메뉴 건너뛰기




Volumn 19, Issue 4, 2006, Pages 521-552

Completeness in two-party secure computation: A computational view

Author keywords

Oblivious transfer; One way function; Secure function evaluation

Indexed keywords

COMPUTATIONAL ROW TRANSITIVITY; OBLIVIOUS TRANSFER; ONE WAY FUNCTION; SECURE FUNCTION EVALUATION (SFE);

EID: 33749559395     PISSN: 09332790     EISSN: 14321378     Source Type: Journal    
DOI: 10.1007/s00145-006-0346-4     Document Type: Article
Times cited : (10)

References (49)
  • 1
    • 0026172266 scopus 로고
    • Statistical zero-knowledge languages can be recognized in two rounds
    • W. Aiello and J. Hastad. Statistical zero-knowledge languages can be recognized in two rounds. Journal of Computer and Systems Sciences, 42(3):327-345, 1991.
    • (1991) Journal of Computer and Systems Sciences , vol.42 , Issue.3 , pp. 327-345
    • Aiello, W.1    Hastad, J.2
  • 2
    • 84957064831 scopus 로고    scopus 로고
    • The all-or-nothing nature of two-party secure computation
    • LNCS 1666. Springer, Berlin
    • A. Beimel, T. Malkin, and S. Micali. The all-or-nothing nature of two-party secure computation. In CRYPTO '99, pages 80-97. LNCS 1666. Springer, Berlin, 1999.
    • (1999) CRYPTO '99 , pp. 80-97
    • Beimel, A.1    Malkin, T.2    Micali, S.3
  • 3
    • 85032877753 scopus 로고
    • Non-interactive oblivious transfer and applications
    • LNCS 435. Springer, Berlin
    • M. Bellare and S. Micali. Non-interactive oblivious transfer and applications. In CRYPTO '89, pages 547-557. LNCS 435. Springer, Berlin, 1989.
    • (1989) CRYPTO '89 , pp. 547-557
    • Bellare, M.1    Micali, S.2
  • 4
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic faulttolerant distributed computation
    • M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic faulttolerant distributed computation. In Proc. 20th STOC, pages 1-10, 1988.
    • (1988) Proc. 20th STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 5
    • 84969361843 scopus 로고
    • Practical quantum oblivious transfer protocols
    • LNCS 576. Springer, Berlin
    • C.H. Bennett, G. Brassard, C. Crepeau, and M.H. Skubiszewska. Practical quantum oblivious transfer protocols. In CRYPTO '91, pages 351-366. LNCS 576. Springer, Berlin, 1992.
    • (1992) CRYPTO '91 , pp. 351-366
    • Bennett, C.H.1    Brassard, G.2    Crepeau, C.3    Skubiszewska, M.H.4
  • 7
    • 33746383020 scopus 로고
    • Oblivious transfer with a memory-bound receiver
    • C. Cachin, C. Crepeau, and J. Marcil. Oblivious transfer with a memory-bound receiver. In Proc. 39th FOCS, pages 493-502, 1995.
    • (1995) Proc. 39th FOCS , pp. 493-502
    • Cachin, C.1    Crepeau, C.2    Marcil, J.3
  • 8
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • R. Canetti. Security and composition of multiparty cryptographic protocols. Journal of Cryptology, 13(1):143-202, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 9
    • 32844458303 scopus 로고    scopus 로고
    • On the limitations of universally composable two-party computation without set-up assumptions
    • R. Canetti, E. Kushilevitz, and Y. Lindell. On the limitations of universally composable two-party computation without set-up assumptions. Journal of Cryptology, 19(2):135-167, 2006.
    • (2006) Journal of Cryptology , vol.19 , Issue.2 , pp. 135-167
    • Canetti, R.1    Kushilevitz, E.2    Lindell, Y.3
  • 10
    • 84898947315 scopus 로고
    • Multiparty unconditionally secure protocols
    • D. Chaum, C. Crepeau, and I. Damgard. Multiparty unconditionally secure protocols. In Proc. 20th STOC, pages 11-19, 1988.
    • (1988) Proc. 20th STOC , pp. 11-19
    • Chaum, D.1    Crepeau, C.2    Damgard, I.3
  • 12
    • 33749562141 scopus 로고    scopus 로고
    • Preliminary version
    • Preliminary version in Proc 21st STOC.
    • Proc 21st STOC
  • 13
    • 85030121757 scopus 로고
    • Equivalence between two flavours of oblivious transfers
    • LNCS 293. Springer, Berlin
    • C. Crepeau. Equivalence between two flavours of oblivious transfers. In CRYPTO '87, pages 350-354. LNCS 293. Springer, Berlin, 1987.
    • (1987) CRYPTO '87 , pp. 350-354
    • Crepeau, C.1
  • 14
    • 0024132071 scopus 로고
    • Achieving oblivious transfer using weakened security assumptions
    • C. Crepeau and J. Kilian. Achieving oblivious transfer using weakened security assumptions. In Proc. 29th FOCS, pages 42-52, 1988.
    • (1988) Proc. 29th FOCS , pp. 42-52
    • Crepeau, C.1    Kilian, J.2
  • 15
    • 84957697395 scopus 로고    scopus 로고
    • On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions
    • LNCS 1592. Springer, Berlin
    • I. Damgard, J. Kilian, and L. Salvail. On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions. In Eurocrypt '99, pages 56-73. LNCS 1592. Springer, Berlin, 1999.
    • (1999) Eurocrypt '99 , pp. 56-73
    • Damgard, I.1    Kilian, J.2    Salvail, L.3
  • 16
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Communications of the ACM, 28(6):637-647, 1985.
    • (1985) Communications of the ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 17
    • 84880899701 scopus 로고    scopus 로고
    • Minimal complete primitives for secure multi-party computation
    • LNCS 2139. Springer, Berlin
    • M. Fitzi, J.A. Garay, U.M. Maurer, and R. Ostrovsky. Minimal complete primitives for secure multi-party computation. In CRYPTO '01, pages 80-100. LNCS 2139. Springer, Berlin, 2001.
    • (2001) CRYPTO '01 , pp. 80-100
    • Fitzi, M.1    Garay, J.A.2    Maurer, U.M.3    Ostrovsky, R.4
  • 18
    • 0003210004 scopus 로고
    • The complexity of perfect zero-knowledge
    • (editor S. Micali). Volume 5 of Advances in Computing Research. JAI Press, Greenwich, CT
    • L. Fortnow. The complexity of perfect zero-knowledge. In Randomness and Computation (editor S. Micali), pages 327-343. Volume 5 of Advances in Computing Research. JAI Press, Greenwich, CT, 1989.
    • (1989) Randomness and Computation , pp. 327-343
    • Fortnow, L.1
  • 22
    • 0024868772 scopus 로고
    • A hard-core predicate for all one-way functions
    • O. Goldreich and L.A. Levin. A hard-core predicate for all one-way functions. In Proc. 21st STOC, pages 25-32, 1989.
    • (1989) Proc. 21st STOC , pp. 25-32
    • Goldreich, O.1    Levin, L.A.2
  • 23
    • 0023545076 scopus 로고
    • How to play any mental game - A completeness theorem for protocols with honest majority
    • O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game - a completeness theorem for protocols with honest majority. In Proc. 19th STOC, pages 218-229, 1987.
    • (1987) Proc. 19th STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 24
    • 71149116146 scopus 로고
    • Proofs that yield nothing but their validity, or all languages in np have zero-knowledge proof systems
    • O. Goldreich, S. Micali, and A. Wigderson. Proofs that yield nothing but their validity, or all languages in np have zero-knowledge proof systems. Journal of the ACM, 38:691-729, 1991.
    • (1991) Journal of the ACM , vol.38 , pp. 691-729
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 25
    • 33749567437 scopus 로고
    • Electronic Colloquium on Computational Complexity, Report TR95-050
    • O. Goldreich, N. Nisan, and A. Wigderson. On Yao's XOR-lemma. Electronic Colloquium on Computational Complexity, Report TR95-050, 1995. Available at http://eccc.hpi-web.de/eccc/.
    • (1995) On Yao's XOR-lemma
    • Goldreich, O.1    Nisan, N.2    Wigderson, A.3
  • 26
    • 85032194875 scopus 로고
    • How to solve any protocol problem - An efficiency improvement
    • LNCS 293. Springer, Berlin
    • O. Goldreich and R. Vainish. How to solve any protocol problem - an efficiency improvement. In CRYPTO '87, pages 73-86. LNCS 293. Springer, Berlin, 1987.
    • (1987) CRYPTO '87 , pp. 73-86
    • Goldreich, O.1    Vainish, R.2
  • 27
    • 33745999816 scopus 로고    scopus 로고
    • Player simulation and general adversary structures in perfect multiparty computation
    • M. Hirt and U. Maurer. Player simulation and general adversary structures in perfect multiparty computation. Journal of Cryptology, 13(1):31-60, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 31-60
    • Hirt, M.1    Maurer, U.2
  • 28
    • 0029516814 scopus 로고
    • Hard-core distributions for somewhat hard problems
    • R. Impagliazzo. Hard-core distributions for somewhat hard problems. In Proc. 36th FOCS, pages 538-545, 1995.
    • (1995) Proc. 36th FOCS , pp. 538-545
    • Impagliazzo, R.1
  • 29
    • 0029227950 scopus 로고
    • A personal view of average-case complexity
    • IEEE Computer Society Press, Los Alamitos, CA
    • R. Impagliazzo. A personal view of average-case complexity. In Proc. 10th Annual Structure in Complexity Theory Conference, pages 134-147. IEEE Computer Society Press, Los Alamitos, CA, 1995.
    • (1995) Proc. 10th Annual Structure in Complexity Theory Conference , pp. 134-147
    • Impagliazzo, R.1
  • 30
    • 0024770898 scopus 로고
    • One-way functions are essential for complexity based cryptography
    • R. Impagliazzo and M. Luby. One-way functions are essential for complexity based cryptography. In Proc. 30th FOCS, pages 230-235, 1989.
    • (1989) Proc. 30th FOCS , pp. 230-235
    • Impagliazzo, R.1    Luby, M.2
  • 31
    • 0024866742 scopus 로고
    • Limits on the provable consequences of one-way permutations
    • R. Impagliazzo and S. Rudich. Limits on the provable consequences of one-way permutations. In Proc. 21st STOC, pages 44-61, 1989.
    • (1989) Proc. 21st STOC , pp. 44-61
    • Impagliazzo, R.1    Rudich, S.2
  • 32
    • 33749544524 scopus 로고    scopus 로고
    • Personal communication
    • Y. Ishai. Personal communication, 2004.
    • (2004)
    • Ishai, Y.1
  • 33
    • 84898989941 scopus 로고
    • Founding cryptography on oblivious transfer
    • J. Kilian. Founding cryptography on oblivious transfer. In Proc. 20th STOC, pages 20-31, 1988.
    • (1988) Proc. 20th STOC , pp. 20-31
    • Kilian, J.1
  • 34
    • 4544353942 scopus 로고
    • A general completeness theorem for two-party games
    • J. Kilian. A general completeness theorem for two-party games. In Proc. 23rd STOC, pages 553-560, 1991.
    • (1991) Proc. 23rd STOC , pp. 553-560
    • Kilian, J.1
  • 35
    • 0033706604 scopus 로고    scopus 로고
    • More general completeness theorems for secure two-party computation
    • J. Kilian. More general completeness theorems for secure two-party computation. In Proc. 32nd STOC, pages 316-324, 2000.
    • (2000) Proc. 32nd STOC , pp. 316-324
    • Kilian, J.1
  • 38
    • 33749555074 scopus 로고    scopus 로고
    • Preliminary version
    • Preliminary version in Proc. 30th FOCS.
    • Proc. 30th FOCS
  • 39
    • 84968329589 scopus 로고
    • Reducibility and completeness in multi-party private computations
    • E. Kushilevitz, S. Micali, and R. Ostrovsky. Reducibility and completeness in multi-party private computations. In Proc. 35th FOCS, pages 478-489, 1994.
    • (1994) Proc. 35th FOCS , pp. 478-489
    • Kushilevitz, E.1    Micali, S.2    Ostrovsky, R.3
  • 40
    • 51249173191 scopus 로고
    • One-way functions and pseudorandom generators
    • L.A. Levin. One-way functions and pseudorandom generators. Combinatorica, 7:357-363, 1987.
    • (1987) Combinatorica , vol.7 , pp. 357-363
    • Levin, L.A.1
  • 41
    • 84957050617 scopus 로고    scopus 로고
    • Information-theoretic cryptography
    • LNCS 1666. Springer, Berlin
    • U. Maurer. Information-theoretic cryptography. In CRYPTO '99, pages 47-64. LNCS 1666. Springer, Berlin, 1999.
    • (1999) CRYPTO '99 , pp. 47-64
    • Maurer, U.1
  • 42
    • 0002187139 scopus 로고
    • Secure computation
    • LNCS 576. Springer, Berlin
    • S. Micali and P. Rogaway. Secure computation. In CRYPTO '91, pages 392-404. LNCS 576. Springer, Berlin, 1991.
    • (1991) CRYPTO '91 , pp. 392-404
    • Micali, S.1    Rogaway, P.2
  • 44
    • 0034140357 scopus 로고    scopus 로고
    • On relationships between statistical zero-knowledge proofs
    • T. Okamoto. On relationships between statistical zero-knowledge proofs. Journal of Computer and Systems Sciences, 60(1):47-108, 2000.
    • (2000) Journal of Computer and Systems Sciences , vol.60 , Issue.1 , pp. 47-108
    • Okamoto, T.1
  • 47
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • A. C. Yao. Protocols for secure computations. In Proc. 23rd FOCS, pages 160-164, 1982.
    • (1982) Proc. 23rd FOCS , pp. 160-164
    • Yao, A.C.1
  • 48
    • 0020301290 scopus 로고
    • Theory and application of trapdoor functions
    • A. C. Yao. Theory and application of trapdoor functions. In Proc. 23rd FOCS, pages 80-91, 1982.
    • (1982) Proc. 23rd FOCS , pp. 80-91
    • Yao, A.C.1
  • 49
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • A. C. Yao. How to generate and exchange secrets. In Proc. 21th FOCS, pages 162-167, 1986.
    • (1986) Proc. 21th FOCS , pp. 162-167
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.