Cambridge, MA
    • RABIN, M.O. 1981. How to exchange secrets by oblivious transfer. Tech. rep. TR-81, Aiken Computation Laboratory, Harvard University, Cambridge, MA.
    • (1981) Tech. Rep. , vol.TR-81
    • Rabin, M.O.1
  • 53
    • 84947772655 scopus 로고    scopus 로고
    • A new and efficient all-or-nothing disclosure of secrets protocol
    • Lecture Notes in Computer Science. Springer-Verlag
    • STERN, J. P. 1998. A new and efficient all-or-nothing disclosure of secrets protocol. In Advances in Cryptology (ASIACRYPT'98) Lecture Notes in Computer Science, vol. 1514. Springer-Verlag, 357-371.
    • (1998) Advances in Cryptology (ASIACRYPT'98) , vol.1514 , pp. 357-371
    • Stern, J.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.