메뉴 건너뛰기




Volumn 2656, Issue , 2003, Pages 578-595

Round efficiency of multi-party computation with a dishonest majority

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTERS;

EID: 33749018100     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-39200-9_36     Document Type: Article
Times cited : (64)

References (34)
  • 2
    • 35248855697 scopus 로고    scopus 로고
    • Constant-round coin-tossing with a man in the middle
    • References are to the preliminary full version, available from the author's web page
    • B. Barak. Constant-round coin-tossing with a man in the middle. In 43rd IEEE Symposium on the Foundations of Computer Science, 2002. References are to the preliminary full version, available from the author's web page.
    • (2002) 43rd IEEE Symposium on the Foundations of Computer Science
    • Barak, B.1
  • 4
    • 85029542707 scopus 로고
    • Foundations of secure interactive computing
    • Advances in Cryptology - CRYPTO '91, IACR, Springer-Verlag, Aug.
    • D. Beaver. Foundations of secure interactive computing. In Advances in Cryptology - CRYPTO '91, volume 576 of Lecture Notes in Computer Science, pages 377-391. IACR, Springer-Verlag, Aug. 1991.
    • (1991) Lecture Notes in Computer Science , vol.576 , pp. 377-391
    • Beaver, D.1
  • 5
    • 85014508412 scopus 로고
    • Multiparty computation with faulty majority
    • Advances in Cryptology - CRYPTO '89, IACR, Springer-Verlag, Aug.
    • D. Beaver and S. Goldwasser. Multiparty computation with faulty majority. In Advances in Cryptology - CRYPTO '89, volume 435 of Lecture Notes in Computer Science, pages 589-590. IACR, Springer-Verlag, Aug. 1989.
    • (1989) Lecture Notes in Computer Science , vol.435 , pp. 589-590
    • Beaver, D.1    Goldwasser, S.2
  • 8
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • R. Canetti. Security and composition of multiparty cryptographic protocols. J. Cryptology, 13(1):143-202, 2000.
    • (2000) J. Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 9
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • Las Vegas, Nevada, Oct. IEEE
    • R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In 42nd IEEE Symposium on the Foundations of Computer Science, pages 136-147, Las Vegas, Nevada, Oct. 2001. IEEE.
    • (2001) 42nd IEEE Symposium on the Foundations of Computer Science , pp. 136-147
    • Canetti, R.1
  • 10
    • 84880897758 scopus 로고    scopus 로고
    • Universally composable commitments
    • Advances in Cryptology - CRYPTO 2001, IACR, Springer
    • R. Canetti and M. Fischlin. Universally composable commitments. In Advances in Cryptology - CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 19-40. IACR, Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 19-40
    • Canetti, R.1    Fischlin, M.2
  • 14
    • 0012610677 scopus 로고
    • Limits on the security of coin flips when half the processors are faulty
    • R. Cleve. Limits on the security of coin flips when half the processors are faulty. In 18th ACM Symposium on the Theory of Computing, pages 364-369, 1986.
    • (1986) 18th ACM Symposium on the Theory of Computing , pp. 364-369
    • Cleve, R.1
  • 15
    • 84880872502 scopus 로고    scopus 로고
    • Secure distributed linear algebra in a constant number of rounds
    • Advances in Cryptology - CRYPTO 2001, IACR, Springer
    • R. Cramer and I. Damgård. Secure distributed linear algebra in a constant number of rounds. In Advances in Cryptology - CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science. IACR, Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2139
    • Cramer, R.1    Damgård, I.2
  • 17
    • 0343337504 scopus 로고    scopus 로고
    • Nonmalleable cryptography
    • D. Dolev, C. Dwork, and M. Naor. Nonmalleable cryptography. SIAM J. Computing, 30(2):391-437, 2000.
    • (2000) SIAM J. Computing , vol.30 , Issue.2 , pp. 391-437
    • Dolev, D.1    Dwork, C.2    Naor, M.3
  • 18
    • 0001683636 scopus 로고
    • Authenticated algorithms for byzantine agreement
    • D. Dolev and H. Strong. Authenticated algorithms for byzantine agreement. SIAM J. Computing, 12(4):656-666, 1983.
    • (1983) SIAM J. Computing , vol.12 , Issue.4 , pp. 656-666
    • Dolev, D.1    Strong, H.2
  • 19
    • 84976826800 scopus 로고
    • Zero knowledge proofs of knowledge in two rounds
    • Advances in Cryptology - CRYPTO '89, IACR, Springer-Verlag, Aug.
    • U. Feige and A. Shamir. Zero knowledge proofs of knowledge in two rounds. In Advances in Cryptology - CRYPTO '89, volume 435 of Lecture Notes in Computer Science, pages 526-544. IACR, Springer-Verlag, Aug. 1989.
    • (1989) Lecture Notes in Computer Science , vol.435 , pp. 526-544
    • Feige, U.1    Shamir, A.2
  • 24
    • 0023545076 scopus 로고
    • How to play any mental game or a completeness theorem for protocols with honest majority
    • ACM, May
    • O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game or a completeness theorem for protocols with honest majority. In 19th ACM Symposium on the Theory of Computing, pages 218-229. ACM, May 1987.
    • (1987) 19th ACM Symposium on the Theory of Computing , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 25
    • 0028676264 scopus 로고
    • Definitions and properties of zero-knowledge proof systems
    • O. Goldreich and Y. Oren. Definitions and properties of zero-knowledge proof systems. J. Cryptology, 7(1):1-32, 1994.
    • (1994) J. Cryptology , vol.7 , Issue.1 , pp. 1-32
    • Goldreich, O.1    Oren, Y.2
  • 26
    • 84955564077 scopus 로고
    • Fair computation of general functions in presence of immoral majority
    • Advances in Cryptology - CRYPTO '90, Springer-Verlag, Aug.
    • S. Goldwasser and L. A. Levin. Fair computation of general functions in presence of immoral majority. In Advances in Cryptology - CRYPTO '90, volume 537 of Lecture Notes in Computer Science, pages 77-93. Springer-Verlag, Aug. 1990.
    • (1990) Lecture Notes in Computer Science , vol.537 , pp. 77-93
    • Goldwasser, S.1    Levin, L.A.2
  • 28
    • 0034507841 scopus 로고    scopus 로고
    • Randomizing polynomials: A new representation with applications to round-efficient secure computation
    • Redondo Beach, CA, Nov. IEEE
    • Y. Ishai and E. Kushilevitz. Randomizing polynomials: A new representation with applications to round-efficient secure computation. In 41nd IEEE Symposium on the Foundations of Computer Science, Redondo Beach, CA, Nov. 2000. IEEE.
    • (2000) 41nd IEEE Symposium on the Foundations of Computer Science
    • Ishai, Y.1    Kushilevitz, E.2
  • 30
    • 35048833033 scopus 로고    scopus 로고
    • Parallel coin-tossing and constant-round secure two-party computation
    • Advances in Cryptology - CRYPTO 2001, IACR, Springer
    • Y. Lindell. Parallel coin-tossing and constant-round secure two-party computation. In Advances in Cryptology - CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 171-189. IACR, Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 171-189
    • Lindell, Y.1
  • 31
    • 84974655726 scopus 로고
    • Secure computation
    • Advances in Cryptology - CRYPTO '91, IACR, Springer-Verlag, Aug.
    • S. Micali and P. Rogaway. Secure computation. In Advances in Cryptology - CRYPTO '91, volume 576 of Lecture Notes in Computer Science, pages 392-404. IACR, Springer-Verlag, Aug. 1991.
    • (1991) Lecture Notes in Computer Science , vol.576 , pp. 392-404
    • Micali, S.1    Rogaway, P.2
  • 32
    • 0141544069 scopus 로고    scopus 로고
    • Perfect zero-knowledge arguments for np using any one-way permutation
    • M. Naor, R. Ostrovsky, R. Venkatesan, and M. Yung. Perfect zero-knowledge arguments for np using any one-way permutation. J. Cryptology, 11(2), 1998.
    • (1998) J. Cryptology , vol.11 , Issue.2
    • Naor, M.1    Ostrovsky, R.2    Venkatesan, R.3    Yung, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.